diff --git a/CVE-2005/CVE-2005-02xx/CVE-2005-0227.json b/CVE-2005/CVE-2005-02xx/CVE-2005-0227.json
index c770f82a716..491866e5928 100644
--- a/CVE-2005/CVE-2005-02xx/CVE-2005-0227.json
+++ b/CVE-2005/CVE-2005-02xx/CVE-2005-0227.json
@@ -2,8 +2,8 @@
"id": "CVE-2005-0227",
"sourceIdentifier": "security@debian.org",
"published": "2005-05-02T04:00:00.000",
- "lastModified": "2017-10-11T01:29:54.123",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-18T20:54:44.113",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -58,73 +58,24 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "AFF09CFB-F7CE-4659-BB20-83231539F765"
+ "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.3.0",
+ "versionEndExcluding": "7.3.9",
+ "matchCriteriaId": "4C486421-63ED-418C-BAE1-75690B1AC07D"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "EFE8C2A3-7575-41C6-896C-C367E6D35015"
+ "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.4",
+ "versionEndExcluding": "7.4.7",
+ "matchCriteriaId": "7B6180C2-75D0-4196-AE96-9DA773C346E5"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "88ED8E8C-9044-4E77-923A-D5C6C02A1081"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "037FF208-82A1-4448-88FE-FACB922FE1E0"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "458F558C-7550-48B8-8318-A0D5FAF9ABF8"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "BF1A6E7C-B1DC-45CC-90B4-AFD6F669AA94"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "23B710BA-91FF-47B9-BB56-4711CD50D50F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "0C8DDD98-9A2D-402D-9172-F3C4C4C97FEF"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "20C8302B-631A-4DF7-839B-C6F3CC39E000"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "FB318EB9-1B49-452A-92CF-89D9BA990AB9"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "5913A53B-7B72-4CBD-ADAE-318333EB8B7B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "815E58C0-327D-4F14-B496-05FC8179627E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "3EF2D056-5120-4F98-8343-4EC31F962CFE"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "516E0E86-3D8A-43F9-9DD5-865F5C889FC4"
+ "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndExcluding": "8.0.1",
+ "matchCriteriaId": "05B6F332-5104-4A52-A43E-24D70BC931C4"
}
]
}
@@ -136,7 +87,8 @@
"url": "http://archives.postgresql.org/pgsql-announce/2005-02/msg00000.php",
"source": "security@debian.org",
"tags": [
- "Patch"
+ "Patch",
+ "Vendor Advisory"
]
},
{
@@ -148,62 +100,83 @@
},
{
"url": "http://marc.info/?l=bugtraq&m=110726899107148&w=2",
- "source": "security@debian.org"
+ "source": "security@debian.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/12948",
+ "source": "security@debian.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://security.gentoo.org/glsa/glsa-200502-08.xml",
"source": "security@debian.org",
"tags": [
- "Patch"
+ "Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2005/dsa-668",
"source": "security@debian.org",
"tags": [
- "Patch",
- "Vendor Advisory"
+ "Third Party Advisory"
]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:040",
- "source": "security@debian.org"
+ "source": "security@debian.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.novell.com/linux/security/advisories/2005_36_sudo.html",
- "source": "security@debian.org"
+ "source": "security@debian.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-138.html",
"source": "security@debian.org",
"tags": [
"Patch",
- "Vendor Advisory"
+ "Third Party Advisory"
]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2005-150.html",
"source": "security@debian.org",
"tags": [
- "Patch",
- "Vendor Advisory"
+ "Third Party Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/12411",
- "source": "security@debian.org"
+ "source": "security@debian.org",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.trustix.org/errata/2005/0003/",
"source": "security@debian.org",
"tags": [
"Patch",
- "Vendor Advisory"
+ "Third Party Advisory"
]
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10234",
- "source": "security@debian.org"
+ "source": "security@debian.org",
+ "tags": [
+ "Broken Link"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2008/CVE-2008-18xx/CVE-2008-1897.json b/CVE-2008/CVE-2008-18xx/CVE-2008-1897.json
index 8903c600259..03ca0b8046e 100644
--- a/CVE-2008/CVE-2008-18xx/CVE-2008-1897.json
+++ b/CVE-2008/CVE-2008-18xx/CVE-2008-1897.json
@@ -2,7 +2,7 @@
"id": "CVE-2008-1897",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-04-23T16:05:00.000",
- "lastModified": "2018-10-11T20:37:48.463",
+ "lastModified": "2023-10-20T02:15:07.607",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -805,6 +805,31 @@
"url": "http://downloads.digium.com/pub/security/AST-2008-006.html",
"source": "cve@mitre.org"
},
+ {
+ "url": "http://secunia.com/advisories/29927",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/30010",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/30042",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/34982",
+ "source": "cve@mitre.org"
+ },
{
"url": "http://security.gentoo.org/glsa/glsa-200905-01.xml",
"source": "cve@mitre.org"
@@ -833,10 +858,54 @@
"url": "http://www.vupen.com/english/advisories/2008/1324",
"source": "cve@mitre.org"
},
+ {
+ "url": "https://downloads.asterisk.org/pub/security/AST-2008-006.html",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41966",
"source": "cve@mitre.org"
},
+ {
+ "url": "https://github.com/jcollie/asterisk/commit/60de4fbbdf3ede49f158e23a9e3b679f2e519c1e",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/jcollie/asterisk/commit/771b3d8749b34b6eea4e03a2e514380da9582f90",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/jcollie/asterisk/commit/a8b180875b037b8da26f6a3bcc8e5e98b8c904d2",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/kaoru6/asterisk/commit/1fe14f38dd43dc894d21f85762b51208ba5c8acb",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/lyx2014/Asterisk/commit/0670e43c30135044e25cca7f80e1833e2c128653",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/mojolingo/asterisk/commit/20ac3662f137dbf7f42d5295590069a7d3b1166b",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/pruiz/asterisk/commit/e0ef9bd22810c6969a7f222eec04798f19a7e2d6",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/silentindark/asterisk-1/commit/fe8b7f31db687f8b9992864b82c93d22833019c7",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/xrg/asterisk-xrg/commit/10da3dab24e8ca08cf2c983f8d0206e383535b5a",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/xrg/asterisk-xrg/commit/51714a24347dc57f9a208a4a8af84115ef407b83",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00581.html",
"source": "cve@mitre.org"
diff --git a/CVE-2011/CVE-2011-100xx/CVE-2011-10004.json b/CVE-2011/CVE-2011-100xx/CVE-2011-10004.json
index d7bb7c06116..e38be8f8d76 100644
--- a/CVE-2011/CVE-2011-100xx/CVE-2011-10004.json
+++ b/CVE-2011/CVE-2011-100xx/CVE-2011-10004.json
@@ -2,8 +2,8 @@
"id": "CVE-2011-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-17T00:15:10.500",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:29:50.567",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,6 +15,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -75,18 +97,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:reciply_project:reciply:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.1.8",
+ "matchCriteriaId": "83349496-D86A-43A2-9BFF-EE1395007AA0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/wp-plugins/reciply/commit/e3ff616dc08d3aadff9253f1085e13f677d0c676",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.242189",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required"
+ ]
},
{
"url": "https://vuldb.com/?id.242189",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2011/CVE-2011-24xx/CVE-2011-2483.json b/CVE-2011/CVE-2011-24xx/CVE-2011-2483.json
index 1e98835e508..cac43414cd4 100644
--- a/CVE-2011/CVE-2011-24xx/CVE-2011-2483.json
+++ b/CVE-2011/CVE-2011-24xx/CVE-2011-2483.json
@@ -2,8 +2,8 @@
"id": "CVE-2011-2483",
"sourceIdentifier": "secalert@redhat.com",
"published": "2011-08-25T14:22:44.913",
- "lastModified": "2017-08-29T01:29:25.580",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T20:23:03.017",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -640,99 +640,207 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.2.0",
+ "versionEndExcluding": "8.2.22",
+ "matchCriteriaId": "5133F766-D0DC-49A9-A2BC-3109A40F147A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.3.0",
+ "versionEndExcluding": "8.3.16",
+ "matchCriteriaId": "6688FCE5-4C30-47AC-8780-52F20AFE9916"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.4.0",
+ "versionEndExcluding": "8.4.9",
+ "matchCriteriaId": "6BE21A26-98F2-4A2B-BE67-052377A46528"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.0.0",
+ "versionEndExcluding": "9.0.5",
+ "matchCriteriaId": "65CDFDE3-89F6-4961-8675-123D9D9D2471"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://freshmeat.net/projects/crypt_blowfish",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00015.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://php.net/security/crypt_blowfish",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://support.apple.com/kb/HT5130",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.debian.org/security/2011/dsa-2340",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.debian.org/security/2012/dsa-2399",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:165",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:179",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:180",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.openwall.com/crypt/",
"source": "secalert@redhat.com",
"tags": [
- "Patch"
+ "Mailing List",
+ "Patch",
+ "Third Party Advisory"
]
},
{
"url": "http://www.php.net/ChangeLog-5.php#5.3.7",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.php.net/archive/2011.php#id2011-08-18-1",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "http://www.postgresql.org/docs/8.4/static/release-8-4-9.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-1377.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-1378.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.redhat.com/support/errata/RHSA-2011-1423.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.securityfocus.com/bid/49241",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.ubuntu.com/usn/USN-1229-1",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69319",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10016.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10016.json
index c4797d54ed8..61103bec66d 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10016.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10016.json
@@ -2,8 +2,8 @@
"id": "CVE-2012-10016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-17T00:15:10.603",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:30:01.200",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,6 +15,28 @@
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -65,8 +87,18 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -75,18 +107,44 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:halulu:simple-download-button-shortcode:1.0:*:*:*:*:wordpress:*:*",
+ "matchCriteriaId": "32AD9DB1-C290-4DAF-9DF2-B90916CB7AE6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/wp-plugins/simple-download-button-shortcode/commit/e648a8706818297cf02a665ae0bae1c069dea5f1",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.242190",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required"
+ ]
},
{
"url": "https://vuldb.com/?id.242190",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2012/CVE-2012-33xx/CVE-2012-3380.json b/CVE-2012/CVE-2012-33xx/CVE-2012-3380.json
index c57867c0cc0..d4e25e55a6a 100644
--- a/CVE-2012/CVE-2012-33xx/CVE-2012-3380.json
+++ b/CVE-2012/CVE-2012-33xx/CVE-2012-3380.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-3380",
"sourceIdentifier": "secalert@redhat.com",
"published": "2012-08-31T18:55:03.387",
- "lastModified": "2012-09-05T04:00:00.000",
+ "lastModified": "2023-10-17T17:00:32.600",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -62,9 +62,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:naxsi_project:naxsi:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:wargio:naxsi:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.46",
- "matchCriteriaId": "6073CD69-CC51-442E-A5FC-4C5AC5405CD6"
+ "matchCriteriaId": "82590000-E9C8-4907-B363-8568BA6E0C9A"
}
]
}
@@ -83,6 +83,13 @@
"Patch"
]
},
+ {
+ "url": "http://secunia.com/advisories/49811",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
{
"url": "http://www.openwall.com/lists/oss-security/2012/07/05/1",
"source": "secalert@redhat.com"
@@ -90,6 +97,10 @@
{
"url": "http://www.openwall.com/lists/oss-security/2012/07/06/3",
"source": "secalert@redhat.com"
+ },
+ {
+ "url": "http://www.osvdb.org/83617",
+ "source": "secalert@redhat.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10021.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10021.json
index 8876da31e4e..de8bc327109 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10021.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10021.json
@@ -2,12 +2,12 @@
"id": "CVE-2013-10021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-11T21:15:09.247",
- "lastModified": "2023-03-15T21:01:53.657",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:07.907",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in dd32 Debug Bar Plugin up to 0.8. It has been declared as problematic. Affected by this vulnerability is the function render of the file panels/class-debug-bar-queries.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.8.1 is able to address this issue. The name of the patch is 0842af8f8a556bc3e39b9ef758173b0a8a9ccbfc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222739."
+ "value": "A vulnerability was found in dd32 Debug Bar Plugin up to 0.8 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function render of the file panels/class-debug-bar-queries.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.8.1 is able to address this issue. The patch is named 0842af8f8a556bc3e39b9ef758173b0a8a9ccbfc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222739."
}
],
"metrics": {
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10022.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10022.json
index 898ebdda502..c85e6a2b1cc 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10022.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10022.json
@@ -2,12 +2,12 @@
"id": "CVE-2013-10022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T13:15:06.830",
- "lastModified": "2023-04-11T14:46:04.187",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:11.297",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in BestWebSoft Contact Form Plugin 3.51. Affected by this issue is the function cntctfrm_display_form/cntctfrm_check_form of the file contact_form.php. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.52 is able to address this issue. The name of the patch is 642ef1dc1751ab6642ce981fe126325bb574f898. It is recommended to upgrade the affected component. VDB-225002 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in BestWebSoft Contact Form Plugin 3.51 on WordPress. Affected by this issue is the function cntctfrm_display_form/cntctfrm_check_form of the file contact_form.php. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.52 is able to address this issue. The patch is identified as 642ef1dc1751ab6642ce981fe126325bb574f898. It is recommended to upgrade the affected component. VDB-225002 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10023.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10023.json
index c741d0685ac..556b8ed55e6 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10023.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10023.json
@@ -2,12 +2,12 @@
"id": "CVE-2013-10023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T09:15:07.000",
- "lastModified": "2023-04-17T14:12:43.913",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:11.833",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Editorial Calendar Plugin up to 2.6. It has been declared as critical. Affected by this vulnerability is the function edcal_filter_where of the file edcal.php. The manipulation of the argument edcal_startDate/edcal_endDate leads to sql injection. The attack can be launched remotely. Upgrading to version 2.7 is able to address this issue. The name of the patch is a9277f13781187daee760b4dfd052b1b68e101cc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-225151."
+ "value": "A vulnerability was found in Editorial Calendar Plugin up to 2.6 on WordPress. It has been declared as critical. Affected by this vulnerability is the function edcal_filter_where of the file edcal.php. The manipulation of the argument edcal_startDate/edcal_endDate leads to sql injection. The attack can be launched remotely. Upgrading to version 2.7 is able to address this issue. The patch is named a9277f13781187daee760b4dfd052b1b68e101cc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-225151."
}
],
"metrics": {
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10024.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10024.json
index 8ca9ce2e6c6..ed71ff0b2d0 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10024.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10024.json
@@ -2,12 +2,12 @@
"id": "CVE-2013-10024",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T17:15:06.920",
- "lastModified": "2023-04-17T13:50:16.167",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:12.420",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in Exit Strategy Plugin 1.55 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The name of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The identifier of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10025.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10025.json
index f8937b7707e..6bc481270aa 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10025.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10025.json
@@ -2,12 +2,12 @@
"id": "CVE-2013-10025",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T17:15:06.987",
- "lastModified": "2023-04-17T13:59:28.013",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:12.900",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Exit Strategy Plugin 1.55 and classified as problematic. Affected by this issue is the function exitpageadmin of the file exitpage.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 1.59 is able to address this issue. The name of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. VDB-225266 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this issue is the function exitpageadmin of the file exitpage.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 1.59 is able to address this issue. The patch is identified as d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. VDB-225266 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json
index 51307802463..d981ed1d42c 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json
@@ -2,12 +2,12 @@
"id": "CVE-2013-10026",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T02:15:27.267",
- "lastModified": "2023-05-09T17:18:59.857",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:13.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in Mail Subscribe List Plugin up to 2.0.10 on WordPress. This issue affects some unknown processing of the file index.php. The manipulation of the argument sml_name/sml_email leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.1 is able to address this issue. The name of the patch is 484970ef8285cae51d2de3bd4e4684d33c956c28. It is recommended to upgrade the affected component. The identifier VDB-227765 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in Mail Subscribe List Plugin up to 2.0.10 on WordPress. This issue affects some unknown processing of the file index.php. The manipulation of the argument sml_name/sml_email leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.1 is able to address this issue. The identifier of the patch is 484970ef8285cae51d2de3bd4e4684d33c956c28. It is recommended to upgrade the affected component. The identifier VDB-227765 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json
index 711fbc2d799..8d23b204368 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json
@@ -2,12 +2,12 @@
"id": "CVE-2013-10027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-04T14:15:09.397",
- "lastModified": "2023-06-09T19:05:15.310",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:13.627",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Blogger Importer Plugin up to 0.5 on WordPress. It has been classified as problematic. Affected is the function start/restart of the file blogger-importer.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 0.6 is able to address this issue. The name of the patch is b83fa4f862b0f19a54cfee76060ec9c2e7f7ca70. It is recommended to upgrade the affected component. VDB-230658 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Blogger Importer Plugin up to 0.5 on WordPress. It has been classified as problematic. Affected is the function start/restart of the file blogger-importer.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 0.6 is able to address this issue. The patch is identified as b83fa4f862b0f19a54cfee76060ec9c2e7f7ca70. It is recommended to upgrade the affected component. VDB-230658 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2013/CVE-2013-43xx/CVE-2013-4300.json b/CVE-2013/CVE-2013-43xx/CVE-2013-4300.json
index 7acc38f3c9f..2aef53eea23 100644
--- a/CVE-2013/CVE-2013-43xx/CVE-2013-4300.json
+++ b/CVE-2013/CVE-2013-43xx/CVE-2013-4300.json
@@ -2,8 +2,8 @@
"id": "CVE-2013-4300",
"sourceIdentifier": "secalert@redhat.com",
"published": "2013-09-25T10:31:29.160",
- "lastModified": "2023-02-13T04:46:23.940",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:05:02.173",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -63,1143 +63,21 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "3.10.12",
- "matchCriteriaId": "A6B914D2-8827-4C24-AB90-8BF833364126"
+ "versionStartIncluding": "3.8.6",
+ "versionEndExcluding": "3.9",
+ "matchCriteriaId": "0E995DC9-9601-451D-827F-FBB0F55E5F32"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
- "matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B"
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.10",
+ "versionEndExcluding": "3.10.13",
+ "matchCriteriaId": "D94B2ABE-93E9-44C8-B7A2-E6F5D155DE30"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
- "matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
- "matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
- "matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
- "matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
- "matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
- "matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
- "matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
- "matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
- "matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
- "matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
- "matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
- "matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
- "matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
- "matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
- "matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
- "matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
- "matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
- "matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
- "matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
- "matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
- "matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
- "matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
- "matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
- "matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
- "matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
- "matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
- "matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
- "matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
- "matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
- "matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
- "matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
- "matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
- "matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
- "matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
- "matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
- "matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
- "matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
- "matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*",
- "matchCriteriaId": "FDB91302-FD18-44CF-A8A8-B31483328539"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*",
- "matchCriteriaId": "9B81DC2B-46FA-4640-AD6C-2A404D94BA0B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*",
- "matchCriteriaId": "BA6A1663-BC4C-4FC9-B5EB-A52EDED17B26"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*",
- "matchCriteriaId": "69C33D6C-6B9F-49F4-B505-E7B589CDEC50"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*",
- "matchCriteriaId": "C464796B-2F31-4159-A132-82A0C74137B7"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*",
- "matchCriteriaId": "1D6C6E46-FE29-4D2D-A0EC-43DA5112BCC3"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*",
- "matchCriteriaId": "1A370E91-73A1-4D62-8E7B-696B920203F8"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*",
- "matchCriteriaId": "340197CD-9645-4B7E-B976-F3F5A7D4C5BE"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*",
- "matchCriteriaId": "96030636-0C4A-4A10-B768-525D6A0E18CB"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*",
- "matchCriteriaId": "A42D8419-914F-4AD6-B0E9-C1290D514FF1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*",
- "matchCriteriaId": "F4E2C88B-42EA-4F4F-B1F6-A9332EC6888B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*",
- "matchCriteriaId": "2449D13B-3314-4182-832F-03F6B11AA31F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*",
- "matchCriteriaId": "9A35B66C-F050-4462-A58E-FEE061B5582E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*",
- "matchCriteriaId": "1B551164-0167-49BB-A3AE-4034BDA3DCB4"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*",
- "matchCriteriaId": "7244278E-49B6-4405-A14C-F3540C8F5AF8"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*",
- "matchCriteriaId": "B4C3E4B8-7274-4ABB-B7CE-6A39C183CE18"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*",
- "matchCriteriaId": "6501EDB9-4847-47F8-90EE-B295626E4CDC"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*",
- "matchCriteriaId": "2D676D48-7521-45E2-8563-6B966FF86A35"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*",
- "matchCriteriaId": "3B69FA17-0AB9-4986-A5A7-2A4C1DD24222"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*",
- "matchCriteriaId": "7BC35593-96C7-41F0-B738-1568F8129121"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*",
- "matchCriteriaId": "38D23794-0E7C-4FA5-A7A8-CF940E3FA962"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*",
- "matchCriteriaId": "008E1E7D-4C20-4560-9288-EF532ADB0029"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*",
- "matchCriteriaId": "3B3A7044-A92E-47A9-A7BD-35E5B575F5FD"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*",
- "matchCriteriaId": "783E2980-B6AB-489E-B157-B6A2E10A32CA"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
- "matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
- "matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
- "matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
- "matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
- "matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
- "matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
- "matchCriteriaId": "6192FE84-4D53-40D4-AF61-78CE7136141A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
- "matchCriteriaId": "42FEF3CF-1302-45EB-89CC-3786FE4BAC1F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
- "matchCriteriaId": "AE6A6B58-2C89-4DE4-BA57-78100818095C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
- "matchCriteriaId": "1D467F87-2F13-4D26-9A93-E0BA526FEA24"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "FE348F7B-02DE-47D5-8011-F83DA9426021"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "E91594EA-F0A3-41B3-A9C6-F7864FC2F229"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "9E1ECCDB-0208-48F6-B44F-16CC0ECE3503"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "FBA8B5DE-372E-47E0-A0F6-BE286D509CC3"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "19D69A49-5290-4C5F-8157-719AD58D253D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "290BD969-42E7-47B0-B21B-06DE4865432C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "018434C9-E75F-45CB-A169-DAB4B1D864D7"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "C123C844-F6D7-471E-A62E-F756042FB1CD"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "A11C38BB-7FA2-49B0-AAC9-83DB387A06DB"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
- "matchCriteriaId": "61F3733C-E5F6-4855-B471-DF3FB823613B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
- "matchCriteriaId": "1DDCA75F-9A06-4457-9A45-38A38E7F7086"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
- "matchCriteriaId": "7AEA837E-7864-4003-8DB7-111ED710A7E1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
- "matchCriteriaId": "B6FE471F-2D1F-4A1D-A197-7E46B75787E1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
- "matchCriteriaId": "FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
- "matchCriteriaId": "DC6B8DB3-B05B-41A2-B091-342D66AAE8F5"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
- "matchCriteriaId": "958F0FF8-33EF-4A71-A0BD-572C85211DBA"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
- "matchCriteriaId": "FBA39F48-B02F-4C48-B304-DA9CCA055244"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
- "matchCriteriaId": "1FF841F3-48A7-41D7-9C45-A8170435A5EB"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
- "matchCriteriaId": "EF506916-A6DC-4B1E-90E5-959492AF55F4"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
- "matchCriteriaId": "B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
- "matchCriteriaId": "4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
- "matchCriteriaId": "F571CC8B-B212-4553-B463-1DB01D616E8A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
- "matchCriteriaId": "84E3E151-D437-48ED-A529-731EEFF88567"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
- "matchCriteriaId": "E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
- "matchCriteriaId": "F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
- "matchCriteriaId": "3CE3A80D-9648-43CC-8F99-D741ED6552BF"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
- "matchCriteriaId": "C8A98C03-A465-41B4-A551-A26FEC7FFD94"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
- "matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
- "matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
- "matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
- "matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
- "matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
- "matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
- "matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "916E97D4-1FAB-42F5-826B-653B1C0909A8"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "33FD2217-C5D0-48C1-AD74-3527127FEF9C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "2E92971F-B629-4E0A-9A50-8B235F9704B8"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "EDD3A069-3829-4EE2-9D5A-29459F29D4C1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "A4A0964C-CEB2-41D7-A69C-1599B05B6171"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "0F960FA6-F904-4A4E-B483-44C70090E9A1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
- "matchCriteriaId": "261C1B41-C9E0-414F-8368-51C0C0B8AD38"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
- "matchCriteriaId": "5CCA261D-2B97-492F-89A0-5F209A804350"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
- "matchCriteriaId": "1B1C0C68-9194-473F-BE5E-EC7F184899FA"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
- "matchCriteriaId": "D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
- "matchCriteriaId": "16038328-9399-4B85-B777-BA4757D02C9B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
- "matchCriteriaId": "16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
- "matchCriteriaId": "E8CB5481-5EAE-401E-BD7E-D3095CCA9E94"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
- "matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
- "matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
- "matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
- "matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
- "matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
- "matchCriteriaId": "B6FAA052-0B2B-40CE-8C98-919B8D08A5ED"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
- "matchCriteriaId": "4B5A53DE-9C83-4A6B-96F3-23C03BF445D9"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
- "matchCriteriaId": "063EB879-CB05-4E33-AA90-9E43516839B5"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
- "matchCriteriaId": "2D25764F-4B02-4C65-954E-8C7D6632DE00"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
- "matchCriteriaId": "F31F5BF3-CD0A-465C-857F-273841BCD28A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
- "matchCriteriaId": "FF302C8A-079B-42B9-B455-CD9083BFA067"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
- "matchCriteriaId": "744999C0-33D3-4363-B3DB-E0D02CDD3918"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*",
- "matchCriteriaId": "C2E77A76-2A60-45D8-9337-867BC22C5110"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*",
- "matchCriteriaId": "C9F4AAE7-C870-46B7-B559-2949737BE777"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*",
- "matchCriteriaId": "20FA2824-20B0-48B8-BB0A-4904C1D3E8AA"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*",
- "matchCriteriaId": "9F9B347E-61AC-419F-9701-B862BBFA46F2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*",
- "matchCriteriaId": "989F351C-8B7C-4C1B-AFA2-AE9431576368"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*",
- "matchCriteriaId": "8D22172A-9FA7-42E0-8451-165D8E47A573"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*",
- "matchCriteriaId": "CE31624C-94F9-45D8-9B4A-D0028F10602F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*",
- "matchCriteriaId": "70967A83-28F6-4568-9ADA-6EF232E5BBC2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "962B0C45-AB29-4383-AC16-C6E8245D0FF7"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "ECC66968-06F0-4874-A95A-A292C36E45C1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "5FE986E6-1068-4E1B-8EAB-DF1EAF32B4E3"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "543E8536-1A8E-4E76-B89F-1B1F9F26FAB8"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "EC2B45E3-31E1-4B46-85FA-3A84E75B8F84"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "DDB8CC75-D3EE-417C-A83D-CB6D666FE595"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "09A072F1-7BEE-4236-ACBB-55DB8FEF4A03"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "E19D5A58-17D6-4502-A57A-70B2F84817A4"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "D58BA035-1204-4DFA-98A1-12111FB6222E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "A17F2E87-8EB8-476A-B5B5-9AE5CF53D9FE"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "A8CCC101-5852-4299-9B67-EA1B149D58C0"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "B8074D32-C252-4AD3-A579-1C5EDDD7014B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "962AA802-8179-4606-AAC0-9363BAEABC9F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "1286C858-D5A2-45F3-86D1-E50FE53FB23C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "5AC4A13E-F560-4D01-98A3-E2A2B82EB25B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "942C462A-5398-4BB9-A792-598682E1FEF2"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "B852F7E0-0282-483D-BB4D-18CB7A4F1392"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "53ED9A31-99CC-41C8-8B72-5B2A9B49AA6C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "EFD646BC-62F7-47CF-B0BE-768F701F7D9A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "F43D418E-87C1-4C83-9FF1-4F45B4F452DD"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "680D0E00-F29A-487C-8770-8E7EAC672B7C"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "2DCA96A4-A836-4E94-A39C-3AD3EA1D9611"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "753C05E3-B603-4E36-B9BA-FAEDCBF62A7D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "E385C2E0-B9F1-4564-8E6D-56FD9E762405"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "041335D4-05E1-4004-9381-28AAD5994B47"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "370F2AE5-3DBC-46B9-AC70-F052C9229C00"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "7A971BE3-259D-4494-BBC5-12793D92DB57"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "8E4719A6-FDEA-4714-A830-E23A52AE90BC"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "1A6E41FB-38CE-49F2-B796-9A5AA648E73F"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "93523FE1-5993-46CB-9299-7C8C1A04E873"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "27ADC356-6BE9-43A3-9E0B-393DC4B1559A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "4F543D23-1774-4D14-A7D1-AD49EDEA94DD"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "FC323F58-CA00-4C3C-BA4D-CC2C0A6E5F43"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "FEA0B2E3-668D-40ED-9D3D-709EB6449F8D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "3431B258-4EC8-4E7F-87BB-4D934880601E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "1B09FA1E-8B28-4F2A-BA7E-8E1C40365970"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "91917120-9D68-41C0-8B5D-85C256BC6200"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "AAD268A0-096C-4C31-BEC5-D47F5149D462"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "32BD2427-C47F-4660-A1D9-448E500EF5B9"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "02048CE5-81C7-4DFB-BC40-CE4C86B7E022"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "934D2B37-0575-4A75-B00B-0028316D6DF0"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*",
- "matchCriteriaId": "06754C21-995C-4850-A4DC-F21826C0F8C5"
+ "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:-:*:*:*:*:*:*",
+ "matchCriteriaId": "526A1838-B777-4270-82B2-E8BC398CB046"
},
{
"vulnerable": true,
@@ -1220,136 +98,43 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "3A9E0457-53C9-44DD-ACFB-31EE1D1E060E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.8.6",
+ "versionEndExcluding": "3.9",
+ "matchCriteriaId": "0E995DC9-9601-451D-827F-FBB0F55E5F32"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*",
- "matchCriteriaId": "BEE406E7-87BA-44BA-BF61-673E6CC44A2F"
+ "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "42633FF9-FB0C-4095-B4A1-8D623A98683B"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*",
- "matchCriteriaId": "29FBA173-658F-45DC-8205-934CACD67166"
+ "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*",
+ "matchCriteriaId": "08C04619-89A2-4B15-82A2-48BCC662C1F1"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*",
- "matchCriteriaId": "139700F0-BA32-40CF-B9DF-C9C450384FDE"
+ "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*",
+ "matchCriteriaId": "5B039196-7159-476C-876A-C61242CC41DA"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "E578085C-3968-4543-BEBA-EE3C3CB4FA02"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "4DCFA441-68FB-4559-A245-FF0B79DE43CA"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "8C2508D8-6571-4B81-A0D7-E494CCD039CE"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "8B516926-5E86-4C0A-85F3-F64E1FCDA249"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "069D774D-79BE-479F-BF4E-F021AD808114"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "D15B27A9-46E0-4DDF-A00C-29F8F1F18D73"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "A381BB4A-28B4-4672-87EE-91B3DDD6C71A"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "922F80CF-937D-4FA2-AFF2-6E47FFE9E1E9"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "A548ADF4-9E3B-407C-A5ED-05150EB3A185"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "9C623230-4497-41B9-9BD2-7A6CFDD77983"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "C72FA8A6-60A6-4486-A245-7BEF8B2A2711"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "0A498D90-BB99-405E-9FA6-1FBFE179787E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "D0D32776-8ADB-4E79-846A-C0C99FED19E0"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "B7D01673-D13F-487F-81B6-1279C187277E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*",
- "matchCriteriaId": "ADB27A3E-78E4-40F7-9716-A1099B0D85FB"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*",
- "matchCriteriaId": "16E7136A-A8A6-4BF5-AF5D-AFB5C7A10712"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "6FE127AC-E61D-427A-B998-D60DF5AABA21"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*",
- "matchCriteriaId": "3819FF99-AEC5-4466-8542-D395419E4308"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*",
- "matchCriteriaId": "E621FA1A-464B-4D2A-A0D6-EDA475A3709B"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*",
- "matchCriteriaId": "B760B422-EA11-43AB-B6D2-CA54E7229663"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "D2CA7BBC-917C-4F31-A442-465C30444836"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "AE778000-4FD5-4032-86CE-5930EF4CB7C1"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*",
- "matchCriteriaId": "B3344EEB-F037-48FE-81DC-67F6384F7D9A"
+ "criteria": "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*",
+ "matchCriteriaId": "3A9E0457-53C9-44DD-ACFB-31EE1D1E060E"
}
]
}
@@ -1359,29 +144,42 @@
"references": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d661684cf6820331feae71146c35da83d794467e",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2013/09/05/3",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
+ "Mailing List",
"Patch"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-1995-1",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.ubuntu.com/usn/USN-1998-1",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1004736",
"source": "secalert@redhat.com",
"tags": [
"Exploit",
+ "Issue Tracking",
"Patch"
]
},
diff --git a/CVE-2013/CVE-2013-45xx/CVE-2013-4584.json b/CVE-2013/CVE-2013-45xx/CVE-2013-4584.json
index 1bae0c49539..1c221a5eb12 100644
--- a/CVE-2013/CVE-2013-45xx/CVE-2013-4584.json
+++ b/CVE-2013/CVE-2013-45xx/CVE-2013-4584.json
@@ -2,8 +2,8 @@
"id": "CVE-2013-4584",
"sourceIdentifier": "secalert@redhat.com",
"published": "2019-11-15T15:15:11.450",
- "lastModified": "2019-11-22T19:02:05.860",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T13:15:08.520",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,13 @@
"VDB Entry"
]
},
+ {
+ "url": "https://access.redhat.com/security/cve/cve-2013-4584",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Broken Link"
+ ]
+ },
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89184",
"source": "secalert@redhat.com",
@@ -144,6 +151,10 @@
"VDB Entry"
]
},
+ {
+ "url": "https://github.com/horms/perdition/commit/62a0ce94aeb7dd99155882956ce9e327ab914ddf",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://security-tracker.debian.org/tracker/CVE-2013-4584",
"source": "secalert@redhat.com",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125027.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125027.json
index bcb72835477..45eebaf57b6 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125027.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125027.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T16:15:08.650",
- "lastModified": "2023-01-09T15:05:52.733",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:14.350",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in Yuna Scatari TBDev up to 2.1.17 and classified as problematic. Affected by this vulnerability is the function get_user_icons of the file usersearch.php. The manipulation of the argument n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.18 is able to address this issue. The name of the patch is 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217147."
+ "value": "A vulnerability has been found in Yuna Scatari TBDev up to 2.1.17 and classified as problematic. Affected by this vulnerability is the function get_user_icons of the file usersearch.php. The manipulation of the argument n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.18 is able to address this issue. The patch is named 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217147."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125029.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125029.json
index b625d73fe15..d5b54e86bbe 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125029.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125029.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T22:15:08.637",
- "lastModified": "2023-01-12T20:05:10.673",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:14.660",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in ttskch PaginationServiceProvider up to 0.x. It has been declared as critical. This vulnerability affects unknown code of the file demo/index.php of the component demo. The manipulation of the argument sort/id leads to sql injection. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 619de478efce17ece1a3b913ab16e40651e1ea7b. It is recommended to upgrade the affected component. VDB-217150 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in ttskch PaginationServiceProvider up to 0.x. It has been declared as critical. This vulnerability affects unknown code of the file demo/index.php of the component demo. The manipulation of the argument sort/id leads to sql injection. Upgrading to version 1.0.0 is able to address this issue. The patch is identified as 619de478efce17ece1a3b913ab16e40651e1ea7b. It is recommended to upgrade the affected component. VDB-217150 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125030.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125030.json
index 55b7670dc09..b8c3266ab46 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125030.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125030.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T09:15:09.463",
- "lastModified": "2023-01-09T16:33:36.233",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:15.220",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in taoeffect Empress. Affected by this issue is some unknown functionality. The manipulation leads to use of hard-coded password. The name of the patch is 557e177d8a309d6f0f26de46efb38d43e000852d. It is recommended to apply a patch to fix this issue. VDB-217154 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, has been found in taoeffect Empress. Affected by this issue is some unknown functionality. The manipulation leads to use of hard-coded password. The patch is identified as 557e177d8a309d6f0f26de46efb38d43e000852d. It is recommended to apply a patch to fix this issue. VDB-217154 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125032.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125032.json
index 53c27009c41..05281164af6 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125032.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125032.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125032",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:09.827",
- "lastModified": "2023-01-09T17:11:56.250",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:15.700",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in porpeeranut go-with-me. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file module/frontend/add.php. The manipulation leads to sql injection. The name of the patch is b92451e4f9e85e26cf493c95ea0a69e354c35df9. It is recommended to apply a patch to fix this issue. The identifier VDB-217177 was assigned to this vulnerability."
+ "value": "A vulnerability was found in porpeeranut go-with-me. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file module/frontend/add.php. The manipulation leads to sql injection. The identifier of the patch is b92451e4f9e85e26cf493c95ea0a69e354c35df9. It is recommended to apply a patch to fix this issue. The identifier VDB-217177 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125033.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125033.json
index 1965234e480..4dda59c24cf 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125033.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125033.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125033",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:09.930",
- "lastModified": "2023-01-09T17:50:38.230",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:16.107",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in rails-cv-app. It has been rated as problematic. Affected by this issue is some unknown functionality of the file app/controllers/uploaded_files_controller.rb. The manipulation with the input ../../../etc/passwd leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The name of the patch is 0d20362af0a5f8a126f67c77833868908484a863. It is recommended to apply a patch to fix this issue. VDB-217178 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in rails-cv-app. It has been rated as problematic. Affected by this issue is some unknown functionality of the file app/controllers/uploaded_files_controller.rb. The manipulation with the input ../../../etc/passwd leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The patch is identified as 0d20362af0a5f8a126f67c77833868908484a863. It is recommended to apply a patch to fix this issue. VDB-217178 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125034.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125034.json
index 23d7c7e4732..cdb1150e1e3 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125034.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125034.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125034",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T11:15:09.963",
- "lastModified": "2023-01-09T17:20:15.007",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:16.547",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in stiiv contact_app and classified as problematic. Affected by this vulnerability is the function render of the file libs/View.php. The manipulation of the argument var leads to cross site scripting. The attack can be launched remotely. The name of the patch is 67bec33f559da9d41a1b45eb9e992bd8683a7f8c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217183."
+ "value": "A vulnerability has been found in stiiv contact_app and classified as problematic. Affected by this vulnerability is the function render of the file libs/View.php. The manipulation of the argument var leads to cross site scripting. The attack can be launched remotely. The patch is named 67bec33f559da9d41a1b45eb9e992bd8683a7f8c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217183."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125035.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125035.json
index 8beace66b32..89fcf0143fa 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125035.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125035.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T16:15:10.330",
- "lastModified": "2023-01-09T18:29:06.930",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T06:15:16.900",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in Jobs-Plugin. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. The name of the patch is b8a56718b1d42834c6ec51d9c489c5dc20471d7b. It is recommended to apply a patch to fix this issue. The identifier VDB-217189 was assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic was found in Jobs-Plugin. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. The identifier of the patch is b8a56718b1d42834c6ec51d9c489c5dc20471d7b. It is recommended to apply a patch to fix this issue. The identifier VDB-217189 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125036.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125036.json
index 745738234d2..1170ef4ab0e 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125036.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125036.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125036",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T19:15:10.280",
- "lastModified": "2023-01-09T19:01:33.070",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:09.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in drybjed ansible-ntp. Affected by this issue is some unknown functionality of the file meta/main.yml. The manipulation leads to insufficient control of network message volume. The attack can only be done within the local network. The name of the patch is ed4ca2cf012677973c220cdba36b5c60bfa0260b. It is recommended to apply a patch to fix this issue. VDB-217190 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in drybjed ansible-ntp. Affected by this issue is some unknown functionality of the file meta/main.yml. The manipulation leads to insufficient control of network message volume. The attack can only be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The patch is identified as ed4ca2cf012677973c220cdba36b5c60bfa0260b. It is recommended to apply a patch to fix this issue. VDB-217190 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125037.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125037.json
index dfe62e443db..b3fdbb2654b 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125037.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125037.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125037",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T18:15:18.787",
- "lastModified": "2023-01-09T19:01:31.350",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:10.883",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in License to Kill. This affects an unknown part of the file models/injury.rb. The manipulation of the argument name leads to sql injection. The name of the patch is cd11cf174f361c98e9b1b4c281aa7b77f46b5078. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217191."
+ "value": "A vulnerability, which was classified as critical, was found in License to Kill. This affects an unknown part of the file models/injury.rb. The manipulation of the argument name leads to sql injection. The patch is named cd11cf174f361c98e9b1b4c281aa7b77f46b5078. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217191."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125041.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125041.json
index 28eb1a36316..fecf1f62f5a 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125041.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125041.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125041",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T15:15:10.177",
- "lastModified": "2023-01-11T20:05:13.710",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.023",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in Miccighel PR-CWT. This vulnerability affects unknown code. The manipulation leads to sql injection. The name of the patch is e412127d07004668e5a213932c94807d87067a1f. It is recommended to apply a patch to fix this issue. VDB-217486 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as critical was found in Miccighel PR-CWT. This vulnerability affects unknown code. The manipulation leads to sql injection. The patch is identified as e412127d07004668e5a213932c94807d87067a1f. It is recommended to apply a patch to fix this issue. VDB-217486 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125044.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125044.json
index f6c65b98c0d..ca60043aeb1 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125044.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125044.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125044",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T20:15:18.150",
- "lastModified": "2023-01-12T02:47:06.567",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.153",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in soshtolsus wing-tight. This affects an unknown part of the file index.php. The manipulation of the argument p leads to file inclusion. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 567bc33e6ed82b0d0179c9add707ac2b257aeaf2. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217515."
+ "value": "A vulnerability, which was classified as critical, was found in soshtolsus wing-tight. This affects an unknown part of the file index.php. The manipulation of the argument p leads to file inclusion. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The patch is named 567bc33e6ed82b0d0179c9add707ac2b257aeaf2. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217515."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125045.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125045.json
index adc9dea6d7f..82e1affecb2 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125045.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125045.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125045",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T22:15:08.700",
- "lastModified": "2023-01-11T21:09:49.377",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.293",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in meol1 and classified as critical. Affected by this vulnerability is the function GetAnimal of the file opdracht4/index.php. The manipulation of the argument where leads to sql injection. The name of the patch is 82441e413f87920d1e8f866e8ef9d7f353a7c583. It is recommended to apply a patch to fix this issue. The identifier VDB-217525 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in meol1 and classified as critical. Affected by this vulnerability is the function GetAnimal of the file opdracht4/index.php. The manipulation of the argument where leads to sql injection. The identifier of the patch is 82441e413f87920d1e8f866e8ef9d7f353a7c583. It is recommended to apply a patch to fix this issue. The identifier VDB-217525 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125046.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125046.json
index 9b23c325807..824820c9ebc 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125046.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125046.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125046",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T10:15:09.437",
- "lastModified": "2023-01-12T13:53:18.657",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in Seiji42 cub-scout-tracker. This affects an unknown part of the file databaseAccessFunctions.js. The manipulation leads to sql injection. The name of the patch is b4bc1a328b1f59437db159f9d136d9ed15707e31. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217551."
+ "value": "A vulnerability, which was classified as critical, was found in Seiji42 cub-scout-tracker. This affects an unknown part of the file databaseAccessFunctions.js. The manipulation leads to sql injection. The patch is named b4bc1a328b1f59437db159f9d136d9ed15707e31. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217551."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125047.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125047.json
index 0707fd18d47..67dca631224 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125047.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125047.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125047",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T12:15:08.657",
- "lastModified": "2023-01-12T14:43:17.777",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.470",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in tbezman school-store. This affects an unknown part. The manipulation leads to sql injection. The name of the patch is 2957fc97054216d3a393f1775efd01ae2b072001. It is recommended to apply a patch to fix this issue. The identifier VDB-217557 was assigned to this vulnerability."
+ "value": "A vulnerability classified as critical has been found in tbezman school-store. This affects an unknown part. The manipulation leads to sql injection. The identifier of the patch is 2957fc97054216d3a393f1775efd01ae2b072001. It is recommended to apply a patch to fix this issue. The identifier VDB-217557 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125048.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125048.json
index 016277df7b9..fa5fc5980e1 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125048.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125048.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125048",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.670",
- "lastModified": "2023-01-12T14:50:27.587",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.560",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in kassi xingwall. This issue affects some unknown processing of the file app/controllers/oauth.js. The manipulation leads to session fixiation. The name of the patch is e9f0d509e1408743048e29d9c099d36e0e1f6ae7. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217559."
+ "value": "A vulnerability, which was classified as critical, has been found in kassi xingwall. This issue affects some unknown processing of the file app/controllers/oauth.js. The manipulation leads to session fixiation. The patch is named e9f0d509e1408743048e29d9c099d36e0e1f6ae7. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217559."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125049.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125049.json
index 925a87c5f88..96122dc205d 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125049.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125049.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125049",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.750",
- "lastModified": "2023-01-12T20:03:56.020",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.647",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in typcn Blogile. Affected is the function getNav of the file server.js. The manipulation of the argument query leads to sql injection. The name of the patch is cfec31043b562ffefe29fe01af6d3c5ed1bf8f7d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217560. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in typcn Blogile. Affected is the function getNav of the file server.js. The manipulation of the argument query leads to sql injection. The name of the patch is cfec31043b562ffefe29fe01af6d3c5ed1bf8f7d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217560. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125050.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125050.json
index 00f85e41572..c29cd67abc1 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125050.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125050.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125050",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T17:15:08.870",
- "lastModified": "2023-01-12T15:32:21.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.733",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in ScottTZhang voter-js and classified as critical. Affected by this issue is some unknown functionality of the file main.js. The manipulation leads to sql injection. The name of the patch is 6317c67a56061aeeaeed3cf9ec665fd9983d8044. It is recommended to apply a patch to fix this issue. VDB-217562 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in ScottTZhang voter-js and classified as critical. Affected by this issue is some unknown functionality of the file main.js. The manipulation leads to sql injection. The patch is identified as 6317c67a56061aeeaeed3cf9ec665fd9983d8044. It is recommended to apply a patch to fix this issue. VDB-217562 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125052.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125052.json
index d3f9dbdfe6f..86944a5de41 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125052.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125052.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125052",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T21:15:09.060",
- "lastModified": "2023-01-12T15:51:27.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.823",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in JervenBolleman sparql-identifiers and classified as critical. This issue affects some unknown processing of the file src/main/java/org/identifiers/db/RegistryDao.java. The manipulation leads to sql injection. The name of the patch is 44bb0db91c064e305b192fc73521d1dfd25bde52. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217571."
+ "value": "A vulnerability was found in JervenBolleman sparql-identifiers and classified as critical. This issue affects some unknown processing of the file src/main/java/org/identifiers/db/RegistryDao.java. The manipulation leads to sql injection. The patch is named 44bb0db91c064e305b192fc73521d1dfd25bde52. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217571."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125053.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125053.json
index 9d79430f1a9..f9ca5612a70 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125053.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125053.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T23:15:09.483",
- "lastModified": "2023-01-12T15:27:02.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.910",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Piwigo-Guest-Book up to 1.3.0. It has been declared as critical. This vulnerability affects unknown code of the file include/guestbook.inc.php of the component Navigation Bar. The manipulation of the argument start leads to sql injection. Upgrading to version 1.3.1 is able to address this issue. The name of the patch is 0cdd1c388edf15089c3a7541cefe7756e560581d. It is recommended to upgrade the affected component. VDB-217582 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Piwigo-Guest-Book up to 1.3.0. It has been declared as critical. This vulnerability affects unknown code of the file include/guestbook.inc.php of the component Navigation Bar. The manipulation of the argument start leads to sql injection. Upgrading to version 1.3.1 is able to address this issue. The patch is identified as 0cdd1c388edf15089c3a7541cefe7756e560581d. It is recommended to upgrade the affected component. VDB-217582 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125054.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125054.json
index 0dc45e5abd0..044c592aabe 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125054.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125054.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125054",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.197",
- "lastModified": "2023-01-12T16:52:05.707",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:11.993",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in koroket RedditOnRails. This vulnerability affects unknown code of the component Vote Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The name of the patch is 7f3c7407d95d532fcc342b00d68d0ea09ca71030. It is recommended to apply a patch to fix this issue. VDB-217594 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as critical was found in koroket RedditOnRails. This vulnerability affects unknown code of the component Vote Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The patch is identified as 7f3c7407d95d532fcc342b00d68d0ea09ca71030. It is recommended to apply a patch to fix this issue. VDB-217594 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125055.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125055.json
index 810415f4659..251794385f5 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125055.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125055.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125055",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.470",
- "lastModified": "2023-01-12T16:52:39.327",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.090",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in agnivade easy-scrypt. Affected is the function VerifyPassphrase of the file scrypt.go. The manipulation leads to observable timing discrepancy. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 477c10cf3b144ddf96526aa09f5fdea613f21812. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217596."
+ "value": "A vulnerability, which was classified as problematic, was found in agnivade easy-scrypt. Affected is the function VerifyPassphrase of the file scrypt.go. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 477c10cf3b144ddf96526aa09f5fdea613f21812. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217596."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125056.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125056.json
index 95b588169dd..96e318730a5 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125056.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125056.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125056",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T10:15:08.753",
- "lastModified": "2023-01-12T16:38:16.960",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.180",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Pylons horus and classified as problematic. Affected by this issue is some unknown functionality of the file horus/flows/local/services.py. The manipulation leads to observable timing discrepancy. The name of the patch is fd56ccb62ce3cbdab0484fe4f9c25c4eda6c57ec. It is recommended to apply a patch to fix this issue. VDB-217598 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Pylons horus and classified as problematic. Affected by this issue is some unknown functionality of the file horus/flows/local/services.py. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitation is known to be difficult. The patch is identified as fd56ccb62ce3cbdab0484fe4f9c25c4eda6c57ec. It is recommended to apply a patch to fix this issue. VDB-217598 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125057.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125057.json
index ffa3036cca2..6151dcca5b1 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125057.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125057.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T10:15:09.260",
- "lastModified": "2023-01-12T20:03:21.313",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.270",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in mrobit robitailletheknot. It has been classified as problematic. This affects an unknown part of the file app/filters.php of the component CSRF Token Handler. The manipulation of the argument _token leads to incorrect comparison. It is possible to initiate the attack remotely. The name of the patch is 6b2813696ccb88d0576dfb305122ee880eb36197. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217599."
+ "value": "A vulnerability was found in mrobit robitailletheknot. It has been classified as problematic. This affects an unknown part of the file app/filters.php of the component CSRF Token Handler. The manipulation of the argument _token leads to incorrect comparison. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6b2813696ccb88d0576dfb305122ee880eb36197. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217599."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125058.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125058.json
index d8198835c63..f5221fb5693 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125058.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125058.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T11:15:08.787",
- "lastModified": "2023-01-12T16:44:31.060",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.353",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in LearnMeSomeCodes project3 and classified as critical. This issue affects the function search_first_name of the file search.rb. The manipulation leads to sql injection. The name of the patch is d3efa17ae9f6b2fc25a6bbcf165cefed17c7035e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217607. NOTE: Maintainer is aware of this issue as remarked in the source code."
+ "value": "A vulnerability was found in LearnMeSomeCodes project3 and classified as critical. This issue affects the function search_first_name of the file search.rb. The manipulation leads to sql injection. The patch is named d3efa17ae9f6b2fc25a6bbcf165cefed17c7035e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217607. NOTE: Maintainer is aware of this issue as remarked in the source code."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125059.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125059.json
index df64a997530..bb6cae70a9b 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125059.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125059.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.040",
- "lastModified": "2023-01-12T20:10:02.080",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.437",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in sternenseemann sternenblog. This issue affects the function blog_index of the file main.c. The manipulation of the argument post_path leads to file inclusion. The attack may be initiated remotely. Upgrading to version 0.1.0 is able to address this issue. The name of the patch is cf715d911d8ce17969a7926dea651e930c27e71a. It is recommended to upgrade the affected component. The identifier VDB-217613 was assigned to this vulnerability. NOTE: This case is rather theoretical and probably won't happen. Maybe only on obscure Web servers."
+ "value": "A vulnerability, which was classified as problematic, has been found in sternenseemann sternenblog. This issue affects the function blog_index of the file main.c. The manipulation of the argument post_path leads to file inclusion. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 0.1.0 is able to address this issue. The identifier of the patch is cf715d911d8ce17969a7926dea651e930c27e71a. It is recommended to upgrade the affected component. The identifier VDB-217613 was assigned to this vulnerability. NOTE: This case is rather theoretical and probably won't happen. Maybe only on obscure Web servers."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125060.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125060.json
index e19339d5122..2a88e64e04f 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125060.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125060.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125060",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.127",
- "lastModified": "2023-01-12T17:52:00.313",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.527",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in holdennb CollabCal. Affected is the function handleGet of the file calenderServer.cpp. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The name of the patch is b80f6d1893607c99e5113967592417d0fe310ce6. It is recommended to apply a patch to fix this issue. VDB-217614 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, was found in holdennb CollabCal. Affected is the function handleGet of the file calenderServer.cpp. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The patch is identified as b80f6d1893607c99e5113967592417d0fe310ce6. It is recommended to apply a patch to fix this issue. VDB-217614 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125061.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125061.json
index 3063a4f07c2..61cbcdc6fd6 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125061.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125061.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.210",
- "lastModified": "2023-01-12T18:13:13.230",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.613",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in peel filebroker and classified as critical. Affected by this issue is the function select_transfer_status_desc of the file lib/common.rb. The manipulation leads to sql injection. The name of the patch is 91097e26a6c84d3208a351afaa52e0f62e5853ef. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217616. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in peel filebroker and classified as critical. Affected by this issue is the function select_transfer_status_desc of the file lib/common.rb. The manipulation leads to sql injection. The name of the patch is 91097e26a6c84d3208a351afaa52e0f62e5853ef. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217616. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125062.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125062.json
index e9e4c3f1dfc..8c875e8d826 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125062.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125062.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T17:15:09.347",
- "lastModified": "2023-01-12T19:03:37.737",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.700",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in ananich bitstorm. Affected by this vulnerability is an unknown functionality of the file announce.php. The manipulation of the argument event leads to sql injection. The name of the patch is ea8da92f94cdb78ee7831e1f7af6258473ab396a. It is recommended to apply a patch to fix this issue. The identifier VDB-217621 was assigned to this vulnerability."
+ "value": "A vulnerability classified as critical was found in ananich bitstorm. Affected by this vulnerability is an unknown functionality of the file announce.php. The manipulation of the argument event leads to sql injection. The identifier of the patch is ea8da92f94cdb78ee7831e1f7af6258473ab396a. It is recommended to apply a patch to fix this issue. The identifier VDB-217621 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125063.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125063.json
index 9a72b2a8272..6ef2047cb95 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125063.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125063.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125063",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T19:15:09.167",
- "lastModified": "2023-01-12T20:32:29.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.780",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in ada-l0velace Bid and classified as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The name of the patch is abd71140b8219fa8741d0d8a57ab27d5bfd34222. It is recommended to apply a patch to fix this issue. The identifier VDB-217625 was assigned to this vulnerability."
+ "value": "A vulnerability was found in ada-l0velace Bid and classified as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The identifier of the patch is abd71140b8219fa8741d0d8a57ab27d5bfd34222. It is recommended to apply a patch to fix this issue. The identifier VDB-217625 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125067.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125067.json
index 984111c1e34..41023d4db72 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125067.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125067.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:11.433",
- "lastModified": "2023-01-12T17:27:08.113",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.880",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in corincerami curiosity. Affected by this vulnerability is an unknown functionality of the file app/controllers/image_controller.rb. The manipulation of the argument sol leads to sql injection. The name of the patch is d64fddd74ca72714e73f4efe24259ca05c8190eb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217639."
+ "value": "A vulnerability classified as critical was found in corincerami curiosity. Affected by this vulnerability is an unknown functionality of the file app/controllers/image_controller.rb. The manipulation of the argument sol leads to sql injection. The patch is named d64fddd74ca72714e73f4efe24259ca05c8190eb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217639."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125068.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125068.json
index 922fe563717..2f2b18171c8 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125068.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125068.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125068",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T11:15:09.917",
- "lastModified": "2023-01-12T16:48:03.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:12.967",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in saxman maps-js-icoads and classified as critical. This issue affects some unknown processing of the file http-server.js. The manipulation leads to path traversal. The name of the patch is 34b8b0cce2807b119f4cffda2ac48fc8f427d69a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217643."
+ "value": "A vulnerability was found in saxman maps-js-icoads and classified as critical. This issue affects some unknown processing of the file http-server.js. The manipulation leads to path traversal. The patch is named 34b8b0cce2807b119f4cffda2ac48fc8f427d69a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217643."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json
index 6dc64e00f96..bb29d77c35e 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T18:15:09.917",
- "lastModified": "2023-01-12T22:25:48.720",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:13.060",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in yanheven console and classified as problematic. Affected by this vulnerability is the function get_zone_hosts/AvailabilityZonesTable of the file openstack_dashboard/dashboards/admin/aggregates/tables.py. The manipulation leads to cross site scripting. The attack can be launched remotely. The name of the patch is ba908ae88d5925f4f6783eb234cc4ea95017472b. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217651."
+ "value": "A vulnerability has been found in yanheven console and classified as problematic. Affected by this vulnerability is the function get_zone_hosts/AvailabilityZonesTable of the file openstack_dashboard/dashboards/admin/aggregates/tables.py. The manipulation leads to cross site scripting. The attack can be launched remotely. The patch is named ba908ae88d5925f4f6783eb234cc4ea95017472b. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217651."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json
index 4251c154881..dbff0cbab5b 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125072",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T22:15:09.873",
- "lastModified": "2023-01-13T06:48:47.090",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:13.170",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in CherishSin klattr. This affects an unknown part. The manipulation leads to sql injection. The name of the patch is f8e4ecfbb83aef577011b0b4aebe96fb6ec557f1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217719."
+ "value": "A vulnerability classified as critical has been found in CherishSin klattr. This affects an unknown part. The manipulation leads to sql injection. The patch is named f8e4ecfbb83aef577011b0b4aebe96fb6ec557f1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217719."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json
index ab669f565ea..79e4fa65e83 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125073",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-10T16:15:10.657",
- "lastModified": "2023-01-14T21:28:10.233",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:13.257",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in mapoor voteapp. It has been rated as critical. Affected by this issue is the function create_poll/do_poll/show_poll/show_refresh of the file app.py. The manipulation leads to sql injection. The name of the patch is b290c21a0d8bcdbd55db860afd3cadec97388e72. It is recommended to apply a patch to fix this issue. VDB-217790 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in mapoor voteapp. It has been rated as critical. Affected by this issue is the function create_poll/do_poll/show_poll/show_refresh of the file app.py. The manipulation leads to sql injection. The patch is identified as b290c21a0d8bcdbd55db860afd3cadec97388e72. It is recommended to apply a patch to fix this issue. VDB-217790 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125074.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125074.json
index ce36bf477e1..76ba533980a 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125074.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125074.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125074",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T15:15:08.877",
- "lastModified": "2023-01-19T14:41:35.320",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:13.347",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Nayshlok Voyager. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file Voyager/src/models/DatabaseAccess.java. The manipulation leads to sql injection. The name of the patch is f1249f438cd8c39e7ef2f6c8f2ab76b239a02fae. It is recommended to apply a patch to fix this issue. The identifier VDB-218005 was assigned to this vulnerability."
+ "value": "A vulnerability was found in Nayshlok Voyager. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file Voyager/src/models/DatabaseAccess.java. The manipulation leads to sql injection. The identifier of the patch is f1249f438cd8c39e7ef2f6c8f2ab76b239a02fae. It is recommended to apply a patch to fix this issue. The identifier VDB-218005 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125075.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125075.json
index 94dad6c9da3..35fb9dd4288 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125075.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125075.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T19:15:09.013",
- "lastModified": "2023-01-18T19:16:11.000",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:13.447",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in gmail-servlet and classified as critical. This issue affects the function search of the file src/Model.java. The manipulation leads to sql injection. The name of the patch is 5d72753c2e95bb373aa86824939397dc25f679ea. It is recommended to apply a patch to fix this issue. The identifier VDB-218021 was assigned to this vulnerability."
+ "value": "A vulnerability was found in gmail-servlet and classified as critical. This issue affects the function search of the file src/Model.java. The manipulation leads to sql injection. The identifier of the patch is 5d72753c2e95bb373aa86824939397dc25f679ea. It is recommended to apply a patch to fix this issue. The identifier VDB-218021 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json
index af868dc1e24..d65ef799b15 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T19:15:09.160",
- "lastModified": "2023-01-18T18:33:54.667",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:13.527",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in NoxxieNl Criminals. It has been classified as critical. Affected is an unknown function of the file ingame/roulette.php. The manipulation of the argument gambleMoney leads to sql injection. The name of the patch is 0a60b31271d4cbf8babe4be993d2a3a1617f0897. It is recommended to apply a patch to fix this issue. VDB-218022 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in NoxxieNl Criminals. It has been classified as critical. Affected is an unknown function of the file ingame/roulette.php. The manipulation of the argument gambleMoney leads to sql injection. The patch is identified as 0a60b31271d4cbf8babe4be993d2a3a1617f0897. It is recommended to apply a patch to fix this issue. VDB-218022 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json
index d93d7bd7314..a03c7f88262 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T09:15:13.613",
- "lastModified": "2023-01-24T16:20:02.247",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:13.613",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in pointhi searx_stats. This issue affects some unknown processing of the file cgi/cron.php. The manipulation leads to sql injection. The name of the patch is 281bd679a4474ddb222d16c1c380f252839cc18f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218351."
+ "value": "A vulnerability, which was classified as critical, has been found in pointhi searx_stats. This issue affects some unknown processing of the file cgi/cron.php. The manipulation leads to sql injection. The patch is named 281bd679a4474ddb222d16c1c380f252839cc18f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218351."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json
index eaf026e72a8..eaae500c0ef 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T09:15:13.693",
- "lastModified": "2023-01-24T15:19:37.107",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:13.720",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in yanheven console and classified as problematic. Affected by this issue is some unknown functionality of the file horizon/static/horizon/js/horizon.instances.js. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 32a7b713468161282f2ea01d5e2faff980d924cd. It is recommended to apply a patch to fix this issue. VDB-218354 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in yanheven console and classified as problematic. Affected by this issue is some unknown functionality of the file horizon/static/horizon/js/horizon.instances.js. The manipulation leads to cross site scripting. The attack may be launched remotely. The patch is identified as 32a7b713468161282f2ea01d5e2faff980d924cd. It is recommended to apply a patch to fix this issue. VDB-218354 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json
index acae138c453..3faf659751e 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125080",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T18:15:10.147",
- "lastModified": "2023-01-24T19:12:56.057",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:13.827",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in frontaccounting faplanet and classified as critical. This vulnerability affects unknown code. The manipulation leads to path traversal. The name of the patch is a5dcd87f46080a624b1a9ad4b0dd035bbd24ac50. It is recommended to apply a patch to fix this issue. VDB-218398 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in frontaccounting faplanet and classified as critical. This vulnerability affects unknown code. The manipulation leads to path traversal. The patch is identified as a5dcd87f46080a624b1a9ad4b0dd035bbd24ac50. It is recommended to apply a patch to fix this issue. VDB-218398 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125081.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125081.json
index 159da6f4c9c..8fbb9dbfc69 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125081.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125081.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125081",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T23:15:15.173",
- "lastModified": "2023-01-24T19:33:34.970",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:13.920",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in risheesh debutsav. This issue affects some unknown processing. The manipulation leads to sql injection. The name of the patch is 7a8430df79277c613449262201cc792db894fc76. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218459."
+ "value": "A vulnerability, which was classified as critical, has been found in risheesh debutsav. This issue affects some unknown processing. The manipulation leads to sql injection. The patch is named 7a8430df79277c613449262201cc792db894fc76. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218459."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json
index 7c2b2270e59..47981162897 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125083",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T10:15:11.490",
- "lastModified": "2023-01-25T21:41:10.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:14.033",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in Anant Labs google-enterprise-connector-dctm up to 3.2.3 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument username/domain leads to sql injection. The name of the patch is 6fba04f18ab7764002a1da308e7cd9712b501cb7. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218911."
+ "value": "A vulnerability has been found in Anant Labs google-enterprise-connector-dctm up to 3.2.3 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument username/domain leads to sql injection. The patch is named 6fba04f18ab7764002a1da308e7cd9712b501cb7. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218911."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125084.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125084.json
index 234103b914e..d9f6af1e387 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125084.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125084.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T00:15:08.823",
- "lastModified": "2023-02-12T04:56:27.573",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:14.130",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in Gimmie Plugin 1.2.2. This issue affects some unknown processing of the file trigger_referral.php. The manipulation of the argument referrername leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The name of the patch is 7194a09353dd24a274678383a4418f2fd3fce6f7. It is recommended to upgrade the affected component. The identifier VDB-220205 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, has been found in Gimmie Plugin 1.2.2 on vBulletin. This issue affects some unknown processing of the file trigger_referral.php. The manipulation of the argument referrername leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The identifier of the patch is 7194a09353dd24a274678383a4418f2fd3fce6f7. It is recommended to upgrade the affected component. The identifier VDB-220205 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125085.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125085.json
index 20bbdb14c80..1528df1e9c9 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125085.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125085.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T00:15:08.913",
- "lastModified": "2023-02-12T04:55:52.127",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:14.233",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in Gimmie Plugin 1.2.2. Affected is an unknown function of the file trigger_ratethread.php. The manipulation of the argument t/postusername leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The name of the patch is f11a136e9cbd24997354965178728dc22a2aa2ed. It is recommended to upgrade the affected component. VDB-220206 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, was found in Gimmie Plugin 1.2.2 on vBulletin. Affected is an unknown function of the file trigger_ratethread.php. The manipulation of the argument t/postusername leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The patch is identified as f11a136e9cbd24997354965178728dc22a2aa2ed. It is recommended to upgrade the affected component. VDB-220206 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125086.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125086.json
index 2e30fb87161..aa973f1d29a 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125086.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125086.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125086",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T04:15:07.927",
- "lastModified": "2023-02-12T04:55:20.033",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T07:15:14.340",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in Gimmie Plugin 1.2.2 and classified as critical. Affected by this vulnerability is an unknown functionality of the file trigger_login.php. The manipulation of the argument userid leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The name of the patch is fe851002d20a8d6196a5abb68bafec4102964d5b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220207."
+ "value": "A vulnerability has been found in Gimmie Plugin 1.2.2 on vBulletin and classified as critical. Affected by this vulnerability is an unknown functionality of the file trigger_login.php. The manipulation of the argument userid leads to sql injection. Upgrading to version 1.3.0 is able to address this issue. The patch is named fe851002d20a8d6196a5abb68bafec4102964d5b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220207."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125089.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125089.json
index b74e1f8065a..a237329348d 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125089.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125089.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125089",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T03:15:10.637",
- "lastModified": "2023-03-02T23:16:24.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:08.377",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in cention-chatserver 3.8.0-rc1. It has been declared as problematic. Affected by this vulnerability is the function _formatBody of the file lib/InternalChatProtocol.fe. The manipulation of the argument body leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.9 is able to address this issue. The name of the patch is c4c0258bbd18f6915f97f91d5fee625384096a26. It is recommended to upgrade the affected component. The identifier VDB-221497 was assigned to this vulnerability."
+ "value": "A vulnerability was found in cention-chatserver 3.8.0-rc1. It has been declared as problematic. Affected by this vulnerability is the function _formatBody of the file lib/InternalChatProtocol.fe. The manipulation of the argument body leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.9 is able to address this issue. The identifier of the patch is c4c0258bbd18f6915f97f91d5fee625384096a26. It is recommended to upgrade the affected component. The identifier VDB-221497 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125090.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125090.json
index aa1329f9242..1892f3d0fe7 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125090.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125090.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125090",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-04T20:15:09.977",
- "lastModified": "2023-03-09T20:51:45.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:08.480",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Media Downloader Plugin 0.1.992. It has been declared as problematic. This vulnerability affects the function dl_file_resumable of the file getfile.php. The manipulation of the argument file leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.1.993 is able to address this issue. The name of the patch is 77beb720c682b9300035ab5f96eee225181d8a92. It is recommended to upgrade the affected component. VDB-222262 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Media Downloader Plugin 0.1.992 on WordPress. It has been declared as problematic. This vulnerability affects the function dl_file_resumable of the file getfile.php. The manipulation of the argument file leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.1.993 is able to address this issue. The patch is identified as 77beb720c682b9300035ab5f96eee225181d8a92. It is recommended to upgrade the affected component. VDB-222262 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125091.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125091.json
index 46870cf2ff3..cf7709f1c33 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125091.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125091.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125091",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-04T22:15:09.510",
- "lastModified": "2023-03-09T20:48:50.627",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:08.560",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in codepeople cp-polls Plugin 1.0.1 and classified as critical. This vulnerability affects unknown code of the file cp-admin-int-message-list.inc.php. The manipulation of the argument lu leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.0.2 is able to address this issue. The name of the patch is 6d7168cbf12d1c183bacc5cd5678f6f5b0d518d2. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222268."
+ "value": "A vulnerability has been found in codepeople cp-polls Plugin 1.0.1 on WordPress and classified as critical. This vulnerability affects unknown code of the file cp-admin-int-message-list.inc.php. The manipulation of the argument lu leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.0.2 is able to address this issue. The name of the patch is 6d7168cbf12d1c183bacc5cd5678f6f5b0d518d2. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222268."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125092.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125092.json
index ce1592d7444..c330278e996 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125092.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125092.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125092",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T21:15:09.840",
- "lastModified": "2023-03-09T20:52:46.467",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:08.627",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in MaxButtons Plugin up to 1.26.0 and classified as problematic. This issue affects the function maxbuttons_strip_px of the file includes/maxbuttons-button.php. The manipulation of the argument button_id leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.26.1 is able to address this issue. The name of the patch is e74564c9e3b7429808e317f4916bd1c26ef0b806. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222323."
+ "value": "A vulnerability was found in MaxButtons Plugin up to 1.26.0 on WordPress and classified as problematic. This issue affects the function maxbuttons_strip_px of the file includes/maxbuttons-button.php. The manipulation of the argument button_id leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.26.1 is able to address this issue. The patch is named e74564c9e3b7429808e317f4916bd1c26ef0b806. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222323."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125093.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125093.json
index 52cd4600546..aa3b8d2aa9a 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125093.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125093.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T02:15:58.147",
- "lastModified": "2023-03-15T16:28:43.793",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:08.693",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in Ad Blocking Detector Plugin up to 1.2.1 and classified as problematic. This vulnerability affects unknown code of the file ad-blocking-detector.php. The manipulation leads to information disclosure. The attack can be initiated remotely. Upgrading to version 1.2.2 is able to address this issue. The name of the patch is 3312b9cd79e5710d1e282fc9216a4e5ab31b3d94. It is recommended to upgrade the affected component. VDB-222610 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in Ad Blocking Detector Plugin up to 1.2.1 on WordPress and classified as problematic. This vulnerability affects unknown code of the file ad-blocking-detector.php. The manipulation leads to information disclosure. The attack can be initiated remotely. Upgrading to version 1.2.2 is able to address this issue. The patch is identified as 3312b9cd79e5710d1e282fc9216a4e5ab31b3d94. It is recommended to upgrade the affected component. VDB-222610 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125095.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125095.json
index a69e32f8236..b4c22b6253e 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125095.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125095.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125095",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-09T06:15:10.593",
- "lastModified": "2023-04-18T01:09:39.707",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:08.780",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in BestWebSoft Contact Form Plugin 1.3.4 and classified as problematic. Affected by this issue is the function bws_add_menu_render of the file bws_menu/bws_menu.php. The manipulation of the argument bwsmn_form_email leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.3.7 is able to address this issue. The name of the patch is 4d531f74b4a801c805dc80360d4ea1312e9a278f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225320."
+ "value": "A vulnerability was found in BestWebSoft Contact Form Plugin 1.3.4 on WordPress and classified as problematic. Affected by this issue is the function bws_add_menu_render of the file bws_menu/bws_menu.php. The manipulation of the argument bwsmn_form_email leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.3.7 is able to address this issue. The name of the patch is 4d531f74b4a801c805dc80360d4ea1312e9a278f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225320."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125096.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125096.json
index 4d4f5345600..2a038da8a39 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125096.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125096.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T03:15:07.040",
- "lastModified": "2023-04-13T19:51:24.907",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:08.853",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Fancy Gallery Plugin 1.5.12. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file class.options.php of the component Options Page. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.13 is able to address this issue. The name of the patch is fdf1f9e5a1ec738900f962e69c6fa4ec6055ed8d. It is recommended to upgrade the affected component. The identifier VDB-225349 was assigned to this vulnerability."
+ "value": "A vulnerability was found in Fancy Gallery Plugin 1.5.12 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file class.options.php of the component Options Page. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.13 is able to address this issue. The identifier of the patch is fdf1f9e5a1ec738900f962e69c6fa4ec6055ed8d. It is recommended to upgrade the affected component. The identifier VDB-225349 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125097.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125097.json
index d6817479265..003d6d838a6 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125097.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125097.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125097",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T04:15:07.577",
- "lastModified": "2023-04-13T20:09:39.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:08.920",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in BestWebSoft Facebook Like Button up to 2.33. Affected is the function fcbkbttn_settings_page of the file facebook-button-plugin.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.34 is able to address this issue. The name of the patch is b766da8fa100779409a953f0e46c2a2448cbe99c. It is recommended to upgrade the affected component. VDB-225354 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, was found in BestWebSoft Facebook Like Button up to 2.33. Affected is the function fcbkbttn_settings_page of the file facebook-button-plugin.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.34 is able to address this issue. The patch is identified as b766da8fa100779409a953f0e46c2a2448cbe99c. It is recommended to upgrade the affected component. VDB-225354 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125099.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125099.json
index f17087b560b..cbe0998c73e 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125099.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125099.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-20T06:15:06.867",
- "lastModified": "2023-04-29T02:54:19.860",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:08.993",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in I Recommend This Plugin up to 3.7.2 on WordPress and classified as critical. Affected by this vulnerability is an unknown functionality of the file dot-irecommendthis.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 3.7.3 is able to address this issue. The name of the patch is 058b3ef5c7577bf557557904a53ecc8599b13649. It is recommended to upgrade the affected component. The identifier VDB-226309 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in I Recommend This Plugin up to 3.7.2 on WordPress and classified as critical. Affected by this vulnerability is an unknown functionality of the file dot-irecommendthis.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 3.7.3 is able to address this issue. The identifier of the patch is 058b3ef5c7577bf557557904a53ecc8599b13649. It is recommended to upgrade the affected component. The identifier VDB-226309 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125101.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125101.json
index 7455ecf5789..7ed0959e490 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125101.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125101.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-28T13:15:09.347",
- "lastModified": "2023-06-02T18:23:01.813",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.083",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in Portfolio Gallery Plugin up to 1.1.8 on WordPress. This affects an unknown part. The manipulation leads to sql injection. It is possible to initiate the attack remotely. Upgrading to version 1.1.9 is able to address this issue. The name of the patch is 58ed88243e17df766036f4857041edaf358076d3. It is recommended to upgrade the affected component. The identifier VDB-230085 was assigned to this vulnerability."
+ "value": "A vulnerability classified as critical has been found in Portfolio Gallery Plugin up to 1.1.8 on WordPress. This affects an unknown part. The manipulation leads to sql injection. It is possible to initiate the attack remotely. Upgrading to version 1.1.9 is able to address this issue. The identifier of the patch is 58ed88243e17df766036f4857041edaf358076d3. It is recommended to upgrade the affected component. The identifier VDB-230085 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125102.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125102.json
index 0c8ad2e4550..94591961690 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125102.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125102.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-29T23:15:09.367",
- "lastModified": "2023-06-05T17:32:16.907",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.163",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in Bestwebsoft Relevant Plugin up to 1.0.7 on WordPress. Affected by this vulnerability is an unknown functionality of the component Thumbnail Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.0.8 is able to address this issue. The name of the patch is 860d1891025548cf0f5f97364c1f51a888f523c3. It is recommended to upgrade the affected component. The identifier VDB-230113 was assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic was found in Bestwebsoft Relevant Plugin up to 1.0.7 on WordPress. Affected by this vulnerability is an unknown functionality of the component Thumbnail Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.0.8 is able to address this issue. The identifier of the patch is 860d1891025548cf0f5f97364c1f51a888f523c3. It is recommended to upgrade the affected component. The identifier VDB-230113 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json
index 8b6fe350095..a2dd907226f 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125103",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T03:15:09.077",
- "lastModified": "2023-06-06T15:57:09.807",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.240",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in BestWebSoft Twitter Plugin up to 1.3.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function twttr_settings_page of the file twitter.php. The manipulation of the argument twttr_url_twitter/bws_license_key/bws_license_plugin leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.7 is able to address this issue. The name of the patch is e04d59ab578316ffeb204cf32dc71c0d0e1ff77c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230155."
+ "value": "A vulnerability was found in BestWebSoft Twitter Plugin up to 1.3.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function twttr_settings_page of the file twitter.php. The manipulation of the argument twttr_url_twitter/bws_license_key/bws_license_plugin leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.7 is able to address this issue. The patch is named e04d59ab578316ffeb204cf32dc71c0d0e1ff77c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230155."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125104.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125104.json
index 612cc4c3b57..46561830c1d 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125104.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125104.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125104",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T13:15:10.087",
- "lastModified": "2023-06-08T15:34:11.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.307",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in VaultPress Plugin up to 1.6.0 on WordPress. It has been declared as critical. Affected by this vulnerability is the function protect_aioseo_ajax of the file class.vaultpress-hotfixes.php of the component MailPoet Plugin. The manipulation leads to unrestricted upload. The attack can be launched remotely. Upgrading to version 1.6.1 is able to address this issue. The name of the patch is e3b92b14edca6291c5f998d54c90cbe98a1fb0e3. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230263."
+ "value": "A vulnerability was found in VaultPress Plugin up to 1.6.0 on WordPress. It has been declared as critical. Affected by this vulnerability is the function protect_aioseo_ajax of the file class.vaultpress-hotfixes.php of the component MailPoet Plugin. The manipulation leads to unrestricted upload. The attack can be launched remotely. Upgrading to version 1.6.1 is able to address this issue. The patch is named e3b92b14edca6291c5f998d54c90cbe98a1fb0e3. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230263."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json
index 112077ec535..55a99be192e 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json
@@ -2,12 +2,12 @@
"id": "CVE-2014-125105",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T01:15:45.637",
- "lastModified": "2023-06-09T23:49:55.907",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.387",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Broken Link Checker Plugin up to 1.10.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function options_page of the file core/core.php of the component Settings Page. The manipulation of the argument exclusion_list/blc_custom_fields leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.10.2 is able to address this issue. The name of the patch is 90615fe9b0b6f9e6fb254d503c302e53a202e561. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230659."
+ "value": "A vulnerability was found in Broken Link Checker Plugin up to 1.10.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function options_page of the file core/core.php of the component Settings Page. The manipulation of the argument exclusion_list/blc_custom_fields leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.10.2 is able to address this issue. The patch is named 90615fe9b0b6f9e6fb254d503c302e53a202e561. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230659."
},
{
"lang": "es",
diff --git a/CVE-2014/CVE-2014-35xx/CVE-2014-3577.json b/CVE-2014/CVE-2014-35xx/CVE-2014-3577.json
index dca41e4380e..02a28c335ef 100644
--- a/CVE-2014/CVE-2014-35xx/CVE-2014-3577.json
+++ b/CVE-2014/CVE-2014-35xx/CVE-2014-3577.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-3577",
"sourceIdentifier": "secalert@redhat.com",
"published": "2014-08-21T14:55:05.100",
- "lastModified": "2021-10-07T00:15:07.220",
+ "lastModified": "2023-10-27T15:15:09.487",
"vulnStatus": "Modified",
"evaluatorComment": "CWE-297: Improper Validation of Certificate with Host Mismatch",
"descriptions": [
@@ -264,6 +264,20 @@
"Third Party Advisory"
]
},
+ {
+ "url": "http://secunia.com/advisories/60589",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "http://secunia.com/advisories/60713",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
{
"url": "http://www.openwall.com/lists/oss-security/2021/10/06/1",
"source": "secalert@redhat.com"
@@ -366,6 +380,10 @@
{
"url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E",
"source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0003/",
+ "source": "secalert@redhat.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10007.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10007.json
index 14551e4fdd1..1160122d8fd 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10007.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10007.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T11:15:10.413",
- "lastModified": "2023-01-09T18:06:43.907",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.490",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in 82Flex WEIPDCRM and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 43bad79392332fa39e31b95268e76fbda9fec3a4. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217184. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in 82Flex WEIPDCRM and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is 43bad79392332fa39e31b95268e76fbda9fec3a4. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217184. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10008.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10008.json
index 26f00cd0ee5..6da82f7b7af 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10008.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10008.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T11:15:10.623",
- "lastModified": "2023-01-09T18:08:11.130",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.560",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in 82Flex WEIPDCRM. It has been classified as critical. This affects an unknown part. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The name of the patch is 43bad79392332fa39e31b95268e76fbda9fec3a4. It is recommended to apply a patch to fix this issue. The identifier VDB-217185 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in 82Flex WEIPDCRM. It has been classified as critical. This affects an unknown part. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The identifier of the patch is 43bad79392332fa39e31b95268e76fbda9fec3a4. It is recommended to apply a patch to fix this issue. The identifier VDB-217185 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10009.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10009.json
index 437fd2b1df8..d801347d30b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10009.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10009.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T16:15:10.417",
- "lastModified": "2023-01-09T18:37:55.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.623",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in nterchange up to 4.1.0. It has been rated as critical. This issue affects the function getContent of the file app/controllers/code_caller_controller.php. The manipulation of the argument q with the input %5C%27%29;phpinfo%28%29;/* leads to code injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.1 is able to address this issue. The name of the patch is fba7d89176fba8fe289edd58835fe45080797d99. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217187."
+ "value": "A vulnerability was found in nterchange up to 4.1.0. It has been rated as critical. This issue affects the function getContent of the file app/controllers/code_caller_controller.php. The manipulation of the argument q with the input %5C%27%29;phpinfo%28%29;/* leads to code injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.1 is able to address this issue. The patch is named fba7d89176fba8fe289edd58835fe45080797d99. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217187."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10010.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10010.json
index 71b71d91a14..be246baabe4 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10010.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10010.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T21:15:10.207",
- "lastModified": "2023-01-09T19:06:19.233",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.693",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in OpenDNS OpenResolve. It has been rated as problematic. Affected by this issue is the function get of the file resolverapi/endpoints.py of the component API. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is c680170d5583cd9342fe1af43001fe8b2b8004dd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217196."
+ "value": "A vulnerability was found in OpenDNS OpenResolve. It has been rated as problematic. Affected by this issue is the function get of the file resolverapi/endpoints.py of the component API. The manipulation leads to cross site scripting. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The name of the patch is c680170d5583cd9342fe1af43001fe8b2b8004dd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217196."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10011.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10011.json
index a237e6d995b..cf80e3903e2 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10011.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10011.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T22:15:15.323",
- "lastModified": "2023-01-09T19:22:02.903",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.767",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in OpenDNS OpenResolve. This affects an unknown part of the file resolverapi/endpoints.py. The manipulation leads to improper output neutralization for logs. The name of the patch is 9eba6ba5abd89d0e36a008921eb307fcef8c5311. It is recommended to apply a patch to fix this issue. The identifier VDB-217197 was assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic has been found in OpenDNS OpenResolve. This affects an unknown part of the file resolverapi/endpoints.py. The manipulation leads to improper output neutralization for logs. The identifier of the patch is 9eba6ba5abd89d0e36a008921eb307fcef8c5311. It is recommended to apply a patch to fix this issue. The identifier VDB-217197 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10012.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10012.json
index 8e73b715f4c..6647f7e340b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10012.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10012.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10012",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-03T09:15:09.707",
- "lastModified": "2023-01-10T17:14:47.097",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.840",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in sumocoders FrameworkUserBundle up to 1.3.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file Resources/views/Security/login.html.twig. The manipulation leads to information exposure through error message. Upgrading to version 1.4.0 is able to address this issue. The name of the patch is abe4993390ba9bd7821ab12678270556645f94c8. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217268. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in sumocoders FrameworkUserBundle up to 1.3.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file Resources/views/Security/login.html.twig. The manipulation leads to information exposure through error message. Upgrading to version 1.4.0 is able to address this issue. The name of the patch is abe4993390ba9bd7821ab12678270556645f94c8. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217268. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10013.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10013.json
index a5d76610081..61a39a5a0e6 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10013.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10013.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10013",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T10:15:09.100",
- "lastModified": "2023-01-11T16:16:35.363",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.917",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in WebDevStudios taxonomy-switcher Plugin up to 1.0.3. It has been classified as problematic. Affected is the function taxonomy_switcher_init of the file taxonomy-switcher.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.4 is able to address this issue. It is recommended to upgrade the affected component. VDB-217446 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in WebDevStudios taxonomy-switcher Plugin up to 1.0.3 on WordPress. It has been classified as problematic. Affected is the function taxonomy_switcher_init of the file taxonomy-switcher.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.4 is able to address this issue. It is recommended to upgrade the affected component. VDB-217446 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10014.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10014.json
index ca2a4f34c06..a65ac50e651 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10014.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10014.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T14:15:08.610",
- "lastModified": "2023-01-11T19:37:21.617",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:09.983",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in arekk uke. This affects an unknown part of the file lib/uke/finder.rb. The manipulation leads to sql injection. The name of the patch is 52fd3b2d0bc16227ef57b7b98a3658bb67c1833f. It is recommended to apply a patch to fix this issue. The identifier VDB-217485 was assigned to this vulnerability."
+ "value": "A vulnerability classified as critical has been found in arekk uke. This affects an unknown part of the file lib/uke/finder.rb. The manipulation leads to sql injection. The identifier of the patch is 52fd3b2d0bc16227ef57b7b98a3658bb67c1833f. It is recommended to apply a patch to fix this issue. The identifier VDB-217485 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10015.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10015.json
index 198b03a6fab..1f1c6d0166c 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10015.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10015.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T15:15:10.260",
- "lastModified": "2023-01-11T20:18:00.053",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.057",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in glidernet ogn-live. This issue affects some unknown processing. The manipulation leads to sql injection. The name of the patch is bc0f19965f760587645583b7624d66a260946e01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217487."
+ "value": "A vulnerability, which was classified as critical, has been found in glidernet ogn-live. This issue affects some unknown processing. The manipulation leads to sql injection. The patch is named bc0f19965f760587645583b7624d66a260946e01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217487."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10016.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10016.json
index 43713f0b348..8b861d6fcf4 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10016.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10016.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T10:15:09.917",
- "lastModified": "2023-01-12T16:14:45.353",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.120",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in jeff-kelley opensim-utils. Affected by this issue is the function DatabaseForRegion of the file regionscrits.php. The manipulation of the argument region leads to sql injection. The name of the patch is c29e5c729a833a29dbf5b1e505a0553fe154575e. It is recommended to apply a patch to fix this issue. VDB-217550 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, has been found in jeff-kelley opensim-utils. Affected by this issue is the function DatabaseForRegion of the file regionscrits.php. The manipulation of the argument region leads to sql injection. The patch is identified as c29e5c729a833a29dbf5b1e505a0553fe154575e. It is recommended to apply a patch to fix this issue. VDB-217550 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10018.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10018.json
index 26a408f0457..ee7450b1e5e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10018.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10018.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.823",
- "lastModified": "2023-01-12T20:04:09.870",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.200",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in DBRisinajumi d2files and classified as critical. Affected by this vulnerability is the function actionUpload/actionDownloadFile of the file controllers/D2filesController.php. The manipulation leads to sql injection. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is b5767f2ec9d0f3cbfda7f13c84740e2179c90574. It is recommended to upgrade the affected component. The identifier VDB-217561 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in DBRisinajumi d2files and classified as critical. Affected by this vulnerability is the function actionUpload/actionDownloadFile of the file controllers/D2filesController.php. The manipulation leads to sql injection. Upgrading to version 1.0.0 is able to address this issue. The identifier of the patch is b5767f2ec9d0f3cbfda7f13c84740e2179c90574. It is recommended to upgrade the affected component. The identifier VDB-217561 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10019.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10019.json
index 5573f7f7a94..a89aa7ea39c 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10019.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10019.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10019",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.570",
- "lastModified": "2023-01-12T16:56:05.007",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.267",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in foxoverflow MySimplifiedSQL. This issue affects some unknown processing of the file MySimplifiedSQL_Examples.php. The manipulation of the argument FirstName/LastName leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 3b7481c72786f88041b7c2d83bb4f219f77f1293. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217595."
+ "value": "A vulnerability, which was classified as problematic, has been found in foxoverflow MySimplifiedSQL. This issue affects some unknown processing of the file MySimplifiedSQL_Examples.php. The manipulation of the argument FirstName/LastName leads to cross site scripting. The attack may be initiated remotely. The patch is named 3b7481c72786f88041b7c2d83bb4f219f77f1293. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217595."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10022.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10022.json
index aedbbebbf12..84d251cc9ae 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10022.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10022.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T12:15:08.730",
- "lastModified": "2023-01-12T17:52:16.977",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.350",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in IISH nlgis2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file scripts/etl/custom_import.pl. The manipulation leads to sql injection. The name of the patch is 8bdb6fcf7209584eaf1232437f0f53e735b2b34c. It is recommended to apply a patch to fix this issue. The identifier VDB-217609 was assigned to this vulnerability."
+ "value": "A vulnerability was found in IISH nlgis2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file scripts/etl/custom_import.pl. The manipulation leads to sql injection. The identifier of the patch is 8bdb6fcf7209584eaf1232437f0f53e735b2b34c. It is recommended to apply a patch to fix this issue. The identifier VDB-217609 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10023.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10023.json
index b775f919720..28ea5bc4f9d 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10023.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10023.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T12:15:08.803",
- "lastModified": "2023-01-12T17:52:20.633",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.417",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in Fumon trello-octometric. This affects the function main of the file metrics-ui/server/srv.go. The manipulation of the argument num leads to sql injection. The name of the patch is a1f1754933fbf21e2221fbc671c81a47de6a04ef. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217611."
+ "value": "A vulnerability classified as critical has been found in Fumon trello-octometric. This affects the function main of the file metrics-ui/server/srv.go. The manipulation of the argument num leads to sql injection. The patch is named a1f1754933fbf21e2221fbc671c81a47de6a04ef. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217611."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10025.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10025.json
index 293d15f4e83..eb7a2e5b04c 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10025.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10025.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10025",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.367",
- "lastModified": "2023-01-12T18:22:29.677",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.487",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in luelista miniConf up to 1.7.6 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file miniConf/MessageView.cs of the component URL Scanning. The manipulation leads to denial of service. Upgrading to version 1.7.7 and 1.8.0 is able to address this issue. The name of the patch is c06c2e5116c306e4e1bc79779f0eda2d1182f655. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217615."
+ "value": "A vulnerability has been found in luelista miniConf up to 1.7.6 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file miniConf/MessageView.cs of the component URL Scanning. The manipulation leads to denial of service. Upgrading to version 1.7.7 and 1.8.0 is able to address this issue. The patch is named c06c2e5116c306e4e1bc79779f0eda2d1182f655. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217615."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10026.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10026.json
index 96e975c7083..d6902ac4215 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10026.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10026.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10026",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.450",
- "lastModified": "2023-01-12T18:35:53.863",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.550",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in tiredtyrant flairbot. It has been declared as critical. This vulnerability affects unknown code of the file flair.py. The manipulation leads to sql injection. The name of the patch is 5e112b68c6faad1d4699d02c1ebbb7daf48ef8fb. It is recommended to apply a patch to fix this issue. VDB-217618 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in tiredtyrant flairbot. It has been declared as critical. This vulnerability affects unknown code of the file flair.py. The manipulation leads to sql injection. The patch is identified as 5e112b68c6faad1d4699d02c1ebbb7daf48ef8fb. It is recommended to apply a patch to fix this issue. VDB-217618 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10027.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10027.json
index a09c7409c1f..0a7f6ec8267 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10027.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10027.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T17:15:09.430",
- "lastModified": "2023-01-12T20:31:23.807",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.613",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in hydrian TTRSS-Auth-LDAP. Affected by this issue is some unknown functionality of the component Username Handler. The manipulation leads to ldap injection. Upgrading to version 2.0b1 is able to address this issue. The name of the patch is a7f7a5a82d9202a5c40d606a5c519ba61b224eb8. It is recommended to upgrade the affected component. VDB-217622 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in hydrian TTRSS-Auth-LDAP. Affected by this issue is some unknown functionality of the component Username Handler. The manipulation leads to ldap injection. Upgrading to version 2.0b1 is able to address this issue. The patch is identified as a7f7a5a82d9202a5c40d606a5c519ba61b224eb8. It is recommended to upgrade the affected component. VDB-217622 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10029.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10029.json
index 1aee9f48696..fb4ddc72b3e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10029.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10029.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.147",
- "lastModified": "2023-01-12T20:07:41.200",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.687",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in kelvinmo simplexrd up to 3.1.0. This vulnerability affects unknown code of the file simplexrd/simplexrd.class.php. The manipulation leads to xml external entity reference. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 4c9f2e028523ed705b555eca2c18c64e71f1a35d. It is recommended to upgrade the affected component. VDB-217630 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic was found in kelvinmo simplexrd up to 3.1.0. This vulnerability affects unknown code of the file simplexrd/simplexrd.class.php. The manipulation leads to xml external entity reference. Upgrading to version 3.1.1 is able to address this issue. The patch is identified as 4c9f2e028523ed705b555eca2c18c64e71f1a35d. It is recommended to upgrade the affected component. VDB-217630 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10030.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10030.json
index a158413395c..98faaedd949 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10030.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10030.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:11.537",
- "lastModified": "2023-01-12T16:54:40.017",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.767",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in SUKOHI Surpass and classified as critical. This vulnerability affects unknown code of the file src/Sukohi/Surpass/Surpass.php. The manipulation of the argument dir leads to pathname traversal. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is d22337d453a2a14194cdb02bf12cdf9d9f827aa7. It is recommended to upgrade the affected component. VDB-217642 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in SUKOHI Surpass and classified as critical. This vulnerability affects unknown code of the file src/Sukohi/Surpass/Surpass.php. The manipulation of the argument dir leads to pathname traversal. Upgrading to version 1.0.0 is able to address this issue. The patch is identified as d22337d453a2a14194cdb02bf12cdf9d9f827aa7. It is recommended to upgrade the affected component. VDB-217642 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10032.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10032.json
index dbc547e194e..6c33b799f2a 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10032.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10032.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10032",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T09:15:09.757",
- "lastModified": "2023-01-12T20:50:26.213",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.847",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in HealthMateWeb. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file createaccount.php. The manipulation of the argument username/password/first_name/last_name/company/phone leads to cross site scripting. The attack can be launched remotely. The name of the patch is 472776c25b1046ecaf962c46fed7c713c72c28e3. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217663."
+ "value": "A vulnerability was found in HealthMateWeb. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file createaccount.php. The manipulation of the argument username/password/first_name/last_name/company/phone leads to cross site scripting. The attack can be launched remotely. The patch is named 472776c25b1046ecaf962c46fed7c713c72c28e3. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217663."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10033.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10033.json
index 8406f854dde..7b7ede7958e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10033.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10033.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10033",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T21:15:10.210",
- "lastModified": "2023-01-13T18:21:16.730",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T08:15:10.910",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in jvvlee MerlinsBoard. This affects an unknown part of the component Grade Handler. The manipulation leads to improper authorization. The name of the patch is 134f5481e2914b7f096cd92a22b1e6bcb8e6dfe5. It is recommended to apply a patch to fix this issue. The identifier VDB-217713 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, was found in jvvlee MerlinsBoard. This affects an unknown part of the component Grade Handler. The manipulation leads to improper authorization. The identifier of the patch is 134f5481e2914b7f096cd92a22b1e6bcb8e6dfe5. It is recommended to apply a patch to fix this issue. The identifier VDB-217713 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10034.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10034.json
index 775e5516f29..fd41260e983 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10034.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10034.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10034",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T21:15:10.300",
- "lastModified": "2023-01-13T18:17:43.157",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:08.367",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in j-nowak workout-organizer and classified as critical. This vulnerability affects unknown code. The manipulation leads to sql injection. The name of the patch is 13cd6c3d1210640bfdb39872b2bb3597aa991279. It is recommended to apply a patch to fix this issue. VDB-217714 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in j-nowak workout-organizer and classified as critical. This vulnerability affects unknown code. The manipulation leads to sql injection. The patch is identified as 13cd6c3d1210640bfdb39872b2bb3597aa991279. It is recommended to apply a patch to fix this issue. VDB-217714 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10035.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10035.json
index 66256152838..45c7d4b6a8e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10035.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10035.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T21:15:10.383",
- "lastModified": "2023-01-13T18:17:23.670",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:08.450",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in gperson angular-test-reporter and classified as critical. This issue affects the function getProjectTables/addTest of the file rest-server/data-server.js. The manipulation leads to sql injection. The name of the patch is a29d8ae121b46ebfa96a55a9106466ab2ef166ae. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217715."
+ "value": "A vulnerability was found in gperson angular-test-reporter and classified as critical. This issue affects the function getProjectTables/addTest of the file rest-server/data-server.js. The manipulation leads to sql injection. The patch is named a29d8ae121b46ebfa96a55a9106466ab2ef166ae. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217715."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10036.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10036.json
index 209ebf467e2..551f1fe5376 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10036.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10036.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10036",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T07:15:10.743",
- "lastModified": "2023-01-18T18:00:00.897",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:08.527",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in kylebebak dronfelipe. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The name of the patch is 87405b74fe651892d79d0dff62ed17a7eaef6a60. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217951."
+ "value": "A vulnerability was found in kylebebak dronfelipe. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The patch is named 87405b74fe651892d79d0dff62ed17a7eaef6a60. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217951."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10037.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10037.json
index d71827b49bd..cf60427ff30 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10037.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10037.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10037",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T07:15:10.963",
- "lastModified": "2023-01-18T18:00:14.230",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:08.697",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in ACI_Escola. This affects an unknown part. The manipulation leads to sql injection. The name of the patch is 34eed1f7b9295d1424912f79989d8aba5de41e9f. It is recommended to apply a patch to fix this issue. The identifier VDB-217965 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, was found in ACI_Escola. This affects an unknown part. The manipulation leads to sql injection. The identifier of the patch is 34eed1f7b9295d1424912f79989d8aba5de41e9f. It is recommended to apply a patch to fix this issue. The identifier VDB-217965 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10038.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10038.json
index 4c0a3ebca62..518980453b2 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10038.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10038.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10038",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T19:15:09.270",
- "lastModified": "2023-01-18T18:45:51.653",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:08.780",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in nym3r0s pplv2. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The name of the patch is 28f8b0550104044da09f04659797487c59f85b00. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218023."
+ "value": "A vulnerability was found in nym3r0s pplv2. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The patch is named 28f8b0550104044da09f04659797487c59f85b00. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218023."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10040.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10040.json
index 4e202bf23e3..eb030c9529d 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10040.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10040.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10040",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T20:15:08.907",
- "lastModified": "2023-01-23T18:00:15.137",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:08.870",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in gitlearn. It has been declared as problematic. This vulnerability affects the function getGrade/getOutOf of the file scripts/config.sh of the component Escape Sequence Handler. The manipulation leads to injection. The attack can be initiated remotely. The name of the patch is 3faa5deaa509012069afe75cd03c21bda5050a64. It is recommended to apply a patch to fix this issue. VDB-218302 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in gitlearn. It has been declared as problematic. This vulnerability affects the function getGrade/getOutOf of the file scripts/config.sh of the component Escape Sequence Handler. The manipulation leads to injection. The attack can be initiated remotely. The patch is identified as 3faa5deaa509012069afe75cd03c21bda5050a64. It is recommended to apply a patch to fix this issue. VDB-218302 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10041.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10041.json
index ae4238de28e..e8e550e9f9a 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10041.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10041.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10041",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T20:15:09.837",
- "lastModified": "2023-01-23T18:06:51.353",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:08.953",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in Dovgalyuk AIBattle. Affected is the function sendComments of the file site/procedures.php. The manipulation of the argument text leads to sql injection. The name of the patch is e3aa4d0900167641d41cbccf53909229f00381c9. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218304. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in Dovgalyuk AIBattle. Affected is the function sendComments of the file site/procedures.php. The manipulation of the argument text leads to sql injection. The name of the patch is e3aa4d0900167641d41cbccf53909229f00381c9. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218304. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10042.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10042.json
index 059e6365eb2..ff51fd28ea3 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10042.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10042.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10042",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T21:15:08.853",
- "lastModified": "2023-01-23T19:42:59.607",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:09.033",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in Dovgalyuk AIBattle. Affected by this vulnerability is the function registerUser of the file site/procedures.php. The manipulation of the argument postLogin leads to sql injection. The name of the patch is 448e9880aac18ae7832f8d065e03e46ce0f1d3e3. It is recommended to apply a patch to fix this issue. The identifier VDB-218305 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in Dovgalyuk AIBattle. Affected by this vulnerability is the function registerUser of the file site/procedures.php. The manipulation of the argument postLogin leads to sql injection. The identifier of the patch is 448e9880aac18ae7832f8d065e03e46ce0f1d3e3. It is recommended to apply a patch to fix this issue. The identifier VDB-218305 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10043.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10043.json
index 851dd77af8f..7e2e09b9a66 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10043.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10043.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10043",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-14T21:15:09.337",
- "lastModified": "2023-01-24T17:30:14.070",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:09.113",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in abreen Apollo. This affects an unknown part. The manipulation of the argument file leads to path traversal. The name of the patch is 6206406630780bbd074aff34f4683fb764faba71. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218307."
+ "value": "A vulnerability, which was classified as critical, was found in abreen Apollo. This affects an unknown part. The manipulation of the argument file leads to path traversal. The patch is named 6206406630780bbd074aff34f4683fb764faba71. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218307."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10044.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10044.json
index e38f3649557..f871242787d 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10044.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10044.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10044",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T10:15:08.913",
- "lastModified": "2023-01-24T14:47:07.033",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:09.277",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in gophergala sqldump. This vulnerability affects unknown code. The manipulation leads to sql injection. The name of the patch is 76db54e9073b5248b8863e71a63d66a32d567d21. It is recommended to apply a patch to fix this issue. VDB-218350 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as critical was found in gophergala sqldump. This vulnerability affects unknown code. The manipulation leads to sql injection. The patch is identified as 76db54e9073b5248b8863e71a63d66a32d567d21. It is recommended to apply a patch to fix this issue. VDB-218350 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10046.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10046.json
index d2282e177d5..a25f1cc8ec9 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10046.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10046.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10046",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T10:15:09.587",
- "lastModified": "2023-01-24T17:55:46.920",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:09.363",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in lolfeedback and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The name of the patch is 6cf0b5f2228cd8765f734badd37910051000f2b2. It is recommended to apply a patch to fix this issue. The identifier VDB-218353 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in lolfeedback and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The identifier of the patch is 6cf0b5f2228cd8765f734badd37910051000f2b2. It is recommended to apply a patch to fix this issue. The identifier VDB-218353 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10047.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10047.json
index 54b6113517f..8a8f72814e6 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10047.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10047.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10047",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T10:15:09.663",
- "lastModified": "2023-01-24T17:58:05.647",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:09.430",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in KYUUBl school-register. It has been classified as critical. This affects an unknown part of the file src/DBManager.java. The manipulation leads to sql injection. The name of the patch is 1cf7e01b878aee923f2b22cc2535c71a680e4c30. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218355."
+ "value": "A vulnerability was found in KYUUBl school-register. It has been classified as critical. This affects an unknown part of the file src/DBManager.java. The manipulation leads to sql injection. The patch is named 1cf7e01b878aee923f2b22cc2535c71a680e4c30. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218355."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10048.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10048.json
index 9a7b66ad10f..c134132ff3d 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10048.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10048.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10048",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T10:15:09.750",
- "lastModified": "2023-01-24T17:59:52.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:09.507",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in bmattoso desafio_buzz_woody. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The name of the patch is cb8220cbae06082c969b1776fcb2fdafb3a1006b. It is recommended to apply a patch to fix this issue. The identifier VDB-218357 was assigned to this vulnerability."
+ "value": "A vulnerability was found in bmattoso desafio_buzz_woody. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The identifier of the patch is cb8220cbae06082c969b1776fcb2fdafb3a1006b. It is recommended to apply a patch to fix this issue. The identifier VDB-218357 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10050.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10050.json
index f59943b587d..6af54d9facd 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10050.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10050.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10050",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T18:15:09.033",
- "lastModified": "2023-01-24T18:31:09.693",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:09.597",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in brandonfire miRNA_Database_by_PHP_MySql. It has been declared as critical. This vulnerability affects the function __construct/select_single_rna/count_rna of the file inc/model.php. The manipulation leads to sql injection. The name of the patch is 307c5d510841e6142ddcbbdbb93d0e8a0dc3fd6a. It is recommended to apply a patch to fix this issue. VDB-218374 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in brandonfire miRNA_Database_by_PHP_MySql. It has been declared as critical. This vulnerability affects the function __construct/select_single_rna/count_rna of the file inc/model.php. The manipulation leads to sql injection. The patch is identified as 307c5d510841e6142ddcbbdbb93d0e8a0dc3fd6a. It is recommended to apply a patch to fix this issue. VDB-218374 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10051.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10051.json
index edf2abe2931..0c0b3f92082 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10051.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10051.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10051",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T18:15:09.110",
- "lastModified": "2023-01-24T18:59:27.743",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:09.673",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in bony2023 Discussion-Board. Affected by this issue is the function display_all_replies of the file functions/main.php. The manipulation of the argument str leads to sql injection. The name of the patch is 26439bc4c63632d63ba89ebc0f149b25a9010361. It is recommended to apply a patch to fix this issue. VDB-218378 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, has been found in bony2023 Discussion-Board. Affected by this issue is the function display_all_replies of the file functions/main.php. The manipulation of the argument str leads to sql injection. The patch is identified as 26439bc4c63632d63ba89ebc0f149b25a9010361. It is recommended to apply a patch to fix this issue. VDB-218378 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10052.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10052.json
index c1d905c1e0a..0af86ceaf3b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10052.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10052.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10052",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T19:15:09.070",
- "lastModified": "2023-01-24T18:57:50.550",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:09.747",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The name of the patch is 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The patch is named 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10053.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10053.json
index f4db9052e41..ac062cff58c 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10053.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10053.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T12:15:16.227",
- "lastModified": "2023-01-24T16:09:00.443",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:09.920",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in prodigasistemas curupira up to 0.1.3. Affected is an unknown function of the file app/controllers/curupira/passwords_controller.rb. The manipulation leads to sql injection. Upgrading to version 0.1.4 is able to address this issue. The name of the patch is 93a9a77896bb66c949acb8e64bceafc74bc8c271. It is recommended to upgrade the affected component. VDB-218394 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as critical has been found in prodigasistemas curupira up to 0.1.3. Affected is an unknown function of the file app/controllers/curupira/passwords_controller.rb. The manipulation leads to sql injection. Upgrading to version 0.1.4 is able to address this issue. The patch is identified as 93a9a77896bb66c949acb8e64bceafc74bc8c271. It is recommended to upgrade the affected component. VDB-218394 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10054.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10054.json
index fbd69437a46..84e2eaf4f51 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10054.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10054.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10054",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T18:15:10.233",
- "lastModified": "2023-01-24T19:32:49.507",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.013",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in githuis P2Manage. This affects the function Execute of the file PTwoManage/Database.cs. The manipulation of the argument sql leads to sql injection. The name of the patch is 717380aba80002414f82d93c770035198b7858cc. It is recommended to apply a patch to fix this issue. The identifier VDB-218397 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, was found in githuis P2Manage. This affects the function Execute of the file PTwoManage/Database.cs. The manipulation of the argument sql leads to sql injection. The identifier of the patch is 717380aba80002414f82d93c770035198b7858cc. It is recommended to apply a patch to fix this issue. The identifier VDB-218397 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10055.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10055.json
index 2ebedb5961b..4de12f00c45 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10055.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10055.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10055",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T18:15:10.310",
- "lastModified": "2023-01-24T19:35:21.713",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in PictureThisWebServer and classified as critical. This issue affects the function router.post of the file routes/user.js. The manipulation of the argument username/password leads to sql injection. The name of the patch is 68b9dc346e88b494df00d88c7d058e96820e1479. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218399."
+ "value": "A vulnerability was found in PictureThisWebServer and classified as critical. This issue affects the function router.post of the file routes/user.js. The manipulation of the argument username/password leads to sql injection. The patch is named 68b9dc346e88b494df00d88c7d058e96820e1479. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218399."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10057.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10057.json
index ea918303d8d..5c9beebb99e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10057.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10057.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T19:15:10.143",
- "lastModified": "2023-01-24T19:57:43.890",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.153",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Little Apps Little Software Stats. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file inc/class.securelogin.php of the component Password Reset Handler. The manipulation leads to improper access controls. Upgrading to version 0.2 is able to address this issue. The name of the patch is 07ba8273a9311d1383f3686ac7cb32f20770ab1e. It is recommended to upgrade the affected component. The identifier VDB-218401 was assigned to this vulnerability."
+ "value": "A vulnerability was found in Little Apps Little Software Stats. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file inc/class.securelogin.php of the component Password Reset Handler. The manipulation leads to improper access controls. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.2 is able to address this issue. The identifier of the patch is 07ba8273a9311d1383f3686ac7cb32f20770ab1e. It is recommended to upgrade the affected component. The identifier VDB-218401 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10058.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10058.json
index 93d0a0f68c5..5334b2be27b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10058.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10058.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T13:15:10.217",
- "lastModified": "2023-01-24T19:15:07.913",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.233",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in Wikisource Category Browser. This affects an unknown part of the file index.php. The manipulation of the argument lang leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 764f4e8ce3f9242637df77530c70ae8a2ec4b6a1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218415."
+ "value": "A vulnerability, which was classified as problematic, was found in Wikisource Category Browser. This affects an unknown part of the file index.php. The manipulation of the argument lang leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 764f4e8ce3f9242637df77530c70ae8a2ec4b6a1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218415."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10060.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10060.json
index 0e0d1fcfc59..7fccfc5ea2f 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10060.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10060.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10060",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T13:15:10.410",
- "lastModified": "2023-01-24T19:13:01.170",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.310",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in MNBikeways database and classified as critical. This issue affects some unknown processing of the file Data/views.py. The manipulation of the argument id1/id2 leads to sql injection. The name of the patch is 829a027aca7c17f5a7ec1addca8dd5d5542f86ac. It is recommended to apply a patch to fix this issue. The identifier VDB-218417 was assigned to this vulnerability."
+ "value": "A vulnerability was found in MNBikeways database and classified as critical. This issue affects some unknown processing of the file Data/views.py. The manipulation of the argument id1/id2 leads to sql injection. The identifier of the patch is 829a027aca7c17f5a7ec1addca8dd5d5542f86ac. It is recommended to apply a patch to fix this issue. The identifier VDB-218417 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10061.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10061.json
index 37a9acedbff..27fa3d865eb 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10061.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10061.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T16:15:16.283",
- "lastModified": "2023-01-24T19:11:31.520",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.377",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in evandro-machado Trabalho-Web2. It has been classified as critical. This affects an unknown part of the file src/java/br/com/magazine/dao/ClienteDAO.java. The manipulation leads to sql injection. The name of the patch is f59ac954625d0a4f6d34f069a2e26686a7a20aeb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218427."
+ "value": "A vulnerability was found in evandro-machado Trabalho-Web2. It has been classified as critical. This affects an unknown part of the file src/java/br/com/magazine/dao/ClienteDAO.java. The manipulation leads to sql injection. The patch is named f59ac954625d0a4f6d34f069a2e26686a7a20aeb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218427."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10062.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10062.json
index d3ae8e3fe74..fe2d7dd5d29 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10062.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10062.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T19:15:10.953",
- "lastModified": "2023-01-24T19:47:50.243",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.450",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in galaxy-data-resource up to 14.10.0. This affects an unknown part of the component Command Line Template. The manipulation leads to injection. Upgrading to version 14.10.1 is able to address this issue. The name of the patch is 50d65f45d3f5be5d1fbff2e45ac5cec075f07d42. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218451."
+ "value": "A vulnerability, which was classified as problematic, was found in galaxy-data-resource up to 14.10.0. This affects an unknown part of the component Command Line Template. The manipulation leads to injection. Upgrading to version 14.10.1 is able to address this issue. The patch is named 50d65f45d3f5be5d1fbff2e45ac5cec075f07d42. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218451."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10063.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10063.json
index 5d376d71b7f..eba65399147 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10063.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10063.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10063",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T19:15:11.067",
- "lastModified": "2023-01-23T19:31:55.300",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.623",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in saemorris TheRadSystem and classified as critical. This issue affects the function redirect of the file _login.php. The manipulation of the argument user/pass leads to sql injection. The attack may be initiated remotely. The name of the patch is bfba26bd34af31648a11af35a0bb66f1948752a6. It is recommended to apply a patch to fix this issue. The identifier VDB-218453 was assigned to this vulnerability."
+ "value": "A vulnerability was found in saemorris TheRadSystem and classified as critical. This issue affects the function redirect of the file _login.php. The manipulation of the argument user/pass leads to sql injection. The attack may be initiated remotely. The identifier of the patch is bfba26bd34af31648a11af35a0bb66f1948752a6. It is recommended to apply a patch to fix this issue. The identifier VDB-218453 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10064.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10064.json
index 4e86c3353f5..6c5c7fc1bb2 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10064.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10064.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10064",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T19:15:11.163",
- "lastModified": "2023-01-24T19:47:07.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.693",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in VictorFerraresi pokemon-database-php. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The name of the patch is dd0e1e6cdf648d6a3deff441f515bcb1d7573d68. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218455."
+ "value": "A vulnerability was found in VictorFerraresi pokemon-database-php. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The patch is named dd0e1e6cdf648d6a3deff441f515bcb1d7573d68. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218455."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10065.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10065.json
index b8c6bcf7ddf..e5b8cb12bf6 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10065.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10065.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T23:15:15.313",
- "lastModified": "2023-01-24T19:34:23.627",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.763",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in AenBleidd FiND. This vulnerability affects the function init_result of the file validator/my_validator.cpp. The manipulation leads to buffer overflow. The name of the patch is ee2eef34a83644f286c9adcaf30437f92e9c48f1. It is recommended to apply a patch to fix this issue. VDB-218458 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as critical was found in AenBleidd FiND. This vulnerability affects the function init_result of the file validator/my_validator.cpp. The manipulation leads to buffer overflow. The patch is identified as ee2eef34a83644f286c9adcaf30437f92e9c48f1. It is recommended to apply a patch to fix this issue. VDB-218458 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10066.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10066.json
index 6bec041047d..0fe442129e1 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10066.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10066.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T00:15:11.697",
- "lastModified": "2023-01-25T02:33:05.557",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.830",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in tynx wuersch and classified as critical. Affected by this issue is the function packValue/getByCustomQuery of the file backend/base/Store.class.php. The manipulation leads to sql injection. The name of the patch is 66d4718750a741d1053d327a79e285fd50372519. It is recommended to apply a patch to fix this issue. VDB-218462 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in tynx wuersch and classified as critical. Affected by this issue is the function packValue/getByCustomQuery of the file backend/base/Store.class.php. The manipulation leads to sql injection. The patch is identified as 66d4718750a741d1053d327a79e285fd50372519. It is recommended to apply a patch to fix this issue. VDB-218462 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10067.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10067.json
index 829864f9979..6e5c970aa03 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10067.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10067.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T01:15:11.337",
- "lastModified": "2023-01-25T17:42:22.260",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.903",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in oznetmaster SSharpSmartThreadPool. It has been classified as problematic. This affects an unknown part of the file SSharpSmartThreadPool/SmartThreadPool.cs. The manipulation leads to race condition within a thread. The name of the patch is 0e58073c831093aad75e077962e9fb55cad0dc5f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218463."
+ "value": "A vulnerability was found in oznetmaster SSharpSmartThreadPool. It has been classified as problematic. This affects an unknown part of the file SSharpSmartThreadPool/SmartThreadPool.cs. The manipulation leads to race condition within a thread. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 0e58073c831093aad75e077962e9fb55cad0dc5f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218463."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10070.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10070.json
index 8f98fae3b62..686dcc6510b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10070.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10070.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T10:15:11.597",
- "lastModified": "2023-01-27T17:35:16.873",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:10.993",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in copperwall Twiddit. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation leads to sql injection. The name of the patch is 2203d4ce9810bdaccece5c48ff4888658a01acfc. It is recommended to apply a patch to fix this issue. The identifier VDB-218897 was assigned to this vulnerability."
+ "value": "A vulnerability was found in copperwall Twiddit. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation leads to sql injection. The identifier of the patch is 2203d4ce9810bdaccece5c48ff4888658a01acfc. It is recommended to apply a patch to fix this issue. The identifier VDB-218897 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10071.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10071.json
index f4ed6cb33b0..272eba4b4cb 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10071.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10071.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10071",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T10:15:11.697",
- "lastModified": "2023-01-27T17:33:18.313",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:11.063",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in gitter-badger ezpublish-modern-legacy. It has been rated as problematic. This issue affects some unknown processing of the file kernel/user/forgotpassword.php. The manipulation leads to weak password recovery. Upgrading to version 1.0 is able to address this issue. The name of the patch is 5908d5ee65fec61ce0e321d586530461a210bf2a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218951."
+ "value": "A vulnerability was found in gitter-badger ezpublish-modern-legacy. It has been rated as problematic. This issue affects some unknown processing of the file kernel/user/forgotpassword.php. The manipulation leads to weak password recovery. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 1.0 is able to address this issue. The patch is named 5908d5ee65fec61ce0e321d586530461a210bf2a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218951."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10073.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10073.json
index 50c37c15347..c890067011c 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10073.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10073.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10073",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T20:15:10.667",
- "lastModified": "2023-02-14T02:16:06.810",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:11.143",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in tinymighty WikiSEO 1.2.1. This affects the function modifyHTML of the file WikiSEO.body.php of the component Meta Property Tag Handler. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.2.2 is able to address this issue. The name of the patch is 089a5797be612b18a820f9f1e6593ad9a91b1dba. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220215."
+ "value": "A vulnerability, which was classified as problematic, was found in tinymighty WikiSEO 1.2.1 on MediaWiki. This affects the function modifyHTML of the file WikiSEO.body.php of the component Meta Property Tag Handler. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.2.2 is able to address this issue. The patch is named 089a5797be612b18a820f9f1e6593ad9a91b1dba. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220215."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10074.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10074.json
index 919ad125bc7..223641c4ec9 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10074.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10074.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10074",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T10:15:52.147",
- "lastModified": "2023-02-14T23:21:06.097",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:11.323",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in OpenSeaMap online_chart 1.2. It has been classified as problematic. Affected is the function init of the file index.php. The manipulation of the argument mtext leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version staging is able to address this issue. The name of the patch is 8649157158f921590d650e2d2f4bdf0df1017e9d. It is recommended to upgrade the affected component. VDB-220218 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in OpenSeaMap online_chart 1.2. It has been classified as problematic. Affected is the function init of the file index.php. The manipulation of the argument mtext leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version staging is able to address this issue. The patch is identified as 8649157158f921590d650e2d2f4bdf0df1017e9d. It is recommended to upgrade the affected component. VDB-220218 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10075.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10075.json
index 0d30503d30f..4c87d88e995 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10075.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10075.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T12:15:08.653",
- "lastModified": "2023-02-14T23:31:14.650",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:11.400",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Custom-Content-Width 1.0. It has been declared as problematic. Affected by this vulnerability is the function override_content_width/register_settings of the file custom-content-width.php. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.1 is able to address this issue. The name of the patch is e05e0104fc42ad13b57e2b2cb2d1857432624d39. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220219. NOTE: This attack is not very likely."
+ "value": "A vulnerability was found in Custom-Content-Width 1.0. It has been declared as problematic. Affected by this vulnerability is the function override_content_width/register_settings of the file custom-content-width.php. The manipulation leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.1 is able to address this issue. The patch is named e05e0104fc42ad13b57e2b2cb2d1857432624d39. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220219. NOTE: This attack is not very likely."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10076.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10076.json
index 05621f2531c..88e89f36d5b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10076.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10076.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-09T23:15:11.017",
- "lastModified": "2023-02-16T18:12:12.960",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:11.480",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in dimtion Shaarlier up to 1.2.2. It has been declared as critical. Affected by this vulnerability is the function createTag of the file app/src/main/java/com/dimtion/shaarlier/TagsSource.java of the component Tag Handler. The manipulation leads to sql injection. Upgrading to version 1.2.3 is able to address this issue. The name of the patch is 3d1d9b239d9b3cd87e8bed45a0f02da583ad371e. It is recommended to upgrade the affected component. The identifier VDB-220453 was assigned to this vulnerability."
+ "value": "A vulnerability was found in dimtion Shaarlier up to 1.2.2. It has been declared as critical. Affected by this vulnerability is the function createTag of the file app/src/main/java/com/dimtion/shaarlier/TagsSource.java of the component Tag Handler. The manipulation leads to sql injection. Upgrading to version 1.2.3 is able to address this issue. The identifier of the patch is 3d1d9b239d9b3cd87e8bed45a0f02da583ad371e. It is recommended to upgrade the affected component. The identifier VDB-220453 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10077.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10077.json
index 0ca6479536f..53409a160c4 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10077.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10077.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-10T15:15:11.490",
- "lastModified": "2023-02-16T21:24:42.233",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:11.567",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in webbuilders-group silverstripe-kapost-bridge 0.3.3. It has been declared as critical. Affected by this vulnerability is the function index/getPreview of the file code/control/KapostService.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 0.4.0 is able to address this issue. The name of the patch is 2e14b0fd0ea35034f90890f364b130fb4645ff35. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220471."
+ "value": "A vulnerability was found in webbuilders-group silverstripe-kapost-bridge 0.3.3. It has been declared as critical. Affected by this vulnerability is the function index/getPreview of the file code/control/KapostService.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 0.4.0 is able to address this issue. The patch is named 2e14b0fd0ea35034f90890f364b130fb4645ff35. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220471."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10078.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10078.json
index 40f39cb859f..cd411f5d1fe 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10078.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10078.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T14:15:10.427",
- "lastModified": "2023-02-22T14:25:27.360",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:11.643",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in atwellpub Resend Welcome Email Plugin 1.0.1. This issue affects the function send_welcome_email_url of the file resend-welcome-email.php. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.0.2 is able to address this issue. The name of the patch is b14c1f66d307783f0ae74f88088a85999107695c. It is recommended to upgrade the affected component. The identifier VDB-220637 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in atwellpub Resend Welcome Email Plugin 1.0.1 on WordPress. This issue affects the function send_welcome_email_url of the file resend-welcome-email.php. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is b14c1f66d307783f0ae74f88088a85999107695c. It is recommended to upgrade the affected component. The identifier VDB-220637 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10079.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10079.json
index dc13830e0ed..cb8e9d66f25 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10079.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10079.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-13T22:15:12.000",
- "lastModified": "2023-02-22T20:13:09.600",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:11.723",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in juju2143 WalrusIRC 0.0.2. It has been rated as problematic. This issue affects the function parseLinks of the file public/parser.js. The manipulation of the argument text leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 0.0.3 is able to address this issue. The name of the patch is 45fd885895ae13e8d9b3a71e89d59768914f60af. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220751."
+ "value": "A vulnerability was found in juju2143 WalrusIRC 0.0.2. It has been rated as problematic. This issue affects the function parseLinks of the file public/parser.js. The manipulation of the argument text leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 0.0.3 is able to address this issue. The patch is named 45fd885895ae13e8d9b3a71e89d59768914f60af. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220751."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10080.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10080.json
index 793cd0668f4..873fecf8da8 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10080.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10080.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10080",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T10:15:12.217",
- "lastModified": "2023-02-28T19:53:22.950",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:11.900",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in NREL api-umbrella-web 0.7.1. It has been classified as problematic. This affects an unknown part of the component Admin Data Table Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 0.8.0 is able to address this issue. The name of the patch is f53a9fb87e10c457f0f3dd4f2af24d3b2f21b3ca. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221487."
+ "value": "A vulnerability was found in NREL api-umbrella-web 0.7.1. It has been classified as problematic. This affects an unknown part of the component Admin Data Table Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 0.8.0 is able to address this issue. The patch is named f53a9fb87e10c457f0f3dd4f2af24d3b2f21b3ca. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221487."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10081.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10081.json
index a94a0e81d2a..95025c5031e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10081.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10081.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10081",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T17:15:11.173",
- "lastModified": "2023-03-01T17:47:42.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:11.980",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in arnoldle submitByMailPlugin 1.0b2.9 and classified as problematic. This issue affects some unknown processing of the file edit_list.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. Upgrading to version 1.0b2.9a is able to address this issue. The name of the patch is a739f680a1623d22f52ff1371e86ca472e63756f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221495."
+ "value": "A vulnerability was found in arnoldle submitByMailPlugin 1.0b2.9 and classified as problematic. This issue affects some unknown processing of the file edit_list.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. Upgrading to version 1.0b2.9a is able to address this issue. The patch is named a739f680a1623d22f52ff1371e86ca472e63756f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221495."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10082.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10082.json
index 9025f537294..607613f29fc 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10082.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10082.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10082",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T07:15:10.173",
- "lastModified": "2023-03-02T23:03:01.827",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:12.057",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in UIKit0 libplist 1.12. This affects the function plist_from_xml of the file src/xplist.c of the component XML Handler. The manipulation leads to xml external entity reference. The name of the patch is c086cb139af7c82845f6d565e636073ff4b37440. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221499."
+ "value": "A vulnerability classified as problematic has been found in UIKit0 libplist 1.12. This affects the function plist_from_xml of the file src/xplist.c of the component XML Handler. The manipulation leads to xml external entity reference. The patch is named c086cb139af7c82845f6d565e636073ff4b37440. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221499."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10083.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10083.json
index 51ad86f44fe..116afb922f0 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10083.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10083.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10083",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T15:15:10.527",
- "lastModified": "2023-03-02T16:16:47.613",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T09:15:12.213",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in harrystech Dynosaur-Rails and classified as critical. Affected by this vulnerability is the function basic_auth of the file app/controllers/application_controller.rb. The manipulation leads to improper authentication. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The name of the patch is 04b223813f0e336aab50bff140d0f5889c31dbec. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221503."
+ "value": "A vulnerability has been found in harrystech Dynosaur-Rails and classified as critical. Affected by this vulnerability is the function basic_auth of the file app/controllers/application_controller.rb. The manipulation leads to improper authentication. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 04b223813f0e336aab50bff140d0f5889c31dbec. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221503."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10085.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10085.json
index ff4279031f1..6bba177024c 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10085.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10085.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T18:15:11.480",
- "lastModified": "2023-03-02T23:02:32.303",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:10.047",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in GoPistolet. It has been declared as problematic. This vulnerability affects unknown code of the component MTA. The manipulation leads to denial of service. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is b91aa4674d460993765884e8463c70e6d886bc90. It is recommended to apply a patch to fix this issue. VDB-221506 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in GoPistolet. It has been declared as problematic. This vulnerability affects unknown code of the component MTA. The manipulation leads to denial of service. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as b91aa4674d460993765884e8463c70e6d886bc90. It is recommended to apply a patch to fix this issue. VDB-221506 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10087.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10087.json
index 59eef2dac76..7f52b7c1711 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10087.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10087.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10087",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-07T15:15:10.423",
- "lastModified": "2023-03-14T15:53:41.640",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:10.357",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in UpThemes Theme DesignFolio Plus 1.2 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 53f6ae62878076f99718e5feb589928e83c879a9. It is recommended to apply a patch to fix this issue. The identifier VDB-221809 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in UpThemes Theme DesignFolio Plus 1.2 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 53f6ae62878076f99718e5feb589928e83c879a9. It is recommended to apply a patch to fix this issue. The identifier VDB-221809 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10088.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10088.json
index e6961f305f6..8c412fd0726 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10088.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10088.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10088",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T05:15:09.210",
- "lastModified": "2023-03-13T16:55:56.763",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:10.453",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/proxy.c. The manipulation leads to format string. It is possible to initiate the attack remotely. The name of the patch is 40e04680018614a7d2b68566b261b061a0597046. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222267."
+ "value": "A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/proxy.c. The manipulation leads to format string. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 40e04680018614a7d2b68566b261b061a0597046. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222267."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10089.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10089.json
index 4f82d5cf879..642d0698cc7 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10089.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10089.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10089",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T14:15:08.953",
- "lastModified": "2023-03-13T16:54:53.687",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:10.530",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in flame.js. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The name of the patch is e6c49b5f6179e31a534b7c3264e1d36aa99728ac. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222291."
+ "value": "A vulnerability classified as problematic has been found in flame.js. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named e6c49b5f6179e31a534b7c3264e1d36aa99728ac. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222291."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10090.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10090.json
index fb893d22745..41f9009f67d 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10090.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10090.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10090",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T00:15:10.160",
- "lastModified": "2023-03-09T20:59:52.913",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:10.600",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in Landing Pages Plugin up to 1.8.7. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.8 is able to address this issue. The name of the patch is c8e22c1340c11fedfb0a0a67ea690421bdb62b94. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222320."
+ "value": "A vulnerability, which was classified as problematic, has been found in Landing Pages Plugin up to 1.8.7 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.8 is able to address this issue. The name of the patch is c8e22c1340c11fedfb0a0a67ea690421bdb62b94. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222320."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10091.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10091.json
index a453dfdc19f..d8b7279f978 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10091.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10091.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10091",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T04:15:08.190",
- "lastModified": "2023-03-13T17:14:21.793",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:10.670",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in ByWater Solutions bywater-koha-xslt and classified as critical. This vulnerability affects the function StringSearch of the file admin/systempreferences.pl. The manipulation of the argument name leads to sql injection. The attack can be initiated remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is 9513b93c828dfbc4413f9e0df63647401aaf4e58. It is recommended to apply a patch to fix this issue. VDB-222322 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in ByWater Solutions bywater-koha-xslt and classified as critical. This vulnerability affects the function StringSearch of the file admin/systempreferences.pl. The manipulation of the argument name leads to sql injection. The attack can be initiated remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as 9513b93c828dfbc4413f9e0df63647401aaf4e58. It is recommended to apply a patch to fix this issue. VDB-222322 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10092.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10092.json
index 25b079b209a..86e372d1b5e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10092.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10092.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10092",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T06:15:09.733",
- "lastModified": "2023-03-10T22:43:45.297",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:10.743",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Qtranslate Slug Plugin up to 1.1.16. It has been classified as problematic. Affected is the function add_slug_meta_box of the file includes/class-qtranslate-slug.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.1.17 is able to address this issue. The name of the patch is 74b3932696f9868e14563e51b7d0bb68c53bf5e4. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222324."
+ "value": "A vulnerability was found in Qtranslate Slug Plugin up to 1.1.16 on WordPress. It has been classified as problematic. Affected is the function add_slug_meta_box of the file includes/class-qtranslate-slug.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.1.17 is able to address this issue. The name of the patch is 74b3932696f9868e14563e51b7d0bb68c53bf5e4. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222324."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10093.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10093.json
index dc99d5c66c6..67aa9e984a3 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10093.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10093.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T07:15:10.103",
- "lastModified": "2023-03-10T22:43:58.713",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:10.810",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Mark User as Spammer Plugin 1.0.0/1.0.1. It has been declared as problematic. Affected by this vulnerability is the function user_row_actions of the file plugin/plugin.php. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.2 is able to address this issue. The name of the patch is e7059727274d2767c240c55c02c163eaa4ba6c62. It is recommended to upgrade the affected component. The identifier VDB-222325 was assigned to this vulnerability."
+ "value": "A vulnerability was found in Mark User as Spammer Plugin 1.0.0/1.0.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function user_row_actions of the file plugin/plugin.php. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is e7059727274d2767c240c55c02c163eaa4ba6c62. It is recommended to upgrade the affected component. The identifier VDB-222325 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10094.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10094.json
index 6f3bc7eece6..ee0f32e36f4 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10094.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10094.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10094",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T15:15:09.863",
- "lastModified": "2023-03-13T18:49:39.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:10.880",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Fastly Plugin up to 0.97. It has been rated as problematic. Affected by this issue is the function post of the file lib/api.php. The manipulation of the argument url leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.98 is able to address this issue. The name of the patch is d7fe42538f4d4af500e3af9678b6b06fba731656. It is recommended to upgrade the affected component. VDB-222326 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Fastly Plugin up to 0.97 on WordPress. It has been rated as problematic. Affected by this issue is the function post of the file lib/api.php. The manipulation of the argument url leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.98 is able to address this issue. The patch is identified as d7fe42538f4d4af500e3af9678b6b06fba731656. It is recommended to upgrade the affected component. VDB-222326 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10095.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10095.json
index 90f288b1b5f..6ab4c7eec20 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10095.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10095.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10095",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T21:15:10.150",
- "lastModified": "2023-03-13T15:18:44.873",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:10.947",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in woo-popup Plugin up to 1.2.2. This affects an unknown part of the file admin/class-woo-popup-admin.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.3.0 is able to address this issue. The name of the patch is 7c76ac78f3e16015991b612ff4fa616af4ce9292. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222327."
+ "value": "A vulnerability classified as problematic has been found in woo-popup Plugin up to 1.2.2 on WordPress. This affects an unknown part of the file admin/class-woo-popup-admin.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.3.0 is able to address this issue. The patch is named 7c76ac78f3e16015991b612ff4fa616af4ce9292. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222327."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10096.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10096.json
index cba51de72a6..e6e3c95613e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10096.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10096.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T05:15:11.163",
- "lastModified": "2023-03-24T19:08:05.763",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:11.017",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in Zarthus IRC Twitter Announcer Bot up to 1.1.0. This affects the function get_tweets of the file lib/twitterbot/plugins/twitter_announcer.rb. The manipulation of the argument tweet leads to command injection. It is possible to initiate the attack remotely. Upgrading to version 1.1.1 is able to address this issue. The name of the patch is 6b1941b7fc2c70e1f40981b43c84a2c20cc12bd3. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223383."
+ "value": "A vulnerability, which was classified as critical, was found in Zarthus IRC Twitter Announcer Bot up to 1.1.0. This affects the function get_tweets of the file lib/twitterbot/plugins/twitter_announcer.rb. The manipulation of the argument tweet leads to command injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.1.1 is able to address this issue. The patch is named 6b1941b7fc2c70e1f40981b43c84a2c20cc12bd3. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223383."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10097.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10097.json
index f055caf56a6..2f5891dbc14 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10097.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10097.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10097",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T18:15:09.387",
- "lastModified": "2023-03-31T00:49:16.990",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:11.090",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in grinnellplans-php up to 3.0. It has been declared as critical. Affected by this vulnerability is the function interface_disp_page/interface_disp_page of the file read.php. The manipulation leads to sql injection. The attack can be launched remotely. The name of the patch is 57e4409e19203a94495140ff1b5a697734d17cfb. It is recommended to apply a patch to fix this issue. The identifier VDB-223801 was assigned to this vulnerability."
+ "value": "A vulnerability was found in grinnellplans-php up to 3.0. It has been declared as critical. Affected by this vulnerability is the function interface_disp_page/interface_disp_page of the file read.php. The manipulation leads to sql injection. The attack can be launched remotely. The identifier of the patch is 57e4409e19203a94495140ff1b5a697734d17cfb. It is recommended to apply a patch to fix this issue. The identifier VDB-223801 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10098.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10098.json
index a5a607d3378..a1b89c7691b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10098.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10098.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T09:15:07.470",
- "lastModified": "2023-04-17T13:43:35.650",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:11.170",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Broken Link Checker Plugin up to 1.10.5. It has been rated as problematic. Affected by this issue is the function print_module_list/show_warnings_section_notice/status_text/ui_get_action_links. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.10.6 is able to address this issue. The name of the patch is f30638869e281461b87548e40b517738b4350e47. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225152."
+ "value": "A vulnerability was found in Broken Link Checker Plugin up to 1.10.5 on WordPress. It has been rated as problematic. Affected by this issue is the function print_module_list/show_warnings_section_notice/status_text/ui_get_action_links. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.10.6 is able to address this issue. The name of the patch is f30638869e281461b87548e40b517738b4350e47. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225152."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10099.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10099.json
index 4f0e0879d60..9558e402776 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10099.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10099.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T12:15:07.093",
- "lastModified": "2023-04-18T01:40:40.507",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:11.257",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in CP Appointment Calendar Plugin up to 1.1.5. This affects the function dex_process_ready_to_go_appointment of the file dex_appointments.php. The manipulation of the argument itemnumber leads to sql injection. It is possible to initiate the attack remotely. The name of the patch is e29a9cdbcb0f37d887dd302a05b9e8bf213da01d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-225351."
+ "value": "A vulnerability classified as critical has been found in CP Appointment Calendar Plugin up to 1.1.5 on WordPress. This affects the function dex_process_ready_to_go_appointment of the file dex_appointments.php. The manipulation of the argument itemnumber leads to sql injection. It is possible to initiate the attack remotely. The patch is named e29a9cdbcb0f37d887dd302a05b9e8bf213da01d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-225351."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10100.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10100.json
index 6d7602f4296..1c45ed19faf 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10100.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10100.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T18:15:07.873",
- "lastModified": "2023-04-14T17:48:29.007",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:11.327",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in Dynamic Widgets Plugin up to 1.5.10. This issue affects some unknown processing of the file classes/dynwid_class.php. The manipulation leads to sql injection. The attack may be initiated remotely. Upgrading to version 1.5.11 is able to address this issue. The name of the patch is d0a19c6efcdc86d7093b369bc9e29a0629e57795. It is recommended to upgrade the affected component. The identifier VDB-225353 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, has been found in Dynamic Widgets Plugin up to 1.5.10 on WordPress. This issue affects some unknown processing of the file classes/dynwid_class.php. The manipulation leads to sql injection. The attack may be initiated remotely. Upgrading to version 1.5.11 is able to address this issue. The identifier of the patch is d0a19c6efcdc86d7093b369bc9e29a0629e57795. It is recommended to upgrade the affected component. The identifier VDB-225353 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10101.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10101.json
index 82c52211321..640956fdb7b 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10101.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10101.json
@@ -2,15 +2,37 @@
"id": "CVE-2015-10101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T21:15:06.800",
- "lastModified": "2023-04-17T13:12:43.170",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T10:15:11.400",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in Google Analytics Top Content Widget Plugin up to 1.5.6 on WordPress. Affected by this vulnerability is an unknown functionality of the file class-tgm-plugin-activation.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.7 is able to address this issue. The name of the patch is 25bb1dea113716200a6f0f3135801d84a7a65540. It is recommended to upgrade the affected component. The identifier VDB-226117 was assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic was found in Google Analytics Top Content Widget Plugin up to 1.5.6 on WordPress. Affected by this vulnerability is an unknown functionality of the file class-tgm-plugin-activation.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.7 is able to address this issue. The identifier of the patch is 25bb1dea113716200a6f0f3135801d84a7a65540. It is recommended to upgrade the affected component. The identifier VDB-226117 was assigned to this vulnerability."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -71,18 +93,47 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:google_analytics_top_content_widget_project:google_analytics_top_content_widget:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.5.7",
+ "matchCriteriaId": "29369D72-6663-4EC6-89AF-C14F031F0B21"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/wp-plugins/google-analytics-top-posts-widget/commit/25bb1dea113716200a6f0f3135801d84a7a65540",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.226117",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?id.226117",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10102.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10102.json
index 5b48fd619b8..636eb3828fa 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10102.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10102.json
@@ -2,15 +2,37 @@
"id": "CVE-2015-10102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-17T18:15:07.197",
- "lastModified": "2023-04-18T03:15:28.387",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T10:15:11.477",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in Freshdesk Plugin 1.7 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to open redirect. The attack may be launched remotely. Upgrading to version 1.8 is able to address this issue. The name of the patch is 2aaecd4e0c7c6c1dc4e6a593163d5f7aa0fa5d5b. It is recommended to upgrade the affected component. VDB-226118 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, has been found in Freshdesk Plugin 1.7 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to open redirect. The attack may be launched remotely. Upgrading to version 1.8 is able to address this issue. The patch is identified as 2aaecd4e0c7c6c1dc4e6a593163d5f7aa0fa5d5b. It is recommended to upgrade the affected component. VDB-226118 is the identifier assigned to this vulnerability."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -71,18 +93,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:freshworks:freshdesk:1.7:*:*:*:*:wordpress:*:*",
+ "matchCriteriaId": "EC0BB0BA-A469-4E1E-91B0-2D331535141E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/wp-plugins/freshdesk-support/commit/2aaecd4e0c7c6c1dc4e6a593163d5f7aa0fa5d5b",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.226118",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?id.226118",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10103.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10103.json
index bfd8f599a54..bd9265618ed 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10103.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10103.json
@@ -2,15 +2,37 @@
"id": "CVE-2015-10103",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-17T19:15:07.227",
- "lastModified": "2023-04-18T03:15:28.387",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T10:15:11.550",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in InternalError503 Forget It up to 1.3. This affects an unknown part of the file js/settings.js. The manipulation of the argument setForgetTime with the input 0 leads to infinite loop. It is possible to launch the attack on the local host. Upgrading to version 1.4 is able to address this issue. The name of the patch is adf0c7fd59b9c935b4fd675c556265620124999c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226119."
+ "value": "A vulnerability, which was classified as problematic, was found in InternalError503 Forget It up to 1.3. This affects an unknown part of the file js/settings.js. The manipulation of the argument setForgetTime with the input 0 leads to infinite loop. It is possible to launch the attack on the local host. Upgrading to version 1.4 is able to address this issue. The patch is named adf0c7fd59b9c935b4fd675c556265620124999c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226119."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -71,22 +93,53 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:forget_it_project:forget_it:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.4",
+ "matchCriteriaId": "1FF5EBCC-1729-411D-88D3-CE5CEAFC1D2E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/InternalError503/forget-it/commit/adf0c7fd59b9c935b4fd675c556265620124999c",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/InternalError503/forget-it/releases/tag/1.4",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.226119",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?id.226119",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10105.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10105.json
index 36d6538331d..febbf3b710d 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10105.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10105.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10105",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-01T02:15:39.197",
- "lastModified": "2023-05-06T03:15:43.640",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:11.643",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in IP Blacklist Cloud Plugin up to 3.42 on WordPress. This affects the function valid_js_identifier of the file ip_blacklist_cloud.php of the component CSV File Import. The manipulation of the argument filename leads to path traversal. It is possible to initiate the attack remotely. Upgrading to version 3.43 is able to address this issue. The name of the patch is 6e6fe8c6fda7cbc252eef083105e08d759c07312. It is recommended to upgrade the affected component. The identifier VDB-227757 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, was found in IP Blacklist Cloud Plugin up to 3.42 on WordPress. This affects the function valid_js_identifier of the file ip_blacklist_cloud.php of the component CSV File Import. The manipulation of the argument filename leads to path traversal. It is possible to initiate the attack remotely. Upgrading to version 3.43 is able to address this issue. The identifier of the patch is 6e6fe8c6fda7cbc252eef083105e08d759c07312. It is recommended to upgrade the affected component. The identifier VDB-227757 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10106.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10106.json
index a10d0335bf8..d202f47bdee 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10106.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10106.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10106",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-28T13:15:09.850",
- "lastModified": "2023-06-02T19:50:13.470",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:11.733",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This vulnerability affects the function moduleContent of the file mod1/index.php. The manipulation leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The name of the patch is 429f50f4e4795b20dae06735b41fb94f010722bf. It is recommended to upgrade the affected component. VDB-230086 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This vulnerability affects the function moduleContent of the file mod1/index.php. The manipulation leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.1.8 is able to address this issue. The patch is identified as 429f50f4e4795b20dae06735b41fb94f010722bf. It is recommended to upgrade the affected component. VDB-230086 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json
index eb5b4b5150d..10697e5f271 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10107",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T03:15:09.157",
- "lastModified": "2023-06-06T16:01:33.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:11.823",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Simplr Registration Form Plus+ Plugin up to 2.3.4 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.3.5 is able to address this issue. The name of the patch is d588446844dd49232ab400ef213ff5b92121c33e. It is recommended to upgrade the affected component. The identifier VDB-230153 was assigned to this vulnerability."
+ "value": "A vulnerability was found in Simplr Registration Form Plus+ Plugin up to 2.3.4 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.3.5 is able to address this issue. The identifier of the patch is d588446844dd49232ab400ef213ff5b92121c33e. It is recommended to upgrade the affected component. The identifier VDB-230153 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10108.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10108.json
index 2bd0637f35c..a1a206a3b5a 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10108.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10108.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10108",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T19:15:11.720",
- "lastModified": "2023-06-06T20:08:47.730",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:11.900",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in meitar Inline Google Spreadsheet Viewer Plugin up to 0.9.6 on WordPress and classified as problematic. Affected by this issue is the function displayShortcode of the file inline-gdocs-viewer.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 0.9.6.1 is able to address this issue. The name of the patch is 2a8057df8ca30adc859cecbe5cad21ac28c5b747. It is recommended to upgrade the affected component. VDB-230234 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in meitar Inline Google Spreadsheet Viewer Plugin up to 0.9.6 on WordPress and classified as problematic. Affected by this issue is the function displayShortcode of the file inline-gdocs-viewer.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 0.9.6.1 is able to address this issue. The patch is identified as 2a8057df8ca30adc859cecbe5cad21ac28c5b747. It is recommended to upgrade the affected component. VDB-230234 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json
index eff7558051b..ca43d85bdf3 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json
@@ -2,12 +2,12 @@
"id": "CVE-2015-10111",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-04T12:15:09.237",
- "lastModified": "2023-06-09T19:13:00.523",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:11.990",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Watu Quiz Plugin up to 2.6.7 on WordPress. It has been rated as critical. This issue affects the function watu_exams of the file controllers/exam.php of the component Exam Handler. The manipulation of the argument quiz leads to sql injection. The attack may be initiated remotely. Upgrading to version 2.6.8 is able to address this issue. The name of the patch is bf42e7cfd819a3e76cf3e1465697e89f4830590c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230651."
+ "value": "A vulnerability was found in Watu Quiz Plugin up to 2.6.7 on WordPress. It has been rated as critical. This issue affects the function watu_exams of the file controllers/exam.php of the component Exam Handler. The manipulation of the argument quiz leads to sql injection. The attack may be initiated remotely. Upgrading to version 2.6.8 is able to address this issue. The patch is named bf42e7cfd819a3e76cf3e1465697e89f4830590c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230651."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-101xx/CVE-2016-10164.json b/CVE-2016/CVE-2016-101xx/CVE-2016-10164.json
index 8c028c03f03..6ca52b57b6b 100644
--- a/CVE-2016/CVE-2016-101xx/CVE-2016-10164.json
+++ b/CVE-2016/CVE-2016-101xx/CVE-2016-10164.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-10164",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-02-01T15:59:00.130",
- "lastModified": "2018-01-05T02:30:31.727",
+ "lastModified": "2023-10-17T15:55:36.773",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:libxpm_project:libxpm:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.5.11",
- "matchCriteriaId": "2CC24F1D-5B70-4655-82CA-2C6C7918597B"
+ "matchCriteriaId": "86C84875-9507-4CEF-ABA2-362841307682"
}
]
}
diff --git a/CVE-2016/CVE-2016-13xx/CVE-2016-1351.json b/CVE-2016/CVE-2016-13xx/CVE-2016-1351.json
index 9dec05d27f0..db5420dc047 100644
--- a/CVE-2016/CVE-2016-13xx/CVE-2016-1351.json
+++ b/CVE-2016/CVE-2016-13xx/CVE-2016-1351.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-1351",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2016-03-26T01:59:05.073",
- "lastModified": "2022-07-28T15:35:17.963",
+ "lastModified": "2023-10-19T16:03:34.733",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -172,23 +172,28 @@
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*",
- "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6"
+ "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(2\\):*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6C0331A-4849-4992-8F76-D8D52F512659"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*",
- "matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4"
+ "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\):*:*:*:*:*:*:*",
+ "matchCriteriaId": "33FDE6FE-F1E4-427D-A04E-9C57C73BD199"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*",
- "matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8"
+ "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(4\\):*:*:*:*:*:*:*",
+ "matchCriteriaId": "F343CF6B-8205-4526-9C50-A47675676D77"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*",
- "matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB"
+ "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(5\\):*:*:*:*:*:*:*",
+ "matchCriteriaId": "37189152-9A2F-45F7-850B-7558BAD94013"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2a\\):*:*:*:*:*:*:*",
+ "matchCriteriaId": "A0146AD1-CFA3-4429-8616-05A31907ED51"
},
{
"vulnerable": true,
@@ -210,11 +215,6 @@
"criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74"
},
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*",
- "matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE"
- },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*",
@@ -397,14 +397,18 @@
"url": "http://www.securitytracker.com/id/1035383",
"source": "ykramarz@cisco.com",
"tags": [
- "Broken Link"
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1035384",
"source": "ykramarz@cisco.com",
"tags": [
- "Broken Link"
+ "Broken Link",
+ "Third Party Advisory",
+ "VDB Entry"
]
}
]
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15006.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15006.json
index d0998d8aaad..6e0c874ae06 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15006.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15006.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:10.033",
- "lastModified": "2023-01-09T17:55:11.167",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:12.160",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in enigmaX up to 2.2. This issue affects the function getSeed of the file main.c of the component Scrambling Table Handler. The manipulation leads to predictable seed in pseudo-random number generator (prng). The attack may be initiated remotely. Upgrading to version 2.3 is able to address this issue. The name of the patch is 922bf90ca14a681629ba0b807a997a81d70225b5. It is recommended to upgrade the affected component. The identifier VDB-217181 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in enigmaX up to 2.2. This issue affects the function getSeed of the file main.c of the component Scrambling Table Handler. The manipulation leads to predictable seed in pseudo-random number generator (prng). The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 2.3 is able to address this issue. The identifier of the patch is 922bf90ca14a681629ba0b807a997a81d70225b5. It is recommended to upgrade the affected component. The identifier VDB-217181 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15007.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15007.json
index 093c9874310..f4d1523560e 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15007.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15007.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T19:15:10.387",
- "lastModified": "2023-01-09T19:04:24.293",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:12.247",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Centralized-Salesforce-Dev-Framework. It has been declared as problematic. Affected by this vulnerability is the function SObjectService of the file src/classes/SObjectService.cls of the component SOQL Handler. The manipulation of the argument orderDirection leads to injection. The name of the patch is db03ac5b8a9d830095991b529c067a030a0ccf7b. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217195."
+ "value": "A vulnerability was found in Centralized-Salesforce-Dev-Framework. It has been declared as problematic. Affected by this vulnerability is the function SObjectService of the file src/classes/SObjectService.cls of the component SOQL Handler. The manipulation of the argument orderDirection leads to injection. The patch is named db03ac5b8a9d830095991b529c067a030a0ccf7b. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217195."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15008.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15008.json
index c2470b7ce95..ef562166b3a 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15008.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15008.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T10:15:10.197",
- "lastModified": "2023-01-10T17:33:51.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:12.317",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in oxguy3 coebot-www and classified as problematic. This issue affects the function displayChannelCommands/displayChannelQuotes/displayChannelAutoreplies/showChannelHighlights/showChannelBoir of the file js/channel.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is c1a6c44092585da4236237e0e7da94ee2996a0ca. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217355."
+ "value": "A vulnerability was found in oxguy3 coebot-www and classified as problematic. This issue affects the function displayChannelCommands/displayChannelQuotes/displayChannelAutoreplies/showChannelHighlights/showChannelBoir of the file js/channel.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. The patch is named c1a6c44092585da4236237e0e7da94ee2996a0ca. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217355."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15010.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15010.json
index 88e3af06e89..08a63c58b8c 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15010.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15010.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T09:15:08.380",
- "lastModified": "2023-01-11T18:07:10.877",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:12.400",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in University of Cambridge django-ucamlookup up to 1.9.1. Affected by this vulnerability is an unknown functionality of the component Lookup Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.9.2 is able to address this issue. The name of the patch is 5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3. It is recommended to upgrade the affected component. The identifier VDB-217441 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in University of Cambridge django-ucamlookup up to 1.9.1. Affected by this vulnerability is an unknown functionality of the component Lookup Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.9.2 is able to address this issue. The identifier of the patch is 5e25e4765637ea4b9e0bf5fcd5e9a922abee7eb3. It is recommended to upgrade the affected component. The identifier VDB-217441 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15011.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15011.json
index e5cf6464616..0deaefcfefd 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15011.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15011.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T10:15:09.997",
- "lastModified": "2023-01-12T16:11:35.450",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:12.473",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in e-Contract dssp up to 1.3.1. Affected by this vulnerability is the function checkSignResponse of the file dssp-client/src/main/java/be/e_contract/dssp/client/SignResponseVerifier.java. The manipulation leads to xml external entity reference. Upgrading to version 1.3.2 is able to address this issue. The name of the patch is ec4238349691ec66dd30b416ec6eaab02d722302. It is recommended to upgrade the affected component. The identifier VDB-217549 was assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic was found in e-Contract dssp up to 1.3.1. Affected by this vulnerability is the function checkSignResponse of the file dssp-client/src/main/java/be/e_contract/dssp/client/SignResponseVerifier.java. The manipulation leads to xml external entity reference. Upgrading to version 1.3.2 is able to address this issue. The identifier of the patch is ec4238349691ec66dd30b416ec6eaab02d722302. It is recommended to upgrade the affected component. The identifier VDB-217549 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15012.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15012.json
index 5bd0a031f0f..a95b10303ee 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15012.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15012.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15012",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.530",
- "lastModified": "2023-01-12T19:00:37.500",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:12.543",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in forcedotcom SalesforceMobileSDK-Windows up to 4.x. It has been rated as critical. This issue affects the function ComputeCountSql of the file SalesforceSDK/SmartStore/Store/QuerySpec.cs. The manipulation leads to sql injection. Upgrading to version 5.0.0 is able to address this issue. The name of the patch is 83b3e91e0c1e84873a6d3ca3c5887eb5b4f5a3d8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217619. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in forcedotcom SalesforceMobileSDK-Windows up to 4.x. It has been rated as critical. This issue affects the function ComputeCountSql of the file SalesforceSDK/SmartStore/Store/QuerySpec.cs. The manipulation leads to sql injection. Upgrading to version 5.0.0 is able to address this issue. The patch is named 83b3e91e0c1e84873a6d3ca3c5887eb5b4f5a3d8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217619. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15014.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15014.json
index 2752c556946..2b8a2edfb98 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15014.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15014.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.310",
- "lastModified": "2023-01-12T20:40:19.197",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T10:15:12.623",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in CESNET theme-cesnet up to 1.x and classified as problematic. Affected by this vulnerability is an unknown functionality of the file cesnet/core/lostpassword/templates/resetpassword.php. The manipulation leads to insufficiently protected credentials. Attacking locally is a requirement. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is 2b857f2233ce5083b4d5bc9bfc4152f933c3e4a6. It is recommended to upgrade the affected component. The identifier VDB-217633 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in CESNET theme-cesnet up to 1.x on ownCloud and classified as problematic. Affected by this vulnerability is an unknown functionality of the file cesnet/core/lostpassword/templates/resetpassword.php. The manipulation leads to insufficiently protected credentials. Attacking locally is a requirement. Upgrading to version 2.0.0 is able to address this issue. The identifier of the patch is 2b857f2233ce5083b4d5bc9bfc4152f933c3e4a6. It is recommended to upgrade the affected component. The identifier VDB-217633 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15015.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15015.json
index 5c016398e48..fa4b9a99f8f 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15015.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15015.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T18:15:10.023",
- "lastModified": "2023-01-12T23:39:22.993",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T11:15:08.203",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in viafintech Barzahlen Payment Module PHP SDK up to 2.0.0. Affected is the function verify of the file src/Webhook.php. The manipulation leads to observable timing discrepancy. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is 3e7d29dc0ca6c054a6d6e211f32dae89078594c1. It is recommended to upgrade the affected component. VDB-217650 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, was found in viafintech Barzahlen Payment Module PHP SDK up to 2.0.0. Affected is the function verify of the file src/Webhook.php. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as 3e7d29dc0ca6c054a6d6e211f32dae89078594c1. It is recommended to upgrade the affected component. VDB-217650 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15016.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15016.json
index 00386deede5..7e296ddc5ba 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15016.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15016.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T18:15:10.117",
- "lastModified": "2023-01-12T23:39:44.593",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T11:15:08.373",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in mrtnmtth joomla_mod_einsatz_stats up to 0.2. It has been classified as critical. This affects the function getStatsByType of the file helper.php. The manipulation of the argument year leads to sql injection. Upgrading to version 0.3 is able to address this issue. The name of the patch is 27c1b443cff45c81d9d7d926a74c76f8b6ffc6cb. It is recommended to upgrade the affected component. The identifier VDB-217653 was assigned to this vulnerability."
+ "value": "A vulnerability was found in mrtnmtth joomla_mod_einsatz_stats up to 0.2. It has been classified as critical. This affects the function getStatsByType of the file helper.php. The manipulation of the argument year leads to sql injection. Upgrading to version 0.3 is able to address this issue. The identifier of the patch is 27c1b443cff45c81d9d7d926a74c76f8b6ffc6cb. It is recommended to upgrade the affected component. The identifier VDB-217653 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15017.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15017.json
index 6d75d01c541..06be3307fd0 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15017.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15017.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15017",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-10T15:15:11.100",
- "lastModified": "2023-01-14T21:45:53.393",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T11:15:08.447",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in fabarea media_upload and classified as critical. This vulnerability affects the function getUploadedFileList of the file Classes/Service/UploadFileService.php. The manipulation leads to pathname traversal. Upgrading to version 0.9.0 is able to address this issue. The name of the patch is b25d42a4981072321c1a363311d8ea2a4ac8763a. It is recommended to upgrade the affected component. VDB-217786 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in fabarea media_upload on TYPO3 and classified as critical. This vulnerability affects the function getUploadedFileList of the file Classes/Service/UploadFileService.php. The manipulation leads to pathname traversal. Upgrading to version 0.9.0 is able to address this issue. The patch is identified as b25d42a4981072321c1a363311d8ea2a4ac8763a. It is recommended to upgrade the affected component. VDB-217786 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15018.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15018.json
index 978972bed8f..14c169f56fb 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15018.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15018.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T19:15:09.167",
- "lastModified": "2023-01-24T18:56:39.407",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T11:15:08.523",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in krail-jpa up to 0.9.1. It has been classified as critical. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version 0.9.2 is able to address this issue. The name of the patch is c1e848665492e21ef6cc9be443205e36b9a1f6be. It is recommended to upgrade the affected component. The identifier VDB-218373 was assigned to this vulnerability."
+ "value": "A vulnerability was found in krail-jpa up to 0.9.1. It has been classified as critical. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version 0.9.2 is able to address this issue. The identifier of the patch is c1e848665492e21ef6cc9be443205e36b9a1f6be. It is recommended to upgrade the affected component. The identifier VDB-218373 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15019.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15019.json
index 6bd2c112c4b..dd4d9abc7d0 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15019.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15019.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15019",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T19:15:09.247",
- "lastModified": "2023-01-24T18:44:26.860",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T11:15:08.610",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in tombh jekbox. It has been rated as problematic. This issue affects some unknown processing of the file lib/server.rb. The manipulation leads to exposure of information through directory listing. The attack may be initiated remotely. The name of the patch is 64eb2677671018fc08b96718b81e3dbc83693190. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218375."
+ "value": "A vulnerability was found in tombh jekbox. It has been rated as problematic. This issue affects some unknown processing of the file lib/server.rb. The manipulation leads to exposure of information through directory listing. The attack may be initiated remotely. The patch is named 64eb2677671018fc08b96718b81e3dbc83693190. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218375."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15020.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15020.json
index 6437d8337d6..caf927b8bce 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15020.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15020.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15020",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T11:15:10.147",
- "lastModified": "2023-01-24T15:45:07.107",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T11:15:08.683",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in liftkit database up to 2.13.1. It has been classified as critical. This affects the function processOrderBy of the file src/Query/Query.php. The manipulation leads to sql injection. Upgrading to version 2.13.2 is able to address this issue. The name of the patch is 42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218391."
+ "value": "A vulnerability was found in liftkit database up to 2.13.1. It has been classified as critical. This affects the function processOrderBy of the file src/Query/Query.php. The manipulation leads to sql injection. Upgrading to version 2.13.2 is able to address this issue. The patch is named 42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218391."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15021.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15021.json
index 0a81298a8f6..f845d5c1671 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15021.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15021.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T16:15:16.383",
- "lastModified": "2023-01-24T19:11:01.587",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T11:15:08.753",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in nickzren alsdb. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. Upgrading to version v2 is able to address this issue. The name of the patch is cbc79a68145e845f951113d184b4de207c341599. It is recommended to upgrade the affected component. The identifier VDB-218429 was assigned to this vulnerability."
+ "value": "A vulnerability was found in nickzren alsdb. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. Upgrading to version v2 is able to address this issue. The identifier of the patch is cbc79a68145e845f951113d184b4de207c341599. It is recommended to upgrade the affected component. The identifier VDB-218429 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15022.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15022.json
index 1806f706c24..95b2490d631 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15022.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15022.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-29T19:15:08.940",
- "lastModified": "2023-02-07T18:46:07.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T11:15:08.827",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in mosbth cimage up to 0.7.18. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file check_system.php. The manipulation of the argument $_SERVER['SERVER_SOFTWARE'] leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.7.19 is able to address this issue. The name of the patch is 401478c8393989836beeddfeac5ce44570af162b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-219715."
+ "value": "A vulnerability was found in mosbth cimage up to 0.7.18. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file check_system.php. The manipulation of the argument $_SERVER['SERVER_SOFTWARE'] leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.7.19 is able to address this issue. The patch is named 401478c8393989836beeddfeac5ce44570af162b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-219715."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15023.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15023.json
index 8034a446f56..fc5c4cc8808 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15023.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15023.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-31T20:15:09.467",
- "lastModified": "2023-02-08T22:19:58.580",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T11:15:08.913",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in SiteFusion Application Server up to 6.6.6. This affects an unknown part of the file getextension.php of the component Extension Handler. The manipulation leads to path traversal. Upgrading to version 6.6.7 is able to address this issue. The name of the patch is 49fff155c303d6cd06ce8f97bba56c9084bf08ac. It is recommended to upgrade the affected component. The identifier VDB-219765 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, was found in SiteFusion Application Server up to 6.6.6. This affects an unknown part of the file getextension.php of the component Extension Handler. The manipulation leads to path traversal. Upgrading to version 6.6.7 is able to address this issue. The identifier of the patch is 49fff155c303d6cd06ce8f97bba56c9084bf08ac. It is recommended to upgrade the affected component. The identifier VDB-219765 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15024.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15024.json
index 01a0956025d..ef9390cdbe7 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15024.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15024.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15024",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-19T18:15:10.067",
- "lastModified": "2023-03-07T15:13:27.360",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T11:15:08.997",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in doomsider shadow. It has been classified as problematic. Affected is an unknown function. The manipulation leads to denial of service. Attacking locally is a requirement. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is 3332c5ba9ec3014ddc74e2147190a050eee97bc0. It is recommended to apply a patch to fix this issue. VDB-221478 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in doomsider shadow. It has been classified as problematic. Affected is an unknown function. The manipulation leads to denial of service. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as 3332c5ba9ec3014ddc74e2147190a050eee97bc0. It is recommended to apply a patch to fix this issue. VDB-221478 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15026.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15026.json
index b8912a80a77..d50e8ed8ded 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15026.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15026.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15026",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T11:15:12.617",
- "lastModified": "2023-03-01T14:59:34.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:21.933",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in 3breadt dd-plist 1.17 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. An attack has to be approached locally. Upgrading to version 1.18 is able to address this issue. The name of the patch is 8c954e8d9f6f6863729e50105a8abf3f87fff74c. It is recommended to upgrade the affected component. VDB-221486 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in 3breadt dd-plist 1.17 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference. An attack has to be approached locally. Upgrading to version 1.18 is able to address this issue. The patch is identified as 8c954e8d9f6f6863729e50105a8abf3f87fff74c. It is recommended to upgrade the affected component. VDB-221486 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15027.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15027.json
index 0f85f2a799b..331e446e373 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15027.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15027.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T17:15:11.273",
- "lastModified": "2023-03-01T17:52:03.293",
+ "lastModified": "2023-10-24T20:18:05.587",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in meta4creations Post Duplicator Plugin 2.18. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post-duplicated leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.19 is able to address this issue. The name of the patch is ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221496."
+ "value": "A vulnerability was found in meta4creations Post Duplicator Plugin 2.18 on WordPress. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post-duplicated leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.19 is able to address this issue. The name of the patch is ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221496."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15028.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15028.json
index 4b79a21d4d5..bb1f391e7d6 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15028.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15028.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15028",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-12T15:15:28.117",
- "lastModified": "2023-03-17T15:31:35.407",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.153",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in ICEPAY REST-API-NET 0.9. It has been declared as problematic. Affected by this vulnerability is the function RestClient of the file Classes/RestClient.cs of the component Checksum Validation. The manipulation leads to improper validation of integrity check value. The attack can be launched remotely. Upgrading to version 1.0 is able to address this issue. The name of the patch is 61f6b8758e5c971abff5f901cfa9f231052b775f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222847."
+ "value": "A vulnerability was found in ICEPAY REST-API-NET 0.9. It has been declared as problematic. Affected by this vulnerability is the function RestClient of the file Classes/RestClient.cs of the component Checksum Validation. The manipulation leads to improper validation of integrity check value. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 1.0 is able to address this issue. The patch is named 61f6b8758e5c971abff5f901cfa9f231052b775f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222847."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15029.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15029.json
index 054ba42ba9a..2e26db6447c 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15029.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15029.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-21T11:15:10.103",
- "lastModified": "2023-03-24T17:09:46.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.233",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in Ydalb mapicoin up to 1.9.0 and classified as problematic. This vulnerability affects unknown code of the file webroot/stats.php. The manipulation of the argument link/search leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.10.0 is able to address this issue. The name of the patch is 67e87f0f0c1ac238fcd050f4c3db298229bc9679. It is recommended to upgrade the affected component. VDB-223402 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in Ydalb mapicoin up to 1.9.0 and classified as problematic. This vulnerability affects unknown code of the file webroot/stats.php. The manipulation of the argument link/search leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.10.0 is able to address this issue. The patch is identified as 67e87f0f0c1ac238fcd050f4c3db298229bc9679. It is recommended to upgrade the affected component. VDB-223402 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15030.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15030.json
index e7d1d819e05..ca5ddd3a210 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15030.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15030.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T18:15:09.467",
- "lastModified": "2023-03-30T18:42:59.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.307",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in Arno0x TwoFactorAuth. This affects an unknown part of the file login/login.php. The manipulation of the argument from leads to open redirect. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The name of the patch is 8549ad3cf197095f783643e41333586d6a4d0e54. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-223803."
+ "value": "A vulnerability classified as problematic has been found in Arno0x TwoFactorAuth. This affects an unknown part of the file login/login.php. The manipulation of the argument from leads to open redirect. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 8549ad3cf197095f783643e41333586d6a4d0e54. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-223803."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15031.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15031.json
index ebb9364ae56..1f8a2212200 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15031.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15031.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15031",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-06T01:15:08.827",
- "lastModified": "2023-05-12T16:22:35.657",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.377",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in PHP-Login 1.0. It has been declared as critical. This vulnerability affects the function checkLogin of the file login/scripts/class.loginscript.php of the component POST Parameter Handler. The manipulation of the argument myusername leads to sql injection. The attack can be initiated remotely. Upgrading to version 2.0 is able to address this issue. The name of the patch is 0083ec652786ddbb81335ea20da590df40035679. It is recommended to upgrade the affected component. VDB-228022 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in PHP-Login 1.0. It has been declared as critical. This vulnerability affects the function checkLogin of the file login/scripts/class.loginscript.php of the component POST Parameter Handler. The manipulation of the argument myusername leads to sql injection. The attack can be initiated remotely. Upgrading to version 2.0 is able to address this issue. The patch is identified as 0083ec652786ddbb81335ea20da590df40035679. It is recommended to upgrade the affected component. VDB-228022 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json
index 22860dd24b0..efefa845530 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json
@@ -2,12 +2,12 @@
"id": "CVE-2016-15032",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T00:15:09.443",
- "lastModified": "2023-06-09T14:03:36.020",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.460",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This affects the function stopOutput of the file class.tx_mhhttpbl.php. The manipulation of the argument $_SERVER['REMOTE_ADDR'] leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.1.8 is able to address this issue. The name of the patch is a754bf306a433a8c18b55e25595593e8f19b9463. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230391. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in mback2k mh_httpbl Extension up to 1.1.7 on TYPO3. This affects the function stopOutput of the file class.tx_mhhttpbl.php. The manipulation of the argument $_SERVER['REMOTE_ADDR'] leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.1.8 is able to address this issue. The patch is named a754bf306a433a8c18b55e25595593e8f19b9463. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230391. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-58xx/CVE-2016-5848.json b/CVE-2016/CVE-2016-58xx/CVE-2016-5848.json
index 1b4fc0df1cf..cfb1d77427d 100644
--- a/CVE-2016/CVE-2016-58xx/CVE-2016-5848.json
+++ b/CVE-2016/CVE-2016-58xx/CVE-2016-5848.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-5848",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-07-04T16:59:01.863",
- "lastModified": "2023-10-13T16:45:10.723",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T19:05:40.837",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,13 +15,13 @@
}
],
"metrics": {
- "cvssMetricV30": [
+ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
- "version": "3.0",
- "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@@ -84,7 +84,15 @@
"nodes": [
{
"operator": "OR",
- "negate": false
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "8.07",
+ "matchCriteriaId": "528009F7-CD1B-44E6-8C83-994B047DBB1D"
+ }
+ ]
}
]
}
@@ -92,7 +100,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/91525",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-444217.pdf",
@@ -103,7 +115,11 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-182-02",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2016/CVE-2016-58xx/CVE-2016-5849.json b/CVE-2016/CVE-2016-58xx/CVE-2016-5849.json
index 3f3f3c65650..3261462a04d 100644
--- a/CVE-2016/CVE-2016-58xx/CVE-2016-5849.json
+++ b/CVE-2016/CVE-2016-58xx/CVE-2016-5849.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-5849",
"sourceIdentifier": "cve@mitre.org",
"published": "2016-07-04T16:59:02.973",
- "lastModified": "2023-10-13T16:45:10.723",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T19:01:57.053",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,13 +15,13 @@
}
],
"metrics": {
- "cvssMetricV30": [
+ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
- "version": "3.0",
- "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
@@ -80,7 +80,15 @@
"nodes": [
{
"operator": "OR",
- "negate": false
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "8.07",
+ "matchCriteriaId": "528009F7-CD1B-44E6-8C83-994B047DBB1D"
+ }
+ ]
}
]
}
@@ -88,7 +96,11 @@
"references": [
{
"url": "http://www.securityfocus.com/bid/91525",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-444217.pdf",
@@ -99,7 +111,11 @@
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-182-02",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2016/CVE-2016-85xx/CVE-2016-8566.json b/CVE-2016/CVE-2016-85xx/CVE-2016-8566.json
index d304a15d096..b4419ac8d3f 100644
--- a/CVE-2016/CVE-2016-85xx/CVE-2016-8566.json
+++ b/CVE-2016/CVE-2016-85xx/CVE-2016-8566.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-8566",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2017-02-13T21:59:01.457",
- "lastModified": "2023-10-13T16:45:10.723",
+ "lastModified": "2023-10-17T19:02:23.327",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -15,13 +15,13 @@
}
],
"metrics": {
- "cvssMetricV30": [
+ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
- "version": "3.0",
- "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@@ -80,7 +80,15 @@
"nodes": [
{
"operator": "OR",
- "negate": false
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "8.00",
+ "matchCriteriaId": "D8ADE343-DBC6-4682-83AC-0B0F4593D4A9"
+ }
+ ]
}
]
}
diff --git a/CVE-2016/CVE-2016-85xx/CVE-2016-8567.json b/CVE-2016/CVE-2016-85xx/CVE-2016-8567.json
index 6e62edeed7e..62f5c4e29e0 100644
--- a/CVE-2016/CVE-2016-85xx/CVE-2016-8567.json
+++ b/CVE-2016/CVE-2016-85xx/CVE-2016-8567.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-8567",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2017-02-13T21:59:01.470",
- "lastModified": "2023-10-13T16:45:10.723",
+ "lastModified": "2023-10-17T19:02:27.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -15,13 +15,13 @@
}
],
"metrics": {
- "cvssMetricV30": [
+ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
- "version": "3.0",
- "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@@ -80,7 +80,15 @@
"nodes": [
{
"operator": "OR",
- "negate": false
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "8.00",
+ "matchCriteriaId": "D8ADE343-DBC6-4682-83AC-0B0F4593D4A9"
+ }
+ ]
}
]
}
diff --git a/CVE-2016/CVE-2016-91xx/CVE-2016-9156.json b/CVE-2016/CVE-2016-91xx/CVE-2016-9156.json
index 79fc80aece7..6c30edd0fe1 100644
--- a/CVE-2016/CVE-2016-91xx/CVE-2016-9156.json
+++ b/CVE-2016/CVE-2016-91xx/CVE-2016-9156.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-9156",
"sourceIdentifier": "productcert@siemens.com",
"published": "2016-12-05T08:59:00.190",
- "lastModified": "2023-10-13T16:45:10.723",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T19:02:15.173",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,13 +15,13 @@
}
],
"metrics": {
- "cvssMetricV30": [
+ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
- "version": "3.0",
- "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@@ -84,7 +84,15 @@
"nodes": [
{
"operator": "OR",
- "negate": false
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "8.09",
+ "matchCriteriaId": "7D677693-BF21-44C3-8B00-F5738C9E0267"
+ }
+ ]
}
]
}
diff --git a/CVE-2016/CVE-2016-91xx/CVE-2016-9157.json b/CVE-2016/CVE-2016-91xx/CVE-2016-9157.json
index eb9321f392e..b39cc17f392 100644
--- a/CVE-2016/CVE-2016-91xx/CVE-2016-9157.json
+++ b/CVE-2016/CVE-2016-91xx/CVE-2016-9157.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-9157",
"sourceIdentifier": "productcert@siemens.com",
"published": "2016-12-05T08:59:01.487",
- "lastModified": "2023-10-13T16:45:10.723",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T19:06:05.070",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -15,13 +15,13 @@
}
],
"metrics": {
- "cvssMetricV30": [
+ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
- "version": "3.0",
- "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@@ -84,7 +84,15 @@
"nodes": [
{
"operator": "OR",
- "negate": false
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "8.09",
+ "matchCriteriaId": "7D677693-BF21-44C3-8B00-F5738C9E0267"
+ }
+ ]
}
]
}
diff --git a/CVE-2017/CVE-2017-10004xx/CVE-2017-1000421.json b/CVE-2017/CVE-2017-10004xx/CVE-2017-1000421.json
index 2f3bfab6b3a..f779851b52d 100644
--- a/CVE-2017/CVE-2017-10004xx/CVE-2017-1000421.json
+++ b/CVE-2017/CVE-2017-10004xx/CVE-2017-1000421.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-1000421",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-01-02T19:29:00.300",
- "lastModified": "2019-04-30T19:22:00.353",
+ "lastModified": "2023-10-24T16:06:23.780",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:gifsicle_project:gifsicle:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:lcdf:gifsicle:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.89",
- "matchCriteriaId": "328907E1-BA7A-4E52-860E-FE290D6A736A"
+ "matchCriteriaId": "747001C2-6A5E-4B95-B051-6210646500F3"
}
]
}
diff --git a/CVE-2017/CVE-2017-181xx/CVE-2017-18120.json b/CVE-2017/CVE-2017-181xx/CVE-2017-18120.json
index 92c0ae3669d..9de7f99f158 100644
--- a/CVE-2017/CVE-2017-181xx/CVE-2017-18120.json
+++ b/CVE-2017/CVE-2017-181xx/CVE-2017-18120.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-18120",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-02-02T09:29:00.227",
- "lastModified": "2018-02-14T18:21:43.230",
+ "lastModified": "2023-10-24T16:06:23.780",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:gifsicle_project:gifsicle:1.90:*:*:*:*:*:*:*",
- "matchCriteriaId": "AE6734C4-013D-481F-8E4D-C5F57520276D"
+ "criteria": "cpe:2.3:a:lcdf:gifsicle:1.90:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3CDD745B-40DB-4F6E-8E7D-1457F8BD0179"
}
]
}
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20151.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20151.json
index 98b88336e6f..1584a621391 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20151.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20151.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20151",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:08.730",
- "lastModified": "2023-01-09T17:50:29.840",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.567",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in iText RUPS. This vulnerability affects unknown code of the file src/main/java/com/itextpdf/rups/model/XfaFile.java. The manipulation leads to xml external entity reference. The name of the patch is ac5590925874ef810018a6b60fec216eee54fb32. It is recommended to apply a patch to fix this issue. VDB-217054 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic was found in iText RUPS. This vulnerability affects unknown code of the file src/main/java/com/itextpdf/rups/model/XfaFile.java. The manipulation leads to xml external entity reference. The patch is identified as ac5590925874ef810018a6b60fec216eee54fb32. It is recommended to apply a patch to fix this issue. VDB-217054 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20152.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20152.json
index 5c3578adac3..91bb03129ce 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20152.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20152.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20152",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:08.817",
- "lastModified": "2023-01-09T17:48:12.673",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.647",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in aerouk imageserve. Affected is an unknown function of the file public/viewer.php of the component File Handler. The manipulation of the argument filelocation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is bd23c784f0e5cb12f66d15c100248449f87d72e2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217056."
+ "value": "A vulnerability, which was classified as problematic, was found in aerouk imageserve. Affected is an unknown function of the file public/viewer.php of the component File Handler. The manipulation of the argument filelocation leads to path traversal. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is bd23c784f0e5cb12f66d15c100248449f87d72e2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217056."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20153.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20153.json
index 94c00466a95..2fbd75a0633 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20153.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20153.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20153",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:08.910",
- "lastModified": "2023-01-09T17:47:48.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.717",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in aerouk imageserve and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument REQUEST_URI leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2ac3cd4f90b4df66874fab171376ca26868604c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217057 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in aerouk imageserve and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument REQUEST_URI leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2ac3cd4f90b4df66874fab171376ca26868604c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217057 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20155.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20155.json
index c4243da759e..60952d8977a 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20155.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20155.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20155",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T23:15:08.883",
- "lastModified": "2023-01-06T19:05:20.837",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.787",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Sterc Google Analytics Dashboard for MODX up to 1.0.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file core/components/analyticsdashboardwidget/elements/tpl/widget.analytics.tpl of the component Internal Search. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.6 is able to address this issue. The name of the patch is 855d9560d3782c105568eedf9b22a769fbf29cc0. It is recommended to upgrade the affected component. The identifier VDB-217069 was assigned to this vulnerability."
+ "value": "A vulnerability was found in Sterc Google Analytics Dashboard for MODX up to 1.0.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file core/components/analyticsdashboardwidget/elements/tpl/widget.analytics.tpl of the component Internal Search. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.6 is able to address this issue. The identifier of the patch is 855d9560d3782c105568eedf9b22a769fbf29cc0. It is recommended to upgrade the affected component. The identifier VDB-217069 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20156.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20156.json
index 8d977786d60..f11b73ff81c 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20156.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20156.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20156",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T10:15:09.183",
- "lastModified": "2023-01-06T21:34:48.440",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.853",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Exciting Printer and classified as critical. This issue affects some unknown processing of the file lib/printer/jobs/prepare_page.rb of the component Argument Handler. The manipulation of the argument URL leads to command injection. The name of the patch is 5f8c715d6e2cc000f621a6833f0a86a673462136. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217139."
+ "value": "A vulnerability was found in Exciting Printer and classified as critical. This issue affects some unknown processing of the file lib/printer/jobs/prepare_page.rb of the component Argument Handler. The manipulation of the argument URL leads to command injection. The patch is named 5f8c715d6e2cc000f621a6833f0a86a673462136. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217139."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20158.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20158.json
index 4bda703294a..85906645293 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20158.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20158.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20158",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T11:15:08.587",
- "lastModified": "2023-01-09T14:50:16.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.927",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in vova07 Yii2 FileAPI Widget up to 0.1.8. It has been declared as problematic. Affected by this vulnerability is the function run of the file actions/UploadAction.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.1.9 is able to address this issue. The name of the patch is c00d1e4fc912257fca1fce66d7a163bdbb4c8222. It is recommended to upgrade the affected component. The identifier VDB-217141 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in vova07 Yii2 FileAPI Widget up to 0.1.8. It has been declared as problematic. Affected by this vulnerability is the function run of the file actions/UploadAction.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.1.9 is able to address this issue. The identifier of the patch is c00d1e4fc912257fca1fce66d7a163bdbb4c8222. It is recommended to upgrade the affected component. The identifier VDB-217141 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20159.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20159.json
index 83fdfd6af45..006640e7d1c 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20159.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20159.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20159",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T11:15:10.750",
- "lastModified": "2023-01-09T14:51:28.013",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:22.997",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in rf Keynote up to 0.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/keynote/rumble.rb. The manipulation of the argument value leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It is recommended to upgrade the affected component. VDB-217142 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in rf Keynote up to 0.x on Rails. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/keynote/rumble.rb. The manipulation of the argument value leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.0.0 is able to address this issue. The patch is identified as 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It is recommended to upgrade the affected component. VDB-217142 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20160.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20160.json
index 6d02bf6e8cb..ec55271a0ff 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20160.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20160.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20160",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T20:15:08.693",
- "lastModified": "2023-01-09T15:08:53.543",
+ "lastModified": "2023-10-24T20:21:14.883",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file lib/fetchParams.js. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability."
+ "value": "A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file lib/fetchParams.js. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The identifier of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability."
}
],
"metrics": {
@@ -83,8 +83,18 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -116,24 +126,21 @@
"url": "https://github.com/flitto/express-param/commit/db94f7391ad0a16dcfcba8b9be1af385b25c42db",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/flitto/express-param/pull/19",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/flitto/express-param/releases/tag/1.0.0",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20161.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20161.json
index 934f4aa92ff..5c85085f97f 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20161.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20161.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20161",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T16:15:10.530",
- "lastModified": "2023-01-09T18:40:45.673",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:23.123",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in rofl0r MacGeiger. Affected is the function dump_wlan_at of the file macgeiger.c of the component ESSID Handler. The manipulation leads to injection. Access to the local network is required for this attack to succeed. The name of the patch is 57f1dd50a4821b8c8e676e8020006ae4bfd3c9cb. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217188."
+ "value": "A vulnerability classified as problematic has been found in rofl0r MacGeiger. Affected is the function dump_wlan_at of the file macgeiger.c of the component ESSID Handler. The manipulation leads to injection. Access to the local network is required for this attack to succeed. The complexity of an attack is rather high. The exploitability is told to be difficult. The name of the patch is 57f1dd50a4821b8c8e676e8020006ae4bfd3c9cb. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217188."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20162.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20162.json
index 1e5c33e36e8..f2115729392 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20162.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20162.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20162",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T12:15:09.167",
- "lastModified": "2023-01-11T19:29:46.180",
+ "lastModified": "2023-10-24T20:21:25.683",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in vercel ms up to 1.x. This issue affects the function parse of the file index.js. The manipulation of the argument str leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is caae2988ba2a37765d055c4eee63d383320ee662. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217451."
+ "value": "A vulnerability, which was classified as problematic, has been found in vercel ms up to 1.x. This issue affects the function parse of the file index.js. The manipulation of the argument str leads to inefficient regular expression complexity. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The patch is named caae2988ba2a37765d055c4eee63d383320ee662. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217451."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-1333"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1333"
+ }
+ ]
}
],
"configurations": [
@@ -116,8 +126,7 @@
"url": "https://github.com/vercel/ms/commit/caae2988ba2a37765d055c4eee63d383320ee662",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
@@ -126,8 +135,7 @@
"tags": [
"Exploit",
"Issue Tracking",
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
@@ -135,8 +143,7 @@
"source": "cna@vuldb.com",
"tags": [
"Patch",
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20164.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20164.json
index 60e10f50408..bbac87d727f 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20164.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20164.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20164",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.407",
- "lastModified": "2023-01-12T20:28:25.380",
+ "lastModified": "2023-10-24T20:22:35.807",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Symbiote Seed up to 6.0.2. It has been classified as critical. Affected is the function onBeforeSecurityLogin of the file code/extensions/SecurityLoginExtension.php of the component Login. The manipulation of the argument URL leads to open redirect. It is possible to launch the attack remotely. Upgrading to version 6.0.3 is able to address this issue. The name of the patch is b065ebd82da53009d273aa7e989191f701485244. It is recommended to upgrade the affected component. VDB-217626 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Symbiote Seed up to 6.0.2. It has been classified as critical. Affected is the function onBeforeSecurityLogin of the file code/extensions/SecurityLoginExtension.php of the component Login. The manipulation of the argument URL leads to open redirect. It is possible to launch the attack remotely. Upgrading to version 6.0.3 is able to address this issue. The patch is identified as b065ebd82da53009d273aa7e989191f701485244. It is recommended to upgrade the affected component. VDB-217626 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-601"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-601"
+ }
+ ]
}
],
"configurations": [
@@ -102,10 +112,10 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:symbiote:seed:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:symbiote:seed:*:*:*:*:*:silverstripe:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.0.3",
- "matchCriteriaId": "1B58B01E-BC9E-4F38-A9BF-D6DBDD6116DA"
+ "matchCriteriaId": "BF29C280-2F4C-4D85-B532-CBBD8EBDEE20"
}
]
}
@@ -117,15 +127,14 @@
"url": "https://github.com/symbiote/silverstripe-seed/commit/b065ebd82da53009d273aa7e989191f701485244",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/symbiote/silverstripe-seed/releases/tag/6.0.3",
"source": "cna@vuldb.com",
"tags": [
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20165.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20165.json
index 0c9610bea89..15c10ef94c4 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20165.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20165.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20165",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T10:15:10.447",
- "lastModified": "2023-01-17T17:16:38.380",
+ "lastModified": "2023-10-24T19:24:23.493",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in debug-js debug up to 3.0.x. This affects the function useColors of the file src/node.js. The manipulation of the argument str leads to inefficient regular expression complexity. Upgrading to version 3.1.0 is able to address this issue. The name of the patch is c38a0166c266a679c8de012d4eaccec3f944e685. It is recommended to upgrade the affected component. The identifier VDB-217665 was assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic has been found in debug-js debug up to 3.0.x. This affects the function useColors of the file src/node.js. The manipulation of the argument str leads to inefficient regular expression complexity. Upgrading to version 3.1.0 is able to address this issue. The identifier of the patch is c38a0166c266a679c8de012d4eaccec3f944e685. It is recommended to upgrade the affected component. The identifier VDB-217665 was assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-1333"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1333"
+ }
+ ]
}
],
"configurations": [
@@ -123,24 +133,21 @@
"url": "https://github.com/debug-js/debug/commit/c38a0166c266a679c8de012d4eaccec3f944e685",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/debug-js/debug/pull/504",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/debug-js/debug/releases/tag/3.1.0",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20167.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20167.json
index 45099f9f8dd..a10e2f2b654 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20167.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20167.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20167",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-14T20:15:09.390",
- "lastModified": "2023-01-25T15:59:21.867",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:23.417",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in Minichan. This affects an unknown part of the file reports.php. The manipulation of the argument headline leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is fc0e732e58630cba318d6bf49d1388a7aa9d390e. It is recommended to apply a patch to fix this issue. The identifier VDB-217785 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, was found in Minichan. This affects an unknown part of the file reports.php. The manipulation of the argument headline leads to cross site scripting. It is possible to initiate the attack remotely. The identifier of the patch is fc0e732e58630cba318d6bf49d1388a7aa9d390e. It is recommended to apply a patch to fix this issue. The identifier VDB-217785 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20168.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20168.json
index 50c12d03c30..d59de575852 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20168.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20168.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20168",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T15:15:09.000",
- "lastModified": "2023-01-19T14:35:52.030",
+ "lastModified": "2023-10-24T19:24:56.207",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in jfm-so piWallet. It has been rated as critical. Affected by this issue is some unknown functionality of the file api.php. The manipulation of the argument key leads to sql injection. The name of the patch is b420f8c4cbe7f06a34d1b05e90ee5cdfe0aa83bb. It is recommended to apply a patch to fix this issue. VDB-218006 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in jfm-so piWallet. It has been rated as critical. Affected by this issue is some unknown functionality of the file api.php. The manipulation of the argument key leads to sql injection. The patch is identified as b420f8c4cbe7f06a34d1b05e90ee5cdfe0aa83bb. It is recommended to apply a patch to fix this issue. VDB-218006 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -116,16 +126,14 @@
"url": "https://github.com/jfm-so/piWallet/commit/b420f8c4cbe7f06a34d1b05e90ee5cdfe0aa83bb",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/jfm-so/piWallet/pull/23",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20169.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20169.json
index 2fe333a2f2c..2f9608766a2 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20169.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20169.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20169",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T21:15:15.207",
- "lastModified": "2023-01-23T18:38:16.927",
+ "lastModified": "2023-10-24T19:25:12.617",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in GGGGGGGG ToN-MasterServer. Affected by this issue is some unknown functionality of the file public_html/irc_updater/svr_request_pub.php. The manipulation leads to sql injection. The name of the patch is 3a4c7e6d51bf95760820e3245e06c6e321a7168a. It is recommended to apply a patch to fix this issue. VDB-218306 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, has been found in GGGGGGGG ToN-MasterServer. Affected by this issue is some unknown functionality of the file public_html/irc_updater/svr_request_pub.php. The manipulation leads to sql injection. The patch is identified as 3a4c7e6d51bf95760820e3245e06c6e321a7168a. It is recommended to apply a patch to fix this issue. VDB-218306 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -116,8 +126,7 @@
"url": "https://github.com/GGGGGGGG/ToN-MasterServer/commit/3a4c7e6d51bf95760820e3245e06c6e321a7168a",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20170.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20170.json
index 18e909077cf..b97a75a7ed4 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20170.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20170.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20170",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T14:15:10.613",
- "lastModified": "2023-01-24T19:09:45.227",
+ "lastModified": "2023-10-24T19:25:19.817",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in ollpu parontalli. It has been classified as critical. Affected is an unknown function of the file httpdocs/index.php. The manipulation of the argument s leads to sql injection. The name of the patch is 6891bb2dec57dca6daabc15a6d2808c8896620e5. It is recommended to apply a patch to fix this issue. VDB-218418 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in ollpu parontalli. It has been classified as critical. Affected is an unknown function of the file httpdocs/index.php. The manipulation of the argument s leads to sql injection. The patch is identified as 6891bb2dec57dca6daabc15a6d2808c8896620e5. It is recommended to apply a patch to fix this issue. VDB-218418 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -116,8 +126,7 @@
"url": "https://github.com/ollpu/parontalli/commit/6891bb2dec57dca6daabc15a6d2808c8896620e5",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20171.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20171.json
index f2c8bec3506..7e67dd992d7 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20171.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20171.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20171",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T23:15:15.417",
- "lastModified": "2023-01-24T19:35:13.600",
+ "lastModified": "2023-10-24T19:25:26.293",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in PrivateSky apersistence. This affects an unknown part of the file db/sql/mysqlUtils.js. The manipulation leads to sql injection. The name of the patch is 954425f61634b556fe644837a592a5b8fcfca068. It is recommended to apply a patch to fix this issue. The identifier VDB-218457 was assigned to this vulnerability."
+ "value": "A vulnerability classified as critical has been found in PrivateSky apersistence. This affects an unknown part of the file db/sql/mysqlUtils.js. The manipulation leads to sql injection. The identifier of the patch is 954425f61634b556fe644837a592a5b8fcfca068. It is recommended to apply a patch to fix this issue. The identifier VDB-218457 was assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20172.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20172.json
index 6423025eed1..bafbff67dd2 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20172.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20172.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20172",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T15:15:11.083",
- "lastModified": "2023-01-25T19:07:55.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:23.780",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in ridhoq soundslike. It has been classified as critical. Affected is the function get_song_relations of the file app/api/songs.py. The manipulation leads to sql injection. The name of the patch is 90bb4fb667d9253d497b619b9adaac83bf0ce0f8. It is recommended to apply a patch to fix this issue. VDB-218490 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in ridhoq soundslike. It has been classified as critical. Affected is the function get_song_relations of the file app/api/songs.py. The manipulation leads to sql injection. The patch is identified as 90bb4fb667d9253d497b619b9adaac83bf0ce0f8. It is recommended to apply a patch to fix this issue. VDB-218490 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20174.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20174.json
index f56bac1d581..f63dd5443d9 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20174.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20174.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20174",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T08:15:12.620",
- "lastModified": "2023-01-25T21:12:37.163",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:23.880",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in bastianallgeier Kirby Webmentions Plugin and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to injection. The attack may be launched remotely. The name of the patch is 55bedea78ae9af916a9a41497bd9996417851502. It is recommended to apply a patch to fix this issue. VDB-218894 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in bastianallgeier Kirby Webmentions Plugin and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The patch is identified as 55bedea78ae9af916a9a41497bd9996417851502. It is recommended to apply a patch to fix this issue. VDB-218894 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20175.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20175.json
index e5072a0c3f1..be6482298f9 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20175.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20175.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20175",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-05T20:15:08.393",
- "lastModified": "2023-02-14T16:58:31.517",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:23.957",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2. This affects an unknown part of the file Piwik.hooks.php of the component Username Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.4.3 is able to address this issue. The name of the patch is 681324e4f518a8af4bd1f93867074c728eb9923d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220203."
+ "value": "A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2 on MediaWiki. This affects an unknown part of the file Piwik.hooks.php of the component Username Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.4.3 is able to address this issue. The patch is named 681324e4f518a8af4bd1f93867074c728eb9923d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220203."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20177.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20177.json
index 2136f0fd7a4..c2354ff0247 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20177.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20177.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20177",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T20:15:10.763",
- "lastModified": "2023-02-14T02:19:17.660",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T12:15:24.037",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in WangGuard Plugin 1.8.0. Affected by this issue is the function wangguard_users_info of the file wangguard-user-info.php of the component WGG User List Handler. The manipulation of the argument userIP leads to cross site scripting. The attack may be launched remotely. The name of the patch is 88414951e30773c8d2ec13b99642688284bf3189. It is recommended to apply a patch to fix this issue. VDB-220214 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in WangGuard Plugin 1.8.0 on WordPress. Affected by this issue is the function wangguard_users_info of the file wangguard-user-info.php of the component WGG User List Handler. The manipulation of the argument userIP leads to cross site scripting. The attack may be launched remotely. The patch is identified as 88414951e30773c8d2ec13b99642688284bf3189. It is recommended to apply a patch to fix this issue. VDB-220214 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20178.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20178.json
index 8ef46c2c8f1..bb4ec7d06cd 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20178.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20178.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20178",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T18:15:11.600",
- "lastModified": "2023-03-02T22:51:38.910",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:07.687",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Codiad 2.8.0. It has been rated as problematic. Affected by this issue is the function saveJSON of the file components/install/process.php. The manipulation of the argument data leads to information disclosure. The attack may be launched remotely. Upgrading to version 2.8.1 is able to address this issue. The name of the patch is 517119de673e62547ee472a730be0604f44342b5. It is recommended to upgrade the affected component. VDB-221498 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Codiad 2.8.0. It has been rated as problematic. Affected by this issue is the function saveJSON of the file components/install/process.php. The manipulation of the argument data leads to information disclosure. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 2.8.1 is able to address this issue. The patch is identified as 517119de673e62547ee472a730be0604f44342b5. It is recommended to upgrade the affected component. VDB-221498 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20179.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20179.json
index e6f652a0d61..edee6e5c3d6 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20179.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20179.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20179",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T21:15:10.713",
- "lastModified": "2023-03-02T22:48:05.973",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:07.847",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in InSTEDD Pollit 2.3.1. It has been rated as critical. This issue affects the function TourController of the file app/controllers/tour_controller.rb. The manipulation leads to an unknown weakness. The attack may be initiated remotely. Upgrading to version 2.3.2 is able to address this issue. The name of the patch is 6ef04f8b5972d5f16f8b86f8b53f62fac68d5498. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221507."
+ "value": "A vulnerability was found in InSTEDD Pollit 2.3.1. It has been rated as critical. This issue affects the function TourController of the file app/controllers/tour_controller.rb. The manipulation leads to an unknown weakness. The attack may be initiated remotely. Upgrading to version 2.3.2 is able to address this issue. The patch is named 6ef04f8b5972d5f16f8b86f8b53f62fac68d5498. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221507."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20180.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20180.json
index c4254151043..ec89a873010 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20180.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20180.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20180",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T11:15:09.813",
- "lastModified": "2023-03-11T02:13:16.340",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:07.900",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in Zerocoin libzerocoin. Affected is the function CoinSpend::CoinSpend of the file CoinSpend.cpp of the component Proof Handler. The manipulation leads to insufficient verification of data authenticity. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is ce103a09ec079d0a0ed95475992348bed6e860de. It is recommended to apply a patch to fix this issue. VDB-222318 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as critical has been found in Zerocoin libzerocoin. Affected is the function CoinSpend::CoinSpend of the file CoinSpend.cpp of the component Proof Handler. The manipulation leads to insufficient verification of data authenticity. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as ce103a09ec079d0a0ed95475992348bed6e860de. It is recommended to apply a patch to fix this issue. VDB-222318 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20181.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20181.json
index a9e2b2773f0..4e941f2f8ca 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20181.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20181.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20181",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-07T00:15:09.040",
- "lastModified": "2023-03-14T17:53:51.463",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:07.970",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in hgzojer Vocable Trainer up to 1.3.0. This vulnerability affects unknown code of the file src/at/hgz/vocabletrainer/VocableTrainerProvider.java. The manipulation leads to path traversal. Attacking locally is a requirement. Upgrading to version 1.3.1 is able to address this issue. The name of the patch is accf6838078f8eb105cfc7865aba5c705fb68426. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222328."
+ "value": "A vulnerability classified as critical was found in hgzojer Vocable Trainer up to 1.3.0 on Android. This vulnerability affects unknown code of the file src/at/hgz/vocabletrainer/VocableTrainerProvider.java. The manipulation leads to path traversal. Attacking locally is a requirement. Upgrading to version 1.3.1 is able to address this issue. The name of the patch is accf6838078f8eb105cfc7865aba5c705fb68426. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222328."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20182.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20182.json
index a0ddcb0c5b2..836e25375ec 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20182.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20182.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20182",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T02:15:58.250",
- "lastModified": "2023-03-15T16:28:10.807",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:08.037",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Mobile Vikings Django AJAX Utilities up to 1.2.1 and classified as problematic. This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument url leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 329eb1dd1580ca1f9d4f95bc69939833226515c9. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222611."
+ "value": "A vulnerability was found in Mobile Vikings Django AJAX Utilities up to 1.2.1 and classified as problematic. This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument url leads to cross site scripting. The attack may be initiated remotely. The patch is named 329eb1dd1580ca1f9d4f95bc69939833226515c9. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222611."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20183.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20183.json
index 5bf7a0133a2..1f1d6e40769 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20183.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20183.json
@@ -2,12 +2,12 @@
"id": "CVE-2017-20183",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-05T01:15:08.550",
- "lastModified": "2023-05-11T17:37:24.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:08.103",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in External Media without Import Plugin up to 1.0.0 on WordPress. It has been declared as problematic. This vulnerability affects the function print_media_new_panel of the file external-media-without-import.php. The manipulation of the argument url/error/width/height/mime-type leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.0.1 is able to address this issue. The name of the patch is 9d2ecd159a6e2e3f710b4f1c28e2714f66502746. It is recommended to upgrade the affected component. VDB-227950 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in External Media without Import Plugin up to 1.0.0 on WordPress. It has been declared as problematic. This vulnerability affects the function print_media_new_panel of the file external-media-without-import.php. The manipulation of the argument url/error/width/height/mime-type leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.0.1 is able to address this issue. The patch is identified as 9d2ecd159a6e2e3f710b4f1c28e2714f66502746. It is recommended to upgrade the affected component. VDB-227950 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-86xx/CVE-2017-8625.json b/CVE-2017/CVE-2017-86xx/CVE-2017-8625.json
index d0e6a82a425..8c95cda46f8 100644
--- a/CVE-2017/CVE-2017-86xx/CVE-2017-8625.json
+++ b/CVE-2017/CVE-2017-86xx/CVE-2017-8625.json
@@ -2,8 +2,8 @@
"id": "CVE-2017-8625",
"sourceIdentifier": "secure@microsoft.com",
"published": "2017-08-08T21:29:00.797",
- "lastModified": "2019-10-03T00:03:26.223",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T19:15:08.883",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -137,12 +137,8 @@
]
},
{
- "url": "https://msitpros.com/?p=3909",
- "source": "secure@microsoft.com",
- "tags": [
- "Exploit",
- "Third Party Advisory"
- ]
+ "url": "https://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/",
+ "source": "secure@microsoft.com"
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8625",
diff --git a/CVE-2018/CVE-2018-167xx/CVE-2018-16739.json b/CVE-2018/CVE-2018-167xx/CVE-2018-16739.json
new file mode 100644
index 00000000000..250dbe95980
--- /dev/null
+++ b/CVE-2018/CVE-2018-167xx/CVE-2018-16739.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2018-16739",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T22:15:08.333",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered on certain ABUS TVIP devices. Due to a path traversal in /opt/cgi/admin/filewrite, an attacker can write to files, and thus execute code arbitrarily with root privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en ciertos dispositivos ABUS TVIP. Debido a un path traversal en /opt/cgi/admin/filewrite, un atacante puede escribir en archivos y, por lo tanto, ejecutar c\u00f3digo arbitrariamente con privilegios de root."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://sec.maride.cc/posts/abus/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2018/CVE-2018-175xx/CVE-2018-17558.json b/CVE-2018/CVE-2018-175xx/CVE-2018-17558.json
new file mode 100644
index 00000000000..1c294d71d8e
--- /dev/null
+++ b/CVE-2018/CVE-2018-175xx/CVE-2018-17558.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2018-17558",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T22:15:08.383",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Hardcoded manufacturer credentials and an OS command injection vulnerability in the /cgi-bin/mft/ directory on ABUS TVIP TVIP20050 LM.1.6.18, TVIP10051 LM.1.6.18, TVIP11050 MG.1.6.03.05, TVIP20550 LM.1.6.18, TVIP10050 LM.1.6.18, TVIP11550 MG.1.6.03, TVIP21050 MG.1.6.03, and TVIP51550 MG.1.6.03 cameras allow remote attackers to execute code as root."
+ },
+ {
+ "lang": "es",
+ "value": "Credenciales del fabricante codificadas y una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en el directorio /cgi-bin/mft/ en ABUS TVIP TVIP20050 LM.1.6.18, TVIP10051 LM.1.6.18, TVIP11050 MG.1.6.03.05, TVIP20550 LM.1.6.18, TVIP10050 LM.1.6.18, TVIP11550 MG.1.6.03, TVIP21050 MG.1.6.03, y TVIP51550 MG.1.6.03 c\u00e1maras permiten a atacantes remotos ejecutar c\u00f3digo como root."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://sec.maride.cc/posts/abus/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2018/CVE-2018-175xx/CVE-2018-17559.json b/CVE-2018/CVE-2018-175xx/CVE-2018-17559.json
new file mode 100644
index 00000000000..2a8a08919e6
--- /dev/null
+++ b/CVE-2018/CVE-2018-175xx/CVE-2018-17559.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2018-17559",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T22:15:08.430",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Due to incorrect access control, unauthenticated remote attackers can view the /video.mjpg video stream of certain ABUS TVIP cameras."
+ },
+ {
+ "lang": "es",
+ "value": "Debido a un control de acceso incorrecto, atacantes remotos no autenticados pueden ver la secuencia de v\u00eddeo /video.mjpg de determinadas c\u00e1maras ABUS TVIP."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://sec.maride.cc/posts/abus/#cve-2018-17559",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2018/CVE-2018-178xx/CVE-2018-17878.json b/CVE-2018/CVE-2018-178xx/CVE-2018-17878.json
new file mode 100644
index 00000000000..8ebb1c2b81c
--- /dev/null
+++ b/CVE-2018/CVE-2018-178xx/CVE-2018-17878.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2018-17878",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T22:15:08.473",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Buffer Overflow vulnerability in certain ABUS TVIP cameras allows attackers to gain control of the program via crafted string sent to sprintf() function."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de desbordamiento de b\u00fafer en ciertas c\u00e1maras ABUS TVIP permite a los atacantes obtener el control del programa a trav\u00e9s de una cadena manipulada enviada a la funci\u00f3n sprintf()."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://sec.maride.cc/posts/abus/#cve-2018-17878",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2018/CVE-2018-178xx/CVE-2018-17879.json b/CVE-2018/CVE-2018-178xx/CVE-2018-17879.json
new file mode 100644
index 00000000000..080c9cc4c62
--- /dev/null
+++ b/CVE-2018/CVE-2018-178xx/CVE-2018-17879.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2018-17879",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T22:15:08.517",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered on certain ABUS TVIP cameras. The CGI scripts allow remote attackers to execute code via system() as root. There are several injection points in various scripts."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en ciertas c\u00e1maras ABUS TVIP. Los scripts CGI permiten a atacantes remotos ejecutar c\u00f3digo a trav\u00e9s de system() como root. Hay varios puntos de inyecci\u00f3n en varios scripts."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://sec.maride.cc/posts/abus/#cve-2018-17879",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19358.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19358.json
index 683abe17eb8..bbbf3494942 100644
--- a/CVE-2018/CVE-2018-193xx/CVE-2018-19358.json
+++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19358.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-19358",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-11-18T19:29:00.297",
- "lastModified": "2020-08-24T17:37:01.140",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T16:15:08.697",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used."
+ "value": "** DISPUTED ** GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket."
},
{
"lang": "es",
@@ -103,6 +103,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652194#c8",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://github.com/sungjungk/keyring_crack",
"source": "cve@mitre.org",
@@ -111,6 +115,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://gitlab.gnome.org/GNOME/gnome-keyring/-/issues/5#note_1876550",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://www.youtube.com/watch?v=Do4E9ZQaPck",
"source": "cve@mitre.org",
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25057.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25057.json
index dc3c7d17a54..51da971a7e8 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25057.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25057.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T21:15:09.077",
- "lastModified": "2023-01-06T13:59:37.393",
+ "lastModified": "2023-10-18T16:01:59.167",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -77,8 +77,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:simple_php_link_shortener_project:simple_php_link_shortener:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "84FA1A57-7F26-4D5D-8E73-99A9CBF2E11F"
+ "criteria": "cpe:2.3:a:mikebharris:simple_php_link_shortener:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "541DF23E-D916-40FA-8C9C-25C6D796D608"
}
]
}
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25060.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25060.json
index 6678e75a785..5a6c54133ff 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25060.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25060.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25060",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:09.103",
- "lastModified": "2023-01-09T15:27:11.830",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:08.217",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file csrf.go. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. The attack may be launched remotely. The name of the patch is dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a patch to fix this issue. VDB-217058 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file csrf.go. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The patch is identified as dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a patch to fix this issue. VDB-217058 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25061.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25061.json
index 1f7f9ec4148..893fceab7c7 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25061.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25061.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T20:15:08.817",
- "lastModified": "2023-01-09T15:14:24.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:08.287",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. Upgrading to version 0.1.6 is able to address this issue. The name of the patch is 9e0c38594432edfa64136fdf7bb651835e17c34f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217151."
+ "value": "A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. Upgrading to version 0.1.6 is able to address this issue. The patch is named 9e0c38594432edfa64136fdf7bb651835e17c34f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217151."
}
],
"metrics": {
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25062.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25062.json
index 6961e55464c..74b271c2bc4 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25062.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25062.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T09:15:09.690",
- "lastModified": "2023-01-09T17:13:25.427",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:08.347",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in flar2 ElementalX up to 6.x. Affected is the function xfrm_dump_policy_done of the file net/xfrm/xfrm_user.c of the component ipsec. The manipulation leads to denial of service. Upgrading to version 7.00 is able to address this issue. The name of the patch is 1df72c9f0f61304437f4f1037df03b5fb36d5a79. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217152."
+ "value": "A vulnerability classified as problematic has been found in flar2 ElementalX up to 6.x on Nexus 9. Affected is the function xfrm_dump_policy_done of the file net/xfrm/xfrm_user.c of the component ipsec. The manipulation leads to denial of service. Upgrading to version 7.00 is able to address this issue. The name of the patch is 1df72c9f0f61304437f4f1037df03b5fb36d5a79. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217152."
}
],
"metrics": {
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25063.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25063.json
index 399e2db36cd..88dcdbde427 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25063.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25063.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25063",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T09:15:09.780",
- "lastModified": "2023-01-09T17:17:15.917",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:08.410",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in Zenoss Dashboard up to 1.3.4. Affected by this vulnerability is an unknown functionality of the file ZenPacks/zenoss/Dashboard/browser/resources/js/defaultportlets.js. The manipulation of the argument HTMLString leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.5 is able to address this issue. The name of the patch is f462285a0a2d7e1a9255b0820240b94a43b00a44. It is recommended to upgrade the affected component. The identifier VDB-217153 was assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic was found in Zenoss Dashboard up to 1.3.4. Affected by this vulnerability is an unknown functionality of the file ZenPacks/zenoss/Dashboard/browser/resources/js/defaultportlets.js. The manipulation of the argument HTMLString leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.5 is able to address this issue. The identifier of the patch is f462285a0a2d7e1a9255b0820240b94a43b00a44. It is recommended to upgrade the affected component. The identifier VDB-217153 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25064.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25064.json
index 6ffab57005d..6c1a6748de3 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25064.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25064.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25064",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T09:15:08.493",
- "lastModified": "2023-01-11T17:08:39.347",
+ "lastModified": "2023-10-27T20:04:16.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in OSM Lab show-me-the-way. It has been rated as problematic. This issue affects some unknown processing of the file js/site.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 4bed3b34dcc01fe6661f39c0e5d2285b340f7cac. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217439."
+ "value": "A vulnerability was found in OSM Lab show-me-the-way. It has been rated as problematic. This issue affects some unknown processing of the file js/site.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. The patch is named 4bed3b34dcc01fe6661f39c0e5d2285b340f7cac. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217439."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -116,16 +126,14 @@
"url": "https://github.com/osmlab/show-me-the-way/commit/4bed3b34dcc01fe6661f39c0e5d2285b340f7cac",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/osmlab/show-me-the-way/pull/57",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25065.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25065.json
index 0108bd29522..1988da1a74c 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25065.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25065.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T10:15:09.657",
- "lastModified": "2023-01-11T18:25:31.757",
+ "lastModified": "2023-10-27T20:04:30.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Wikimedia mediawiki-extensions-I18nTags and classified as problematic. This issue affects some unknown processing of the file I18nTags_body.php of the component Unlike Parser. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is b4bc3cbbb099eab50cf2b544cf577116f1867b94. It is recommended to apply a patch to fix this issue. The identifier VDB-217445 was assigned to this vulnerability."
+ "value": "A vulnerability was found in Wikimedia mediawiki-extensions-I18nTags and classified as problematic. This issue affects some unknown processing of the file I18nTags_body.php of the component Unlike Parser. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is b4bc3cbbb099eab50cf2b544cf577116f1867b94. It is recommended to apply a patch to fix this issue. The identifier VDB-217445 was assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -116,8 +126,7 @@
"url": "https://github.com/wikimedia/mediawiki-extensions-I18nTags/commit/b4bc3cbbb099eab50cf2b544cf577116f1867b94",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25066.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25066.json
index 5baee05bdf6..b9f05d59aab 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25066.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25066.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T11:15:09.320",
- "lastModified": "2023-01-12T15:58:49.013",
+ "lastModified": "2023-10-27T20:29:57.213",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in PeterMu nodebatis up to 2.1.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. Upgrading to version 2.2.0 is able to address this issue. The name of the patch is 6629ff5b7e3d62ad8319007a54589ec1f62c7c35. It is recommended to upgrade the affected component. VDB-217554 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in PeterMu nodebatis up to 2.1.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. Upgrading to version 2.2.0 is able to address this issue. The patch is identified as 6629ff5b7e3d62ad8319007a54589ec1f62c7c35. It is recommended to upgrade the affected component. VDB-217554 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -116,16 +126,14 @@
"url": "https://github.com/PeterMu/nodebatis/commit/6629ff5b7e3d62ad8319007a54589ec1f62c7c35",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/PeterMu/nodebatis/releases/tag/v2.2.0",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25067.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25067.json
index 390ac14d240..96e57081f94 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25067.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25067.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T21:15:09.167",
- "lastModified": "2023-01-12T15:23:27.897",
+ "lastModified": "2023-10-27T20:30:13.163",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in JoomGallery up to 3.3.3. This affects an unknown part of the file administrator/components/com_joomgallery/views/config/tmpl/default.php of the component Image Sort Handler. The manipulation leads to sql injection. Upgrading to version 3.3.4 is able to address this issue. The name of the patch is dc414ee954e849082260f8613e15a1c1e1d354a1. It is recommended to upgrade the affected component. The identifier VDB-217569 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, was found in JoomGallery up to 3.3.3. This affects an unknown part of the file administrator/components/com_joomgallery/views/config/tmpl/default.php of the component Image Sort Handler. The manipulation leads to sql injection. Upgrading to version 3.3.4 is able to address this issue. The identifier of the patch is dc414ee954e849082260f8613e15a1c1e1d354a1. It is recommended to upgrade the affected component. The identifier VDB-217569 was assigned to this vulnerability."
}
],
"metrics": {
@@ -126,24 +126,22 @@
"url": "https://github.com/JoomGallery/JoomGallery/commit/dc414ee954e849082260f8613e15a1c1e1d354a1",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/JoomGallery/JoomGallery/pull/122",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Issue Tracking",
+ "Patch"
]
},
{
"url": "https://github.com/JoomGallery/JoomGallery/releases/tag/v3.3.4",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25068.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25068.json
index 3c4c317d4a3..a0761313f73 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25068.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25068.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25068",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T21:15:09.243",
- "lastModified": "2023-01-12T15:29:24.653",
+ "lastModified": "2023-10-27T20:30:28.217",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in devent globalpom-utils up to 4.5.0 and classified as critical. This vulnerability affects the function createTmpDir of the file globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java. The manipulation leads to insecure temporary file. The attack can be initiated remotely. Upgrading to version 4.5.1 is able to address this issue. The name of the patch is 77a820bac2f68e662ce261ecb050c643bd7ee560. It is recommended to upgrade the affected component. VDB-217570 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in devent globalpom-utils up to 4.5.0 and classified as critical. This vulnerability affects the function createTmpDir of the file globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java. The manipulation leads to insecure temporary file. The attack can be initiated remotely. Upgrading to version 4.5.1 is able to address this issue. The patch is identified as 77a820bac2f68e662ce261ecb050c643bd7ee560. It is recommended to upgrade the affected component. VDB-217570 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,8 +83,18 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-668"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -116,16 +126,14 @@
"url": "https://github.com/devent/globalpom-utils/commit/77a820bac2f68e662ce261ecb050c643bd7ee560",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/devent/globalpom-utils/releases/tag/globalpomutils-4.5.1",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25070.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25070.json
index abcd9b01aac..725a90fe5f6 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25070.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25070.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T11:15:08.910",
- "lastModified": "2023-01-12T19:58:41.997",
+ "lastModified": "2023-10-27T20:28:21.090",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in polterguy Phosphorus Five up to 8.2 and classified as critical. This vulnerability affects the function csv.Read of the file plugins/extras/p5.mysql/NonQuery.cs of the component CSV Import. The manipulation leads to sql injection. Upgrading to version 8.3 is able to address this issue. The name of the patch is c179a3d0703db55cfe0cb939b89593f2e7a87246. It is recommended to upgrade the affected component. VDB-217606 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in polterguy Phosphorus Five up to 8.2 and classified as critical. This vulnerability affects the function csv.Read of the file plugins/extras/p5.mysql/NonQuery.cs of the component CSV Import. The manipulation leads to sql injection. Upgrading to version 8.3 is able to address this issue. The patch is identified as c179a3d0703db55cfe0cb939b89593f2e7a87246. It is recommended to upgrade the affected component. VDB-217606 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -116,15 +126,14 @@
"url": "https://github.com/polterguy/phosphorusfive/commit/c179a3d0703db55cfe0cb939b89593f2e7a87246",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/polterguy/phosphorusfive/releases/tag/v8.3",
"source": "cna@vuldb.com",
"tags": [
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25071.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25071.json
index 2ad3a22a0a2..9b618b781b8 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25071.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25071.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25071",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T12:15:08.900",
- "lastModified": "2023-01-12T17:31:20.330",
+ "lastModified": "2023-10-27T20:29:36.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in roxlukas LMeve up to 0.1.58. It has been rated as critical. Affected by this issue is the function insert_log of the file wwwroot/ccpwgl/proxy.php. The manipulation of the argument fetch leads to sql injection. Upgrading to version 0.1.59-beta is able to address this issue. The name of the patch is c25ff7fe83a2cda1fcb365b182365adc3ffae332. It is recommended to upgrade the affected component. VDB-217610 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in roxlukas LMeve up to 0.1.58. It has been rated as critical. Affected by this issue is the function insert_log of the file wwwroot/ccpwgl/proxy.php. The manipulation of the argument fetch leads to sql injection. Upgrading to version 0.1.59-beta is able to address this issue. The patch is identified as c25ff7fe83a2cda1fcb365b182365adc3ffae332. It is recommended to upgrade the affected component. VDB-217610 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -126,16 +126,14 @@
"url": "https://github.com/roxlukas/lmeve/commit/c25ff7fe83a2cda1fcb365b182365adc3ffae332",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/roxlukas/lmeve/releases/tag/0.1.59-beta",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25072.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25072.json
index 08f14afe625..ee940732956 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25072.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25072.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25072",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T13:15:09.877",
- "lastModified": "2023-01-12T16:47:08.307",
+ "lastModified": "2023-10-27T20:27:20.333",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in lojban jbovlaste. This affects an unknown part of the file dict/listing.html. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The name of the patch is 6ff44c2e87b1113eb07d76ea62e1f64193b04d15. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217647."
+ "value": "A vulnerability classified as critical has been found in lojban jbovlaste. This affects an unknown part of the file dict/listing.html. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The patch is named 6ff44c2e87b1113eb07d76ea62e1f64193b04d15. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217647."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -103,8 +113,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lojban:jbovlaste:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "06-02-2018",
- "matchCriteriaId": "6A5DF520-D7A6-4E50-82D0-3C47C6558005"
+ "versionEndExcluding": "2018-06-02",
+ "matchCriteriaId": "163D21E4-182E-42BF-8CCC-89EA871372AC"
}
]
}
@@ -116,8 +126,7 @@
"url": "https://github.com/lojban/jbovlaste/commit/6ff44c2e87b1113eb07d76ea62e1f64193b04d15",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25073.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25073.json
index 537b8f5fc9c..2134800b246 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25073.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25073.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25073",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T14:15:08.930",
- "lastModified": "2023-02-01T14:56:40.987",
+ "lastModified": "2023-10-27T20:27:37.180",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in Newcomer1989 TSN-Ranksystem up to 1.2.6 and classified as problematic. This vulnerability affects the function getlog of the file webinterface/bot.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.2.7 is able to address this issue. The name of the patch is b3a3cd8efe2cd3bd3c5b3b7abf2fe80dbee51b77. It is recommended to upgrade the affected component. VDB-218002 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in Newcomer1989 TSN-Ranksystem up to 1.2.6 and classified as problematic. This vulnerability affects the function getlog of the file webinterface/bot.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.2.7 is able to address this issue. The patch is identified as b3a3cd8efe2cd3bd3c5b3b7abf2fe80dbee51b77. It is recommended to upgrade the affected component. VDB-218002 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -116,24 +126,21 @@
"url": "https://github.com/Newcomer1989/TSN-Ranksystem/commit/b3a3cd8efe2cd3bd3c5b3b7abf2fe80dbee51b77",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/Newcomer1989/TSN-Ranksystem/pull/467",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/Newcomer1989/TSN-Ranksystem/releases/tag/1.2.7",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25074.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25074.json
index 88e586e44b1..0f77d8a7cb5 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25074.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25074.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25074",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T15:15:09.097",
- "lastModified": "2023-01-19T14:31:01.753",
+ "lastModified": "2023-10-27T19:45:42.577",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Prestaul skeemas and classified as problematic. This issue affects some unknown processing of the file validators/base.js. The manipulation of the argument uri leads to inefficient regular expression complexity. The name of the patch is 65e94eda62dc8dc148ab3e59aa2ccc086ac448fd. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218003."
+ "value": "A vulnerability was found in Prestaul skeemas and classified as problematic. This issue affects some unknown processing of the file validators/base.js. The manipulation of the argument uri leads to inefficient regular expression complexity. The patch is named 65e94eda62dc8dc148ab3e59aa2ccc086ac448fd. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218003."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-1333"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1333"
+ }
+ ]
}
],
"configurations": [
@@ -116,8 +126,7 @@
"url": "https://github.com/Prestaul/skeemas/commit/65e94eda62dc8dc148ab3e59aa2ccc086ac448fd",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25075.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25075.json
index 7a3c07f7a11..cb37f6aba1a 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25075.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25075.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T20:15:09.260",
- "lastModified": "2023-01-24T18:35:58.613",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:09.123",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in karsany OBridge up to 1.3. Affected is the function getAllStandaloneProcedureAndFunction of the file obridge-main/src/main/java/org/obridge/dao/ProcedureDao.java. The manipulation leads to sql injection. Upgrading to version 1.4 is able to address this issue. The name of the patch is 52eca4ad05f3c292aed3178b2f58977686ffa376. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218376."
+ "value": "A vulnerability classified as critical has been found in karsany OBridge up to 1.3. Affected is the function getAllStandaloneProcedureAndFunction of the file obridge-main/src/main/java/org/obridge/dao/ProcedureDao.java. The manipulation leads to sql injection. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.4 is able to address this issue. The name of the patch is 52eca4ad05f3c292aed3178b2f58977686ffa376. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218376."
}
],
"metrics": {
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25076.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25076.json
index a61d1ff50db..8fdc003bbd8 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25076.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25076.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T12:15:16.347",
- "lastModified": "2023-01-24T16:12:24.487",
+ "lastModified": "2023-10-27T20:27:44.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in Events Extension. Affected by this vulnerability is the function getRandomFeaturedEventByDate/getUpcomingFeaturedEventsInCategoriesWithSubcategories/recacheEvent/searchResults of the file classes/events.php. The manipulation leads to sql injection. The name of the patch is 11169e48ab1249109485fdb1e0c9fca3d25ba01d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218395."
+ "value": "A vulnerability classified as critical was found in Events Extension on BigTree. Affected by this vulnerability is the function getRandomFeaturedEventByDate/getUpcomingFeaturedEventsInCategoriesWithSubcategories/recacheEvent/searchResults of the file classes/events.php. The manipulation leads to sql injection. The patch is named 11169e48ab1249109485fdb1e0c9fca3d25ba01d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218395."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -116,8 +126,7 @@
"url": "https://github.com/timbuckingham/bigtree-events/commit/11169e48ab1249109485fdb1e0c9fca3d25ba01d",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25079.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25079.json
index 0fbd1e3b1f0..1a37abbe457 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25079.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25079.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T04:15:08.867",
- "lastModified": "2023-02-14T01:47:21.173",
+ "lastModified": "2023-10-27T20:27:55.167",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Segmentio is-url up to 1.2.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. Upgrading to version 1.2.3 is able to address this issue. The name of the patch is 149550935c63a98c11f27f694a7c4a9479e53794. It is recommended to upgrade the affected component. VDB-220058 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Segmentio is-url up to 1.2.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. Upgrading to version 1.2.3 is able to address this issue. The patch is identified as 149550935c63a98c11f27f694a7c4a9479e53794. It is recommended to upgrade the affected component. VDB-220058 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-1333"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1333"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25080.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25080.json
index d6e62aa2030..8eedf7d6614 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25080.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25080.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25080",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T08:15:07.607",
- "lastModified": "2023-02-14T01:50:21.883",
+ "lastModified": "2023-10-27T20:12:10.483",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The name of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.8.32 is able to address this issue. The identifier of the patch is 31818a441b095bdc4838602dbb17b8377d1e5cce. It is recommended to upgrade the affected component. The identifier VDB-220061 was assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -102,8 +112,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:mobile_detect_project:mobile_detect:2.8.31:*:*:*:*:*:*:*",
- "matchCriteriaId": "757772A2-65FF-46FA-AB76-176AF0EC1636"
+ "criteria": "cpe:2.3:a:mobiledetect:mobiledetect:2.8.31:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B868C5CA-D4E1-4DFB-A980-D0844C05286F"
}
]
}
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25082.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25082.json
index 0d279a78b24..afc97713e31 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25082.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25082.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25082",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-21T18:15:11.677",
- "lastModified": "2023-03-24T19:34:14.640",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T13:15:09.380",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in zwczou WeChat SDK Python 0.3.0 and classified as critical. This issue affects the function validate/to_xml. The manipulation leads to xml external entity reference. The attack may be initiated remotely. Upgrading to version 0.5.5 is able to address this issue. The name of the patch is e54abadc777715b6dcb545c13214d1dea63df6c9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223403."
+ "value": "A vulnerability was found in zwczou WeChat SDK Python 0.3.0 and classified as critical. This issue affects the function validate/to_xml. The manipulation leads to xml external entity reference. The attack may be initiated remotely. Upgrading to version 0.5.5 is able to address this issue. The patch is named e54abadc777715b6dcb545c13214d1dea63df6c9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223403."
}
],
"metrics": {
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25084.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25084.json
index de732bab969..e490f99f05f 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25084.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25084.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T18:15:07.993",
- "lastModified": "2023-04-14T00:45:46.000",
+ "lastModified": "2023-10-29T02:37:24.597",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in Ping Identity Self-Service Account Manager 1.1.2. Affected by this issue is some unknown functionality of the file src/main/java/com/unboundid/webapp/ssam/SSAMController.java. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.1.3 is able to address this issue. The name of the patch is f64b10d63bb19ca2228b0c2d561a1a6e5a3bf251. It is recommended to upgrade the affected component. VDB-225362 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in Ping Identity Self-Service Account Manager 1.1.2. Affected by this issue is some unknown functionality of the file src/main/java/com/unboundid/webapp/ssam/SSAMController.java. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.1.3 is able to address this issue. The patch is identified as f64b10d63bb19ca2228b0c2d561a1a6e5a3bf251. It is recommended to upgrade the affected component. VDB-225362 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json
index 2a6eca03173..8c2e87b5d83 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-01T05:15:08.633",
- "lastModified": "2023-05-09T21:08:40.580",
+ "lastModified": "2023-10-29T02:37:03.177",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in Responsive Menus 7.x-1.x-dev on Drupal. Affected by this vulnerability is the function responsive_menus_admin_form_submit of the file responsive_menus.module of the component Configuration Setting Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 7.x-1.7 is able to address this issue. The name of the patch is 3c554b31d32a367188f44d44857b061eac949fb8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-227755."
+ "value": "A vulnerability classified as problematic was found in Responsive Menus 7.x-1.x-dev on Drupal. Affected by this vulnerability is the function responsive_menus_admin_form_submit of the file responsive_menus.module of the component Configuration Setting Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 7.x-1.7 is able to address this issue. The patch is named 3c554b31d32a367188f44d44857b061eac949fb8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-227755."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -102,8 +112,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:drupal:responsive_menus:7.x-1.7:*:*:*:*:drupal:*:*",
- "matchCriteriaId": "630B9B32-8E34-448F-8ABA-AC3A2FEF015E"
+ "criteria": "cpe:2.3:a:drupal:responsive_menus:*:*:*:*:*:drupal:*:*",
+ "versionEndExcluding": "7.x-1.7",
+ "matchCriteriaId": "BAF798FF-F52F-499E-80A4-BD53FE3A9540"
}
]
}
@@ -122,7 +133,7 @@
"url": "https://vuldb.com/?ctiid.227755",
"source": "cna@vuldb.com",
"tags": [
- "Permissions Required"
+ "Third Party Advisory"
]
},
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25086.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25086.json
index ed147676ad4..390be9a3327 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25086.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25086.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25086",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T07:15:08.860",
- "lastModified": "2023-06-08T20:01:17.053",
+ "lastModified": "2023-10-29T02:38:22.387",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in sea75300 FanPress CM up to 3.6.3. It has been classified as problematic. This affects the function getArticlesPreview of the file inc/controller/action/system/templatepreview.php of the component Template Preview. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 3.6.4 is able to address this issue. The name of the patch is c380d343c2107fcee55ab00eb8d189ce5e03369b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230235."
+ "value": "A vulnerability was found in sea75300 FanPress CM up to 3.6.3. It has been classified as problematic. This affects the function getArticlesPreview of the file inc/controller/action/system/templatepreview.php of the component Template Preview. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 3.6.4 is able to address this issue. The patch is named c380d343c2107fcee55ab00eb8d189ce5e03369b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230235."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25091.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25091.json
index b57fd5f49e3..8cce3bbe78e 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25091.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25091.json
@@ -2,27 +2,95 @@
"id": "CVE-2018-25091",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-15T19:15:09.213",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:01:05.073",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive)."
+ },
+ {
+ "lang": "es",
+ "value": "urllib3 anterior a 1.24.2 no elimina el encabezado HTTP de autorizaci\u00f3n cuando se sigue una redirecci\u00f3n de origen cruzado (es decir, una redirecci\u00f3n que difiere en host, puerto o esquema). Esto puede permitir que las credenciales en el encabezado de autorizaci\u00f3n se expongan a hosts no deseados o se transmitan en texto plano. NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2018-20060 (que distingu\u00eda entre may\u00fasculas y min\u00fasculas)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-601"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.24.2",
+ "matchCriteriaId": "D0B5613A-F0A4-438A-A01E-4E2DAB4FAB8B"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/urllib3/urllib3/commit/adb358f8e06865406d1f05e581a16cbea2136fbc",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/urllib3/urllib3/compare/1.24.1...1.24.2",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/urllib3/urllib3/issues/1510",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-06xx/CVE-2019-0608.json b/CVE-2019/CVE-2019-06xx/CVE-2019-0608.json
index f1121ea5a2e..c59c1906ead 100644
--- a/CVE-2019/CVE-2019-06xx/CVE-2019-0608.json
+++ b/CVE-2019/CVE-2019-06xx/CVE-2019-0608.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-0608",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-10-10T14:15:14.157",
- "lastModified": "2019-12-16T16:20:07.207",
+ "lastModified": "2023-10-17T19:00:37.133",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -181,11 +181,6 @@
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
- {
- "vulnerable": false,
- "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:sp1:*:*:*:*:x64:*",
- "matchCriteriaId": "C5CA0C91-B14B-4E02-B8B3-A942F3602883"
- },
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003000.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003000.json
index d40254890c6..b5bc2d2c74e 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003000.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003000.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003000",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-01-22T14:29:00.267",
- "lastModified": "2020-09-29T01:41:00.863",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:00.750",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003001.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003001.json
index 2fa992db386..2c3428ad2f5 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003001.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003001.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003001",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-01-22T14:29:00.330",
- "lastModified": "2020-09-29T01:40:32.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:00.970",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003002.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003002.json
index c7725cad9b8..04f9c39daf8 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003002.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003002.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003002",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-01-22T14:29:00.390",
- "lastModified": "2020-09-29T01:40:23.643",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:01.043",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003003.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003003.json
index 28a8f28f66d..15dc751973e 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003003.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003003.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003003",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-01-22T14:29:00.437",
- "lastModified": "2021-11-02T20:15:21.123",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:01.113",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-613"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003004.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003004.json
index a73b84e125b..1d9c1e90ce7 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003004.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003004.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003004",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-01-22T14:29:00.487",
- "lastModified": "2021-11-02T20:15:57.490",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:01.207",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-613"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003005.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003005.json
index 7ad7210e4cd..f1eb5042876 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003005.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003005.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003005",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.250",
- "lastModified": "2022-06-13T19:00:29.063",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:01.280",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003006.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003006.json
index f7630f7cfb1..ef56b6cecca 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003006.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003006.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003006",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.407",
- "lastModified": "2020-09-29T00:50:45.987",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:01.403",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003007.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003007.json
index b90111891b7..42f18838b70 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003007.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003007.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003007",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.437",
- "lastModified": "2019-10-09T23:44:00.803",
+ "lastModified": "2023-10-25T18:16:01.477",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -105,11 +95,8 @@
],
"references": [
{
- "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1295%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1295%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003008.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003008.json
index b948b9b0ad9..e45d644c285 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003008.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003008.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003008",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.483",
- "lastModified": "2019-10-09T23:44:00.947",
+ "lastModified": "2023-10-25T18:16:01.567",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -105,11 +95,8 @@
],
"references": [
{
- "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1295%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1295%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003009.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003009.json
index 2ed405c8d28..ae0dc2548df 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003009.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003009.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003009",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.530",
- "lastModified": "2019-10-09T23:44:01.070",
+ "lastModified": "2023-10-25T18:16:01.657",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003011.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003011.json
index 17ad5371070..6adb25bec5d 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003011.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003011.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003011",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.623",
- "lastModified": "2020-09-29T00:50:31.817",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:01.733",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,20 +73,6 @@
"value": "CWE-674"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-200"
- },
- {
- "lang": "en",
- "value": "CWE-674"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003012.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003012.json
index 9dfb899f448..c51eea6c305 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003012.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003012.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003012",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.670",
- "lastModified": "2019-10-09T23:44:01.367",
+ "lastModified": "2023-10-25T18:16:01.817",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003013.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003013.json
index 8039cc79a66..1e4caa68a5a 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003013.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003013.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003013",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.703",
- "lastModified": "2019-10-09T23:44:01.493",
+ "lastModified": "2023-10-25T18:16:01.897",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003014.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003014.json
index f419f98e9df..acad6f463f1 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003014.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003014.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003014",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.733",
- "lastModified": "2019-10-09T23:44:01.617",
+ "lastModified": "2023-10-25T18:16:01.967",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003015.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003015.json
index 14473ec00be..9c66324bfed 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003015.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003015.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003015",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.780",
- "lastModified": "2019-10-09T23:44:01.743",
+ "lastModified": "2023-10-25T18:16:02.037",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
@@ -105,11 +95,8 @@
],
"references": [
{
- "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-905%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-905%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003016.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003016.json
index e2123dabcd9..7bc6103ab31 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003016.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003016.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003016",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.813",
- "lastModified": "2019-10-09T23:44:01.867",
+ "lastModified": "2023-10-25T18:16:02.097",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -105,11 +95,8 @@
],
"references": [
{
- "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-905%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-01-28/#SECURITY-905%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003017.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003017.json
index a7a85ac0c2e..a24547fd519 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003017.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003017.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003017",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.843",
- "lastModified": "2019-10-09T23:44:01.977",
+ "lastModified": "2023-10-25T18:16:02.157",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003018.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003018.json
index d41cb866f42..802a98bc065 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003018.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003018.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003018",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.890",
- "lastModified": "2019-10-09T23:44:02.117",
+ "lastModified": "2023-10-25T18:16:02.220",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-200"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-549"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003019.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003019.json
index 96d5bcda93c..d57dc69457a 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003019.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003019.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003019",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.920",
- "lastModified": "2019-10-09T23:44:02.227",
+ "lastModified": "2023-10-25T18:16:02.280",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-384"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-384"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003020.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003020.json
index 28ff877f4c6..ab59700fea1 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003020.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003020.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003020",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.953",
- "lastModified": "2019-10-09T23:44:02.430",
+ "lastModified": "2023-10-25T18:16:02.353",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-918"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003021.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003021.json
index d5a1ad16d72..8de90f3ffd4 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003021.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003021.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003021",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:00.983",
- "lastModified": "2019-10-09T23:44:02.570",
+ "lastModified": "2023-10-25T18:16:02.460",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-200"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-549"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003022.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003022.json
index 9371113dfb0..d11c2676fc7 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003022.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003022.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003022",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:01.030",
- "lastModified": "2019-10-09T23:44:02.697",
+ "lastModified": "2023-10-25T18:16:02.520",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003023.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003023.json
index 9fe546c23f6..af355ee4a0d 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003023.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003023.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003023",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-06T16:29:01.077",
- "lastModified": "2019-10-09T23:44:02.803",
+ "lastModified": "2023-10-25T18:16:02.590",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003024.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003024.json
index 06cf24f1ad1..c4c8f28fcfc 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003024.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003024.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003024",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-20T21:29:00.270",
- "lastModified": "2020-09-29T00:43:49.590",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:02.647",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003025.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003025.json
index a6606c731b4..caa2070f7dc 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003025.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003025.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003025",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-20T21:29:00.333",
- "lastModified": "2020-09-29T00:43:34.230",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:02.727",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-201"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003026.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003026.json
index f797ac7887f..5b5c193ac49 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003026.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003026.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003026",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-20T21:29:00.397",
- "lastModified": "2019-10-09T23:44:03.180",
+ "lastModified": "2023-10-25T18:16:02.787",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,24 +73,6 @@
"value": "CWE-918"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- },
- {
- "lang": "en",
- "value": "CWE-441"
- },
- {
- "lang": "en",
- "value": "CWE-918"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003027.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003027.json
index d5c42337bad..396f05ba98b 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003027.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003027.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003027",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-20T21:29:00.443",
- "lastModified": "2019-10-09T23:44:03.337",
+ "lastModified": "2023-10-25T18:16:02.847",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,24 +73,6 @@
"value": "CWE-918"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- },
- {
- "lang": "en",
- "value": "CWE-441"
- },
- {
- "lang": "en",
- "value": "CWE-918"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003028.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003028.json
index d5a3efdc3a7..a166e9d12aa 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003028.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003028.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003028",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-02-20T21:29:00.490",
- "lastModified": "2019-10-09T23:44:03.493",
+ "lastModified": "2023-10-25T18:16:02.910",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,24 +73,6 @@
"value": "CWE-918"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- },
- {
- "lang": "en",
- "value": "CWE-441"
- },
- {
- "lang": "en",
- "value": "CWE-918"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json
index 7b5f93599db..8eec762b26a 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003029.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003029",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.297",
- "lastModified": "2022-06-13T18:57:16.603",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:02.980",
+ "vulnStatus": "Modified",
"cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@@ -77,16 +77,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
@@ -146,11 +136,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003030.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003030.json
index 6f00707b5de..31d40c20e65 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003030.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003030.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003030",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.343",
- "lastModified": "2020-10-19T18:15:12.633",
+ "lastModified": "2023-10-25T18:16:03.057",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-03-25",
"cisaActionDue": "2022-04-15",
@@ -68,19 +68,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
@@ -143,11 +133,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-03-06/#SECURITY-1336%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003031.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003031.json
index b7ec71117cb..ca6d507bcc4 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003031.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003031.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003031",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.373",
- "lastModified": "2020-09-30T12:55:53.940",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.140",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003032.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003032.json
index 529f2b7f603..a70aa86216c 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003032.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003032.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003032",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.420",
- "lastModified": "2020-09-30T12:55:45.160",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.207",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003033.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003033.json
index 252851fe264..8da5a24a4a6 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003033.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003033.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003033",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.467",
- "lastModified": "2020-09-30T12:55:36.783",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.270",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003034.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003034.json
index 2fdc55e8882..27b0acbb091 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003034.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003034.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003034",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.500",
- "lastModified": "2020-09-30T12:55:25.800",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.327",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003035.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003035.json
index b13b6bab717..235978274bd 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003035.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003035.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003035",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.530",
- "lastModified": "2020-09-30T12:48:40.573",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.393",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,20 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-201"
- },
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003036.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003036.json
index 67b904fe6b6..94ba79a1bc0 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003036.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003036.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003036",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.560",
- "lastModified": "2020-09-30T12:48:28.930",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.457",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,20 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- },
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003037.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003037.json
index 77272a9a090..de98af859f6 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003037.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003037.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003037",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.607",
- "lastModified": "2020-09-30T12:42:52.207",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.523",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,20 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-201"
- },
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003038.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003038.json
index 4c413a0a332..a450790ddf4 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003038.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003038.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003038",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.640",
- "lastModified": "2020-09-30T12:42:40.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.583",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-522"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003039.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003039.json
index 8388ff443c7..dc5d9ed6b6c 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003039.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003039.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003039",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-08T21:29:00.670",
- "lastModified": "2020-09-30T12:42:24.707",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.647",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-522"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003040.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003040.json
index f710638c9ea..5eb31b43524 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003040.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003040.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003040",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-28T18:29:00.250",
- "lastModified": "2020-09-30T12:41:33.783",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.710",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-470"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003041.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003041.json
index 43eadf25311..8eb86ec851b 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003041.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003041.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003041",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-28T18:29:00.313",
- "lastModified": "2020-09-30T12:41:21.063",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.800",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-470"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003042.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003042.json
index 98c3ceaf2e5..48e3c5266eb 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003042.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003042.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003042",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-28T18:29:00.343",
- "lastModified": "2020-06-23T13:15:11.040",
+ "lastModified": "2023-10-25T18:16:03.867",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003043.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003043.json
index 7743e836a3a..b8db012d81e 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003043.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003043.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003043",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-28T18:29:00.390",
- "lastModified": "2020-09-30T12:38:14.887",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:03.940",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003044.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003044.json
index 82666252016..ce10b1132e2 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003044.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003044.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003044",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-28T18:29:00.420",
- "lastModified": "2020-06-23T13:15:11.447",
+ "lastModified": "2023-10-25T18:16:04.000",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003045.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003045.json
index 489cbd37ee9..88cc586f4ea 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003045.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003045.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003045",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-28T18:29:00.453",
- "lastModified": "2020-09-30T12:38:03.590",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.063",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003046.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003046.json
index dca21b054e2..a0cfa9ce60e 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003046.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003046.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003046",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-28T18:29:00.500",
- "lastModified": "2020-06-23T13:15:11.713",
+ "lastModified": "2023-10-25T18:16:04.127",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003047.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003047.json
index 60da302a7f0..35a17f4a7ba 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003047.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003047.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003047",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-28T18:29:00.530",
- "lastModified": "2020-09-30T12:37:46.980",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.193",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003048.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003048.json
index 7dd7723413b..fc35e2c8013 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003048.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003048.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003048",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-03-28T18:29:00.563",
- "lastModified": "2020-09-29T18:23:23.820",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.273",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003049.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003049.json
index 8eeb0b8cdd9..19cd2df4b3a 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003049.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003049.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003049",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-10T21:29:01.480",
- "lastModified": "2022-06-13T18:36:54.183",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.353",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-613"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-613"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003050.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003050.json
index c890ac4062b..1742fb42df6 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003050.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003050.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003050",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-10T21:29:01.513",
- "lastModified": "2022-06-13T18:46:12.347",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.447",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003051.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003051.json
index 4976f28ac5a..2ec94b727e8 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003051.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003051.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003051",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.447",
- "lastModified": "2020-08-31T13:19:11.787",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.513",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003052.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003052.json
index 5f9828b0a6b..1fc0f735ed9 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003052.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003052.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003052",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.493",
- "lastModified": "2020-08-31T13:24:31.657",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.590",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003053.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003053.json
index 7f98500bc4e..d84f6e70623 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003053.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003053.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003053",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.540",
- "lastModified": "2020-09-01T13:08:59.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.660",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003054.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003054.json
index 568a68b4cf2..a478521ada9 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003054.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003054.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003054",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.570",
- "lastModified": "2020-09-01T13:10:14.903",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.730",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003055.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003055.json
index 8beb8696854..a3b05b02a52 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003055.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003055.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003055",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.600",
- "lastModified": "2020-09-01T13:11:34.280",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.797",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003056.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003056.json
index 5a70f360e00..0506f563f8d 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003056.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003056.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003056",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.633",
- "lastModified": "2020-09-01T13:11:50.453",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.860",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003057.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003057.json
index 6727dbfc593..399382c08ca 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003057.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003057.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003057",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.680",
- "lastModified": "2020-09-01T13:12:03.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:04.923",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003058.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003058.json
index beb1d0b1acb..3e73241ae9d 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003058.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003058.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003058",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.727",
- "lastModified": "2020-06-23T13:15:13.103",
+ "lastModified": "2023-10-25T18:16:04.987",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003059.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003059.json
index bf216718351..1ebee9858e6 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003059.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003059.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003059",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.757",
- "lastModified": "2020-09-01T13:18:26.593",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.047",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003060.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003060.json
index baff71d0746..a3aff21a12b 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003060.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003060.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003060",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.790",
- "lastModified": "2020-09-01T13:20:38.583",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.110",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003061.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003061.json
index 8af9666d936..1f67efecf77 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003061.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003061.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003061",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.837",
- "lastModified": "2020-09-01T13:20:53.740",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.173",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003062.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003062.json
index 1f7cd75de42..5772fe81472 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003062.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003062.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003062",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.867",
- "lastModified": "2020-09-01T13:21:07.490",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.237",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003063.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003063.json
index e5dae9b996a..14833e78640 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003063.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003063.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003063",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.913",
- "lastModified": "2020-09-01T13:21:39.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.297",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003064.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003064.json
index 1cd255596e5..405e70c8e61 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003064.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003064.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003064",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.947",
- "lastModified": "2020-09-01T13:26:15.143",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.363",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003065.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003065.json
index 6d9dbdbbe6d..f3b55ad5cb6 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003065.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003065.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003065",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:00.993",
- "lastModified": "2020-09-01T13:28:16.477",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.430",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003066.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003066.json
index 2585d2afc41..1d4bb377e73 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003066.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003066.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003066",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.023",
- "lastModified": "2020-09-01T13:35:27.083",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.493",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003067.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003067.json
index d0fab049a90..6a79d9bfe99 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003067.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003067.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003067",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.057",
- "lastModified": "2020-09-01T13:36:51.180",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.557",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003068.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003068.json
index 9bc792e7cc5..cf6a8175066 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003068.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003068.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003068",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.087",
- "lastModified": "2020-09-01T13:37:23.807",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.617",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003069.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003069.json
index ed45cd4105d..a58b9ec2922 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003069.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003069.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003069",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.117",
- "lastModified": "2020-09-01T13:38:47.060",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.677",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003070.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003070.json
index ed5b01939fd..cbac21798f0 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003070.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003070.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003070",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.147",
- "lastModified": "2020-09-01T13:39:29.547",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.740",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003071.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003071.json
index b67f0d73b47..5bb1cc00646 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003071.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003071.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003071",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.197",
- "lastModified": "2020-09-01T13:40:14.877",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.800",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003072.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003072.json
index 49432c73bbd..aeb0a3ad346 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003072.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003072.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003072",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.210",
- "lastModified": "2020-09-01T13:42:18.537",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.867",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003073.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003073.json
index a53614ab01d..8ad1fe21923 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003073.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003073.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003073",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.257",
- "lastModified": "2020-09-01T13:42:59.913",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.927",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003074.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003074.json
index 366e27504fc..e40bbed21c3 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003074.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003074.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003074",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.290",
- "lastModified": "2020-09-01T13:44:25.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:05.993",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003075.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003075.json
index e385c2a7fc4..4e02dcdbdb5 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003075.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003075.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003075",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.320",
- "lastModified": "2020-09-01T13:45:48.790",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:06.053",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003076.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003076.json
index 52440de0022..2c10ee345c9 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003076.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003076.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003076",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.350",
- "lastModified": "2020-06-23T13:15:15.027",
+ "lastModified": "2023-10-25T18:16:06.120",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003077.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003077.json
index 1e8f29e6535..0b2c1cace46 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003077.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003077.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003077",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.397",
- "lastModified": "2020-09-01T16:01:05.097",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:06.187",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003078.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003078.json
index 9a11606f753..9625a0f1ad9 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003078.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003078.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003078",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.430",
- "lastModified": "2020-06-23T13:15:15.243",
+ "lastModified": "2023-10-25T18:16:06.257",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003079.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003079.json
index 5bef14e2aa2..6c7388bfef6 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003079.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003079.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003079",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.460",
- "lastModified": "2020-07-15T14:03:57.383",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:06.733",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003080.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003080.json
index 01b34022f11..df683ba37f6 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003080.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003080.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003080",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.493",
- "lastModified": "2020-06-23T13:15:15.510",
+ "lastModified": "2023-10-25T18:16:07.030",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003081.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003081.json
index 842c2378e8b..ff91be97543 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003081.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003081.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003081",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.523",
- "lastModified": "2020-07-15T13:50:09.003",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:07.440",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003082.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003082.json
index ce3a3e6ce58..8a9ba212d6e 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003082.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003082.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003082",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.570",
- "lastModified": "2020-06-23T13:15:15.713",
+ "lastModified": "2023-10-25T18:16:07.887",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003083.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003083.json
index 07e96eeb888..2553926a712 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003083.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003083.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003083",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.600",
- "lastModified": "2020-07-15T14:09:44.163",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:08.357",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003084.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003084.json
index 4a9a1566923..99adefa9566 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003084.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003084.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003084",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.647",
- "lastModified": "2020-06-23T13:15:15.933",
+ "lastModified": "2023-10-25T18:16:08.750",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003085.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003085.json
index 65950e643eb..de430eab46d 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003085.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003085.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003085",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.680",
- "lastModified": "2020-07-15T14:23:23.133",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:09.100",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003086.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003086.json
index 0f24542c7cc..2bedf6caa05 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003086.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003086.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003086",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.710",
- "lastModified": "2020-06-23T13:15:16.150",
+ "lastModified": "2023-10-25T18:16:09.437",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003087.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003087.json
index a3e077a5734..8a8551345d2 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003087.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003087.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003087",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.757",
- "lastModified": "2020-07-15T13:52:17.583",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:09.797",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003088.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003088.json
index 824b3e5e677..1b629aab661 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003088.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003088.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003088",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.790",
- "lastModified": "2020-09-01T16:00:55.610",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:10.177",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003089.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003089.json
index f4b440f0aa1..9190955fa74 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003089.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003089.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003089",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.837",
- "lastModified": "2020-09-01T16:00:39.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:10.557",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003090.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003090.json
index f6e9f7effcf..48042b84214 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003090.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003090.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003090",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.867",
- "lastModified": "2020-06-23T13:15:16.587",
+ "lastModified": "2023-10-25T18:16:10.933",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003091.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003091.json
index 159c1a68fc3..2567de2b213 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003091.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003091.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003091",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.897",
- "lastModified": "2020-07-15T13:54:50.947",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:11.297",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003092.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003092.json
index 805bf256fd7..a2103583479 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003092.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003092.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003092",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.947",
- "lastModified": "2020-06-23T13:15:16.807",
+ "lastModified": "2023-10-25T18:16:11.670",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003093.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003093.json
index f886b743aac..e99ca998ac5 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003093.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003093.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003093",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:01.993",
- "lastModified": "2020-07-15T13:57:04.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:12.020",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003094.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003094.json
index fd7a1844c7f..786a0d8564e 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003094.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003094.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003094",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.023",
- "lastModified": "2020-09-01T16:00:31.140",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:12.440",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003095.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003095.json
index 94f44e3f9cf..a09ed86256e 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003095.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003095.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003095",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.070",
- "lastModified": "2020-09-01T19:57:53.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:12.523",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003096.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003096.json
index fcf3b2bd78d..84a3d2275c9 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003096.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003096.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003096",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.147",
- "lastModified": "2020-07-15T15:01:08.640",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:12.587",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003097.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003097.json
index c2cc254b0b4..0e65a55763c 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003097.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003097.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003097",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.180",
- "lastModified": "2020-07-15T15:06:27.573",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:12.650",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003098.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003098.json
index a294c076114..bc1e2f5bd12 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003098.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003098.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1003098",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.227",
- "lastModified": "2020-06-23T13:15:17.463",
+ "lastModified": "2023-10-25T18:16:12.717",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003099.json b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003099.json
index ad888167c0c..5efc47482e7 100644
--- a/CVE-2019/CVE-2019-10030xx/CVE-2019-1003099.json
+++ b/CVE-2019/CVE-2019-10030xx/CVE-2019-1003099.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-1003099",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.273",
- "lastModified": "2020-07-15T14:57:13.787",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:12.777",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10222.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10222.json
index df69f9154c2..59db2d8264f 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10222.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10222.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10222",
"sourceIdentifier": "secalert@redhat.com",
"published": "2019-11-08T15:15:11.437",
- "lastModified": "2023-02-12T23:34:00.480",
+ "lastModified": "2023-10-23T19:15:09.617",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -87,7 +87,7 @@
},
"weaknesses": [
{
- "source": "secalert@redhat.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -97,7 +97,7 @@
]
},
{
- "source": "nvd@nist.gov",
+ "source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@@ -175,6 +175,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://tracker.ceph.com/issues/40018",
"source": "secalert@redhat.com",
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10277.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10277.json
index fad71e3486e..ed58373f29a 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10277.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10277.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10277",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.383",
- "lastModified": "2020-10-02T14:49:05.753",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:12.840",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10278.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10278.json
index 71ec32efcb9..a5f4f2c9785 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10278.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10278.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10278",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.430",
- "lastModified": "2019-10-09T23:44:35.150",
+ "lastModified": "2023-10-25T18:16:12.907",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10279.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10279.json
index ccc85d7807c..aafd3ccbbd8 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10279.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10279.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10279",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.460",
- "lastModified": "2020-10-01T16:30:42.417",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:12.977",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10280.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10280.json
index 7f048d240a1..de948b945c4 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10280.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10280.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10280",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.523",
- "lastModified": "2020-10-02T14:48:55.487",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.040",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10281.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10281.json
index 64744c7677c..1dcc6a147ea 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10281.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10281.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10281",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.570",
- "lastModified": "2020-10-02T14:47:48.170",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.117",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10282.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10282.json
index ef700826788..ef920a5dd9f 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10282.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10282.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10282",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.600",
- "lastModified": "2020-10-02T14:47:34.857",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.183",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10283.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10283.json
index e654ab64982..a9e42c60df8 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10283.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10283.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10283",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.647",
- "lastModified": "2020-10-01T13:47:40.867",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.240",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10284.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10284.json
index 05b7b1f235a..62af3af0167 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10284.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10284.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10284",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.697",
- "lastModified": "2020-10-01T14:09:47.737",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.300",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10285.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10285.json
index 5885edf71bf..b54ef4d4645 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10285.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10285.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10285",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.727",
- "lastModified": "2020-10-01T13:58:56.050",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.363",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10286.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10286.json
index cf705da05f5..674d2b9c32f 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10286.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10286.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10286",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.757",
- "lastModified": "2020-10-01T13:51:16.307",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.420",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10287.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10287.json
index 3c7e4dc3b1c..6aa1c5b5b93 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10287.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10287.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10287",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.807",
- "lastModified": "2020-10-01T13:51:14.680",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.477",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10288.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10288.json
index 9e321fcc9b9..5c0b6ff46b6 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10288.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10288.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10288",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.867",
- "lastModified": "2020-10-01T13:51:13.400",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.537",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10289.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10289.json
index 1cf23f3ed55..38bd0151312 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10289.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10289.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10289",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.913",
- "lastModified": "2019-10-09T23:44:36.540",
+ "lastModified": "2023-10-25T18:16:13.593",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10290.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10290.json
index 56e38f80a85..9f550a9ba3d 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10290.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10290.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10290",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.947",
- "lastModified": "2020-10-02T14:47:24.467",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.653",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10291.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10291.json
index 65079b009a5..0c70554bceb 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10291.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10291.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10291",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:02.977",
- "lastModified": "2020-10-02T14:47:01.810",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.713",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10292.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10292.json
index c34efa6df89..786f8f9bf2c 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10292.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10292.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10292",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:03.007",
- "lastModified": "2019-10-09T23:44:36.917",
+ "lastModified": "2023-10-25T18:16:13.777",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10293.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10293.json
index b7269bf613c..1fe174426a1 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10293.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10293.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10293",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:03.057",
- "lastModified": "2020-10-01T16:29:51.837",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.833",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10294.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10294.json
index 6ba4db7755f..d55e222d33e 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10294.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10294.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10294",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:03.070",
- "lastModified": "2020-10-02T14:46:47.357",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.897",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10295.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10295.json
index fd7bab51df2..8589e8444cb 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10295.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10295.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10295",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:03.100",
- "lastModified": "2020-10-02T14:46:35.543",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:13.950",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10296.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10296.json
index 733b51e02ac..27f77dde9ed 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10296.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10296.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10296",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:03.133",
- "lastModified": "2020-10-02T14:46:24.027",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.010",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10297.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10297.json
index c22aebad5ae..21d146d6108 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10297.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10297.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10297",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:03.163",
- "lastModified": "2020-10-02T14:46:11.243",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10298.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10298.json
index 5a8fab5f973..eeee75f39f1 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10298.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10298.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10298",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:03.210",
- "lastModified": "2020-10-02T14:46:00.010",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.130",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-102xx/CVE-2019-10299.json b/CVE-2019/CVE-2019-102xx/CVE-2019-10299.json
index 5df00ec03c3..cf153b286e4 100644
--- a/CVE-2019/CVE-2019-102xx/CVE-2019-10299.json
+++ b/CVE-2019/CVE-2019-102xx/CVE-2019-10299.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10299",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-04T16:29:03.243",
- "lastModified": "2020-10-02T14:44:42.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.190",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10300.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10300.json
index e3931b38933..59b54ee68a7 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10300.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10300.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10300",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-18T17:29:00.430",
- "lastModified": "2019-05-06T16:29:00.397",
+ "lastModified": "2023-10-25T18:16:14.253",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10301.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10301.json
index 7f6e5165c18..b3332f6ecc1 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10301.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10301.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10301",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-18T17:29:00.507",
- "lastModified": "2020-10-01T16:30:56.857",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.347",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10302.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10302.json
index 00707dbf014..4b180e43592 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10302.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10302.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10302",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-18T17:29:00.570",
- "lastModified": "2020-10-02T14:43:18.597",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.407",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10303.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10303.json
index bf588aff427..c17346a026b 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10303.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10303.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10303",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-18T17:29:00.633",
- "lastModified": "2020-10-02T14:42:59.597",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.467",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10304.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10304.json
index 7c56aa6e32a..e953080c3fa 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10304.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10304.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10304",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-18T17:29:00.697",
- "lastModified": "2019-10-09T23:44:38.417",
+ "lastModified": "2023-10-25T18:16:14.523",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10305.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10305.json
index 7a4d547cf47..67dd4128b83 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10305.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10305.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10305",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-18T17:29:00.773",
- "lastModified": "2020-10-02T14:42:44.500",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.587",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10306.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10306.json
index ef427f82bb0..239a214e303 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10306.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10306.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10306",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-18T17:29:00.837",
- "lastModified": "2020-10-02T14:42:32.767",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.653",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10307.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10307.json
index 2f4f22a8878..7cf57305d09 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10307.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10307.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10307",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.157",
- "lastModified": "2019-05-06T12:29:00.297",
+ "lastModified": "2023-10-25T18:16:14.720",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10308.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10308.json
index 468f14fdba8..b584d5d1e78 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10308.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10308.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10308",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.347",
- "lastModified": "2020-10-02T14:42:19.063",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.797",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10309.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10309.json
index 74713ad8e81..6e244f7dbf9 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10309.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10309.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10309",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.407",
- "lastModified": "2019-05-06T16:29:00.553",
+ "lastModified": "2023-10-25T18:16:14.857",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10310.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10310.json
index dad058d65fe..bcefaff36f0 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10310.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10310.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10310",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.470",
- "lastModified": "2019-05-06T16:29:00.740",
+ "lastModified": "2023-10-25T18:16:14.927",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10311.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10311.json
index 82e22709e91..f92664187d1 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10311.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10311.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10311",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.533",
- "lastModified": "2020-10-01T16:42:47.327",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:14.983",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10312.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10312.json
index fd0567b7925..479d3662f69 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10312.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10312.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10312",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.597",
- "lastModified": "2020-10-01T16:42:59.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:15.043",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10313.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10313.json
index 80d6d782497..66963417b13 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10313.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10313.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10313",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.687",
- "lastModified": "2020-10-01T16:13:22.217",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:15.107",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10314.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10314.json
index 3a5b5a03d17..f42b58fe2a1 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10314.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10314.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10314",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.750",
- "lastModified": "2019-05-06T12:29:01.327",
+ "lastModified": "2023-10-25T18:16:15.163",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10315.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10315.json
index 504763591af..9ddd7f38cad 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10315.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10315.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10315",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.813",
- "lastModified": "2019-05-06T12:29:01.470",
+ "lastModified": "2023-10-25T18:16:15.230",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10316.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10316.json
index 88ed6b07d5f..f6e4a27461e 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10316.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10316.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10316",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.877",
- "lastModified": "2020-10-02T14:41:27.953",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:15.287",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10317.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10317.json
index 9c3392577a3..15cd07828be 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10317.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10317.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10317",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.937",
- "lastModified": "2019-05-06T12:29:01.767",
+ "lastModified": "2023-10-25T18:16:15.360",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10318.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10318.json
index e60df7d588f..484c3ccea0b 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10318.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10318.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10318",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-04-30T13:29:05.987",
- "lastModified": "2020-10-02T14:40:43.467",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:15.430",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10319.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10319.json
index 887acfc0377..30b7b90da7e 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10319.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10319.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10319",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-21T13:29:00.227",
- "lastModified": "2020-10-02T14:36:03.723",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:15.490",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10320.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10320.json
index af5fcb683bd..0680f28c9bf 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10320.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10320.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10320",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-21T13:29:00.397",
- "lastModified": "2019-06-11T21:29:00.960",
+ "lastModified": "2023-10-25T18:16:15.567",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-538"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-200"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10321.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10321.json
index 5294a2dbeaf..c7b5945b7ae 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10321.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10321.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10321",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-31T15:29:00.230",
- "lastModified": "2019-06-05T15:29:00.967",
+ "lastModified": "2023-10-25T18:16:15.643",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
"source": "jenkinsci-cert@googlegroups.com"
},
{
- "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787",
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10322.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10322.json
index 1d84117e5a0..b7cf895d16c 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10322.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10322.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10322",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-31T15:29:00.277",
- "lastModified": "2020-10-01T16:42:31.657",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:15.727",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -121,11 +111,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0787",
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10323.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10323.json
index ddc87b34a9d..afee1669c70 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10323.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10323.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10323",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-31T15:29:00.310",
- "lastModified": "2020-10-01T16:40:20.900",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:15.793",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -121,11 +111,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1015%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0846",
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10324.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10324.json
index 9a2215eb83f..164f2c784b8 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10324.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10324.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10324",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-31T15:29:00.357",
- "lastModified": "2019-06-03T13:29:00.473",
+ "lastModified": "2023-10-25T18:16:15.857",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10325.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10325.json
index 22e55356f39..f44ca183d94 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10325.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10325.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10325",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-31T15:29:00.403",
- "lastModified": "2019-06-03T13:29:00.553",
+ "lastModified": "2023-10-25T18:16:15.920",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10326.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10326.json
index 9d2818e8340..2ec149b59b8 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10326.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10326.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10326",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-31T15:29:00.433",
- "lastModified": "2019-06-03T13:29:00.630",
+ "lastModified": "2023-10-25T18:16:15.977",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10327.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10327.json
index 8fea1cf3eb0..d0cd86559be 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10327.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10327.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10327",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-31T15:29:00.467",
- "lastModified": "2019-06-03T13:29:00.707",
+ "lastModified": "2023-10-25T18:16:16.037",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10328.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10328.json
index cde2f128f8d..42dafd4039f 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10328.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10328.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10328",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-31T15:29:00.513",
- "lastModified": "2019-06-03T13:29:00.787",
+ "lastModified": "2023-10-25T18:16:16.100",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-693"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-183"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10329.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10329.json
index 10442e65efc..d643ccc1c36 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10329.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10329.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10329",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-31T15:29:00.543",
- "lastModified": "2020-10-02T14:35:53.377",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:16.160",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10330.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10330.json
index 2921fde037c..3bd002523f6 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10330.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10330.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10330",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-05-31T15:29:00.590",
- "lastModified": "2020-10-02T14:35:40.707",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:16.220",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10331.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10331.json
index de987915723..7782f2dc186 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10331.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10331.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10331",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-06-11T14:29:00.697",
- "lastModified": "2019-06-13T13:29:00.250",
+ "lastModified": "2023-10-25T18:16:16.283",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -117,11 +107,8 @@
"source": "jenkinsci-cert@googlegroups.com"
},
{
- "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10332.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10332.json
index 2d072ce3053..dc1481e8026 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10332.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10332.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10332",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-06-11T14:29:00.853",
- "lastModified": "2020-10-01T16:31:08.573",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:16.363",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -121,11 +111,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10333.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10333.json
index 194b71fe3c0..b6be8e8bb85 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10333.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10333.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10333",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-06-11T14:29:00.900",
- "lastModified": "2020-10-02T14:35:12.657",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:16.423",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -121,11 +111,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1410%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10334.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10334.json
index 77b9cde4ca7..28877603fa4 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10334.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10334.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10334",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-06-11T14:29:00.947",
- "lastModified": "2019-06-13T13:29:00.500",
+ "lastModified": "2023-10-25T18:16:16.483",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10335.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10335.json
index 9f03a8dc674..315e0594120 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10335.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10335.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10335",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-06-11T14:29:00.980",
- "lastModified": "2019-06-13T13:29:00.580",
+ "lastModified": "2023-10-25T18:16:16.543",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10336.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10336.json
index 888d2a32414..f7c798f1040 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10336.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10336.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10336",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-06-11T14:29:01.027",
- "lastModified": "2019-06-13T13:29:00.657",
+ "lastModified": "2023-10-25T18:16:16.607",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10337.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10337.json
index 92434db831c..ffdcaf0e825 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10337.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10337.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10337",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-06-11T14:29:01.057",
- "lastModified": "2019-06-13T13:29:00.737",
+ "lastModified": "2023-10-25T18:16:16.670",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10338.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10338.json
index 4ce026a2075..d52848dc74b 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10338.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10338.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10338",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-06-11T14:29:01.103",
- "lastModified": "2019-06-13T13:29:00.813",
+ "lastModified": "2023-10-25T18:16:16.730",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10339.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10339.json
index 59af611ce62..76fcf357c1d 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10339.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10339.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10339",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-06-11T14:29:01.150",
- "lastModified": "2020-10-01T16:30:28.463",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:16.787",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10340.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10340.json
index 7572eff4221..e238abede14 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10340.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10340.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10340",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-11T14:15:10.537",
- "lastModified": "2023-01-30T18:40:48.420",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:16.853",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10341.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10341.json
index d70ab84064e..b78318e0e1b 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10341.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10341.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10341",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-11T14:15:10.600",
- "lastModified": "2020-10-01T16:33:26.030",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:16.930",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10342.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10342.json
index 01e3d03ab36..44f35fc1ae6 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10342.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10342.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10342",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-11T14:15:10.677",
- "lastModified": "2020-10-01T16:31:34.950",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:16.997",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10343.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10343.json
index f1429a39193..089baec55a0 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10343.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10343.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10343",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.230",
- "lastModified": "2023-03-03T16:54:15.157",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.057",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-532"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-532"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10344.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10344.json
index d547f58d6d3..45dee5c18cf 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10344.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10344.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10344",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.290",
- "lastModified": "2020-10-02T14:26:30.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.140",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10345.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10345.json
index e3cb443fec8..e1340720ad2 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10345.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10345.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10345",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.353",
- "lastModified": "2020-10-02T14:26:05.620",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.197",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -77,20 +77,6 @@
"value": "CWE-532"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- },
- {
- "lang": "en",
- "value": "CWE-532"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10346.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10346.json
index aaa7d2d5046..08e12a39635 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10346.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10346.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10346",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-11T14:15:10.740",
- "lastModified": "2023-01-30T18:40:42.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.260",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10347.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10347.json
index c29234ab700..cd885b40daa 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10347.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10347.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10347",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-11T14:15:10.820",
- "lastModified": "2020-10-02T14:31:42.087",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.320",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10348.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10348.json
index 2ab79108b2a..5c468835e6c 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10348.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10348.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10348",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-11T14:15:10.897",
- "lastModified": "2020-10-01T15:51:52.930",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.380",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10349.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10349.json
index 4e79ab455b2..e811bcb64be 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10349.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10349.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10349",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-11T14:15:10.960",
- "lastModified": "2023-01-30T18:40:34.757",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.447",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10350.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10350.json
index 2797c9dbdbe..720802c8fd9 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10350.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10350.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10350",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-11T14:15:11.023",
- "lastModified": "2020-10-02T14:31:27.117",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.510",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10351.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10351.json
index d0bd0a4cca4..d3664773221 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10351.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10351.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10351",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-11T14:15:11.100",
- "lastModified": "2020-10-02T14:29:52.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.573",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10352.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10352.json
index 08912fbffd6..67d71c86269 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10352.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10352.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10352",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-17T16:15:12.413",
- "lastModified": "2019-08-15T16:15:11.460",
+ "lastModified": "2023-10-25T18:16:17.633",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10353.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10353.json
index f6e9a19a5cd..c5af6de6f83 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10353.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10353.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10353",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-17T16:15:12.490",
- "lastModified": "2019-07-26T07:15:11.770",
+ "lastModified": "2023-10-25T18:16:17.723",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10354.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10354.json
index d3553ae9fb2..c821adf4bda 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10354.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10354.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10354",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-17T16:15:12.553",
- "lastModified": "2020-10-02T14:29:21.487",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.803",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-425"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10355.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10355.json
index e0b2dcd34f9..d8fca2fa156 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10355.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10355.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10355",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.433",
- "lastModified": "2020-10-02T14:25:21.807",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.903",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-704"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
@@ -154,11 +144,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10356.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10356.json
index 6ab42bb0186..a136597f66c 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10356.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10356.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10356",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.480",
- "lastModified": "2020-10-02T14:22:56.973",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:17.980",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
@@ -154,11 +144,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10357.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10357.json
index 3340b5af534..0effdd4e1f9 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10357.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10357.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10357",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.557",
- "lastModified": "2020-10-02T14:22:44.613",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.047",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10358.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10358.json
index 50d045e5e2c..5945bf40c66 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10358.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10358.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10358",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.620",
- "lastModified": "2021-10-28T13:53:38.783",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.137",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-532"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-532"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10359.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10359.json
index 25ba6982e09..bb483c897e8 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10359.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10359.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10359",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.683",
- "lastModified": "2023-02-02T19:23:50.377",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.213",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10360.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10360.json
index 09d7b59f6c3..91bf3940c39 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10360.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10360.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10360",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.743",
- "lastModified": "2023-03-03T02:56:55.577",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.283",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10361.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10361.json
index 232582586e0..a5550e50b59 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10361.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10361.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10361",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.807",
- "lastModified": "2020-10-02T14:22:29.847",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.357",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10362.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10362.json
index 3ef3b93b947..35b48c4a269 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10362.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10362.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10362",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.853",
- "lastModified": "2021-10-28T13:39:32.473",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.420",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-116"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-200"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10363.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10363.json
index 43c98c7d6e0..b2ef2148189 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10363.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10363.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10363",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.933",
- "lastModified": "2020-10-02T14:18:43.493",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.480",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-311"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10364.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10364.json
index ba749cd4f80..a8672bbeb4b 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10364.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10364.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10364",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:12.980",
- "lastModified": "2020-10-02T14:18:23.633",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.543",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-532"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-532"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10365.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10365.json
index b64a3533f8e..7a6b945432d 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10365.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10365.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10365",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:13.040",
- "lastModified": "2023-03-03T15:47:22.537",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.600",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-668"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-377"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10366.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10366.json
index d297b8868d6..e1b48961452 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10366.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10366.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10366",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-07-31T13:15:13.120",
- "lastModified": "2020-10-01T15:44:42.203",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.667",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10367.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10367.json
index 48cb6694fcf..2ffe02b1de2 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10367.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10367.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10367",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.063",
- "lastModified": "2023-03-03T16:54:20.077",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.723",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-532"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-532"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10368.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10368.json
index 9868fef8e1b..9cbe42aae1a 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10368.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10368.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10368",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.140",
- "lastModified": "2019-10-09T23:44:44.977",
+ "lastModified": "2023-10-25T18:16:18.797",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -120,15 +110,15 @@
]
},
{
- "url": "https://lists.apache.org/thread.html/r42b7ff290ed5ec8f27f12c54fff54462ffc4bcf6a5015c37fece94ac@%3Cnotifications.jclouds.apache.org%3E",
+ "url": "https://lists.apache.org/thread.html/r42b7ff290ed5ec8f27f12c54fff54462ffc4bcf6a5015c37fece94ac%40%3Cnotifications.jclouds.apache.org%3E",
"source": "jenkinsci-cert@googlegroups.com"
},
{
- "url": "https://lists.apache.org/thread.html/r6c4693d03d15391814c647742db49a4d9937fa34573fb66103d57b45@%3Cnotifications.jclouds.apache.org%3E",
+ "url": "https://lists.apache.org/thread.html/r6c4693d03d15391814c647742db49a4d9937fa34573fb66103d57b45%40%3Cnotifications.jclouds.apache.org%3E",
"source": "jenkinsci-cert@googlegroups.com"
},
{
- "url": "https://lists.apache.org/thread.html/r725e55670dbdd214f3cfdfea255b72a75fa9a4f0c6c9d109b29c7881@%3Cnotifications.jclouds.apache.org%3E",
+ "url": "https://lists.apache.org/thread.html/r725e55670dbdd214f3cfdfea255b72a75fa9a4f0c6c9d109b29c7881%40%3Cnotifications.jclouds.apache.org%3E",
"source": "jenkinsci-cert@googlegroups.com"
}
]
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10369.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10369.json
index a9ebe71face..181ab4ed1ef 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10369.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10369.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10369",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.237",
- "lastModified": "2020-10-01T15:44:24.217",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.880",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -120,28 +110,16 @@
]
},
{
- "url": "https://lists.apache.org/thread.html/r42b7ff290ed5ec8f27f12c54fff54462ffc4bcf6a5015c37fece94ac@%3Cnotifications.jclouds.apache.org%3E",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Mailing List",
- "Third Party Advisory"
- ]
+ "url": "https://lists.apache.org/thread.html/r42b7ff290ed5ec8f27f12c54fff54462ffc4bcf6a5015c37fece94ac%40%3Cnotifications.jclouds.apache.org%3E",
+ "source": "jenkinsci-cert@googlegroups.com"
},
{
- "url": "https://lists.apache.org/thread.html/r6c4693d03d15391814c647742db49a4d9937fa34573fb66103d57b45@%3Cnotifications.jclouds.apache.org%3E",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Mailing List",
- "Third Party Advisory"
- ]
+ "url": "https://lists.apache.org/thread.html/r6c4693d03d15391814c647742db49a4d9937fa34573fb66103d57b45%40%3Cnotifications.jclouds.apache.org%3E",
+ "source": "jenkinsci-cert@googlegroups.com"
},
{
- "url": "https://lists.apache.org/thread.html/r725e55670dbdd214f3cfdfea255b72a75fa9a4f0c6c9d109b29c7881@%3Cnotifications.jclouds.apache.org%3E",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Mailing List",
- "Third Party Advisory"
- ]
+ "url": "https://lists.apache.org/thread.html/r725e55670dbdd214f3cfdfea255b72a75fa9a4f0c6c9d109b29c7881%40%3Cnotifications.jclouds.apache.org%3E",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10370.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10370.json
index f4489d50da4..2a49b4ea05e 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10370.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10370.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10370",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.313",
- "lastModified": "2020-10-02T14:08:07.667",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:18.947",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-532"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10371.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10371.json
index aed54ff2bee..f60d863e881 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10371.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10371.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10371",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.377",
- "lastModified": "2023-03-03T18:59:24.907",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.013",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-384"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-384"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10372.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10372.json
index 98320c53750..ffd5b8784b2 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10372.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10372.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10372",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.453",
- "lastModified": "2023-03-03T18:59:47.197",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-601"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-601"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10373.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10373.json
index 747a1607b4a..b311e7c4079 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10373.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10373.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10373",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.517",
- "lastModified": "2023-03-03T15:58:31.803",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.140",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10374.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10374.json
index fdcd553ef73..debe165b0e7 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10374.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10374.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10374",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.580",
- "lastModified": "2023-03-03T19:00:06.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.207",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10375.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10375.json
index 2d813383ce3..fae7bb4af74 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10375.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10375.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10375",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.640",
- "lastModified": "2020-10-02T14:08:29.357",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.270",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10376.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10376.json
index 07c19f6a97d..cfde1d9a155 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10376.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10376.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10376",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.720",
- "lastModified": "2023-03-03T16:55:29.137",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.330",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10377.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10377.json
index 9c0330a6c1d..2ed3d06de19 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10377.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10377.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10377",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:12.783",
- "lastModified": "2020-10-01T16:33:39.390",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.397",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10378.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10378.json
index c889d1fe035..0497deefa96 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10378.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10378.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10378",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:13.140",
- "lastModified": "2020-10-01T15:42:55.980",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.453",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10379.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10379.json
index d4d02d6c4e8..f575cd74e4a 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10379.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10379.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10379",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:13.220",
- "lastModified": "2020-10-02T14:08:40.560",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.517",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10380.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10380.json
index 5138cfe2320..82cca4d5446 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10380.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10380.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10380",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:13.283",
- "lastModified": "2020-10-01T15:42:08.557",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.577",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-183"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10381.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10381.json
index 37e91a46d5d..14aa8e88826 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10381.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10381.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10381",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:13.343",
- "lastModified": "2023-03-03T17:40:51.530",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.633",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10382.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10382.json
index cd594827357..7d7ce8d9526 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10382.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10382.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10382",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:13.407",
- "lastModified": "2023-03-03T17:40:44.697",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10383.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10383.json
index 6d0c1e900c8..13f34b6264d 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10383.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10383.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10383",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-28T16:15:10.907",
- "lastModified": "2022-06-13T18:37:23.527",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.753",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10384.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10384.json
index 77dd626c847..92353f92f98 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10384.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10384.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10384",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-28T16:15:10.983",
- "lastModified": "2022-06-13T18:37:14.320",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.840",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10385.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10385.json
index 26f7d2c5c84..ecbdd662aa3 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10385.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10385.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10385",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:13.470",
- "lastModified": "2020-10-01T15:43:37.357",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.913",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10386.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10386.json
index 093dea0e4cb..068241c8c58 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10386.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10386.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10386",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:13.533",
- "lastModified": "2023-02-02T19:49:22.110",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:19.973",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10387.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10387.json
index 532111e3527..246044a456d 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10387.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10387.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10387",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:13.610",
- "lastModified": "2020-10-02T14:08:56.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.037",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10388.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10388.json
index 5f4d40f9987..5a6b1af93e2 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10388.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10388.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10388",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:13.720",
- "lastModified": "2023-02-02T19:48:19.497",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.097",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10389.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10389.json
index 8927b8705c8..f47b5f11ba1 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10389.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10389.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10389",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-07T15:15:13.783",
- "lastModified": "2020-10-01T15:41:17.383",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.163",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10390.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10390.json
index 96de654564f..0fe896bb716 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10390.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10390.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10390",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-28T16:15:11.030",
- "lastModified": "2021-11-02T19:35:49.567",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.223",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10391.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10391.json
index c24eea99fa8..7eb4cf8791c 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10391.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10391.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10391",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-08-28T16:15:11.077",
- "lastModified": "2020-10-02T14:12:12.273",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.290",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10392.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10392.json
index ae80ce774f1..c4fd7701b2e 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10392.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10392.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10392",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-12T14:15:11.257",
- "lastModified": "2023-02-28T19:30:54.590",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.350",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-78"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-78"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10393.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10393.json
index 74ec8b2d2db..5dcdbf33f56 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10393.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10393.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10393",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-12T14:15:11.333",
- "lastModified": "2021-11-02T19:36:26.043",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.433",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10394.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10394.json
index fd69769bc52..e474dd67a38 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10394.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10394.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10394",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-12T14:15:11.397",
- "lastModified": "2021-11-02T20:01:34.433",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.500",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10395.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10395.json
index 5567fde3991..f883c6d637a 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10395.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10395.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10395",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-12T14:15:11.473",
- "lastModified": "2023-02-28T19:31:23.820",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.560",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10396.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10396.json
index 84c80e98599..6eee521c816 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10396.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10396.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10396",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-12T14:15:11.537",
- "lastModified": "2023-02-28T19:31:34.947",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.620",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10397.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10397.json
index 1f227701849..748c49adaa8 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10397.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10397.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10397",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-12T14:15:11.647",
- "lastModified": "2021-10-28T13:38:36.963",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.697",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10398.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10398.json
index 1c6fecb6c75..0aef9198924 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10398.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10398.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10398",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-12T14:15:11.787",
- "lastModified": "2023-02-28T19:32:17.813",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.790",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-103xx/CVE-2019-10399.json b/CVE-2019/CVE-2019-103xx/CVE-2019-10399.json
index 5fc59a844e3..966716bca08 100644
--- a/CVE-2019/CVE-2019-103xx/CVE-2019-10399.json
+++ b/CVE-2019/CVE-2019-103xx/CVE-2019-10399.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10399",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-12T14:15:11.867",
- "lastModified": "2021-11-02T20:02:10.807",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.863",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10400.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10400.json
index d251761f72b..0cada5d629c 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10400.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10400.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10400",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-12T14:15:11.960",
- "lastModified": "2021-11-02T20:02:37.700",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.933",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10401.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10401.json
index c58b59bbdad..1d50b1cb10d 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10401.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10401.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10401",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:10.383",
- "lastModified": "2023-01-27T18:02:59.690",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:20.997",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10402.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10402.json
index cb38a90fa58..61778f8d5ca 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10402.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10402.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10402",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:10.463",
- "lastModified": "2023-02-23T01:51:20.453",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.070",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10403.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10403.json
index d21808a05d3..8395e921c3c 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10403.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10403.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10403",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:10.570",
- "lastModified": "2023-02-23T01:53:03.183",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.150",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
@@ -119,11 +109,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1537%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1537%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10404.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10404.json
index bccc619cd44..b16b83664e6 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10404.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10404.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10404",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:10.633",
- "lastModified": "2023-02-23T01:53:35.363",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.237",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
@@ -119,11 +109,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1537%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1537%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10405.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10405.json
index 7deec2b2388..99c202f6d8e 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10405.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10405.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10405",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:10.697",
- "lastModified": "2023-02-23T01:54:37.833",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.313",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10406.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10406.json
index 3b1a9f99ed2..c28de735ac0 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10406.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10406.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10406",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:10.773",
- "lastModified": "2023-02-23T01:55:17.940",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.383",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10407.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10407.json
index d8ee6b7fbe5..ba592ae30b2 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10407.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10407.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10407",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:10.837",
- "lastModified": "2023-02-23T01:57:34.347",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.447",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-200"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-213"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10408.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10408.json
index 9601189db46..1d55d9c8d97 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10408.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10408.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10408",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:10.917",
- "lastModified": "2023-02-23T02:00:00.473",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.540",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10409.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10409.json
index cf3b8ffe664..f0f3b9a39ce 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10409.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10409.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10409",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:10.977",
- "lastModified": "2020-10-01T15:41:01.147",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.617",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10410.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10410.json
index 39aea5e5329..43b8d97889a 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10410.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10410.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10410",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.040",
- "lastModified": "2023-02-23T02:00:31.033",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.677",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10411.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10411.json
index e8392778ca4..17936072b29 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10411.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10411.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10411",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.103",
- "lastModified": "2023-02-23T02:06:10.657",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.743",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10412.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10412.json
index 34d46abbb88..a29291a4de0 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10412.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10412.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10412",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.150",
- "lastModified": "2023-02-23T02:06:51.710",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.803",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10413.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10413.json
index 433c5d5bea8..1ebc7ed03f9 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10413.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10413.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10413",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.213",
- "lastModified": "2023-02-23T02:07:48.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.863",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10414.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10414.json
index 6960df0087c..9e3d8a2b52d 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10414.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10414.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10414",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.290",
- "lastModified": "2023-02-23T02:09:08.127",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.920",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10415.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10415.json
index 0ce495ae49c..bfa36b0e08a 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10415.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10415.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10415",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.353",
- "lastModified": "2023-02-23T02:12:28.940",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:21.980",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10416.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10416.json
index be42fe738c6..94dc07a1cef 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10416.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10416.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10416",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.417",
- "lastModified": "2023-02-23T02:18:22.870",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.040",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10417.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10417.json
index 56633cdb546..c7f07fb077f 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10417.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10417.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10417",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.477",
- "lastModified": "2020-10-02T14:12:25.897",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.100",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-183"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-09-25/#SECURITY-920%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-09-25/#SECURITY-920%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10418.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10418.json
index 4c786f815ba..8c7b62d94cb 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10418.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10418.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10418",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.523",
- "lastModified": "2020-10-01T16:40:44.807",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.173",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-183"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-09-25/#SECURITY-920%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-09-25/#SECURITY-920%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10419.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10419.json
index 096706e51c2..f5a718673ab 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10419.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10419.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10419",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.587",
- "lastModified": "2023-02-23T02:19:02.943",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.230",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10420.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10420.json
index 34e204751c4..dc374ee5711 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10420.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10420.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10420",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.650",
- "lastModified": "2023-02-23T02:19:52.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.297",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10421.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10421.json
index fcb749f0aa7..5922cb4e010 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10421.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10421.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10421",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.697",
- "lastModified": "2023-02-23T02:20:50.897",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.357",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10422.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10422.json
index df573e76511..37a5455ae3b 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10422.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10422.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10422",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.760",
- "lastModified": "2023-02-23T02:21:40.513",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.420",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10423.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10423.json
index 4fc17ebae2c..9fea38a2ef3 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10423.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10423.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10423",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.807",
- "lastModified": "2023-02-23T02:22:32.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.477",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10424.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10424.json
index 026b8094cc5..bd9406f4c66 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10424.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10424.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10424",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.867",
- "lastModified": "2023-02-23T02:35:54.083",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.540",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10425.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10425.json
index dc95a7d3270..a8e7716b286 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10425.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10425.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10425",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.930",
- "lastModified": "2023-03-01T01:08:42.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.597",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10426.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10426.json
index 5fd5a3a1837..2e38381b62b 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10426.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10426.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10426",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:11.993",
- "lastModified": "2023-03-01T01:09:36.963",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.657",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10427.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10427.json
index d92e060e676..ca2bfeee187 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10427.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10427.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10427",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:12.040",
- "lastModified": "2023-03-01T01:12:14.217",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.713",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10428.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10428.json
index a399c971461..cc94778c8ea 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10428.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10428.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10428",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:12.103",
- "lastModified": "2023-03-01T01:04:48.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.777",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10429.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10429.json
index 219c9b3aff6..37c8aaf41aa 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10429.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10429.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10429",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:12.167",
- "lastModified": "2023-03-01T01:14:45.007",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.837",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10430.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10430.json
index dec571be337..fe9f96b32e8 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10430.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10430.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10430",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-09-25T16:15:12.227",
- "lastModified": "2023-02-11T18:32:36.187",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:22.907",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10431.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10431.json
index 74d988ca5c7..5b6dcbd6b02 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10431.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10431.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10431",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-01T14:15:18.507",
- "lastModified": "2019-10-09T23:44:52.353",
+ "lastModified": "2023-10-25T18:16:22.970",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-94"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10432.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10432.json
index f792adf987c..8b84a8b1b2c 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10432.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10432.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-10432",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-01T14:15:23.817",
- "lastModified": "2019-10-09T23:44:52.510",
+ "lastModified": "2023-10-25T18:16:23.057",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10433.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10433.json
index b4517d6581b..5885364583e 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10433.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10433.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10433",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-01T14:15:28.507",
- "lastModified": "2023-03-01T18:54:04.627",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.120",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10434.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10434.json
index a004eeb9d09..beba2cae474 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10434.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10434.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10434",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-01T14:15:30.443",
- "lastModified": "2023-01-27T18:03:06.137",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.213",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10435.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10435.json
index ce7b89d10d0..1dccbc588ad 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10435.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10435.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10435",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-01T14:15:31.817",
- "lastModified": "2023-01-27T18:03:26.353",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.270",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10436.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10436.json
index b42f142e1fc..296d8913a61 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10436.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10436.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10436",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:11.277",
- "lastModified": "2020-10-01T16:45:26.070",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.333",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10437.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10437.json
index 9d7a26d1115..a84b6f9fd0c 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10437.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10437.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10437",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:11.417",
- "lastModified": "2019-10-23T14:21:46.917",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.427",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -105,11 +95,8 @@
],
"references": [
{
- "url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1006%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1006%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10438.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10438.json
index 0bd728f45ea..55bffa763e8 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10438.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10438.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10438",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:11.840",
- "lastModified": "2020-10-01T14:41:10.440",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.510",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -105,11 +95,8 @@
],
"references": [
{
- "url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1006%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1006%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10439.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10439.json
index 14cdd83b6bc..6192dcaa203 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10439.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10439.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10439",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:11.933",
- "lastModified": "2020-10-01T14:42:36.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.573",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -105,11 +95,8 @@
],
"references": [
{
- "url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1006%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-16/#SECURITY-1006%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10440.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10440.json
index 9e4f4e11332..7c2bb731d0e 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10440.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10440.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10440",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.043",
- "lastModified": "2023-02-04T00:10:42.240",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.637",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10441.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10441.json
index d5250106a61..b75993808a2 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10441.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10441.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10441",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.150",
- "lastModified": "2019-10-21T18:47:11.207",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.700",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10442.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10442.json
index a6eee94bd73..4eda37ef347 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10442.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10442.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10442",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.247",
- "lastModified": "2020-10-01T14:48:17.160",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.757",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10443.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10443.json
index fc1b21d0786..841d7eda32c 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10443.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10443.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10443",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.370",
- "lastModified": "2023-02-04T00:12:51.180",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.823",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10444.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10444.json
index 8f30e68e32f..ee50709f10c 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10444.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10444.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10444",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.447",
- "lastModified": "2019-10-18T20:27:12.317",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.883",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10445.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10445.json
index c96ce67586b..8a6adfce273 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10445.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10445.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10445",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.510",
- "lastModified": "2020-10-01T14:50:04.180",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:23.943",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10446.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10446.json
index b8e11362123..f823815379e 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10446.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10446.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10446",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.590",
- "lastModified": "2019-10-18T20:36:46.047",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.003",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10447.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10447.json
index 4eb2468ca71..39129416b6b 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10447.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10447.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10447",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.683",
- "lastModified": "2019-10-20T22:46:16.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.063",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10448.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10448.json
index 27587d5b1a8..02c536df5ec 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10448.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10448.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10448",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.777",
- "lastModified": "2019-10-18T20:28:22.883",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.127",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10449.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10449.json
index 133e8a1d357..677e041dd0b 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10449.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10449.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10449",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.887",
- "lastModified": "2019-10-18T21:01:35.303",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.197",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10450.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10450.json
index bb98dca51e3..03602ca46eb 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10450.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10450.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10450",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:12.963",
- "lastModified": "2019-10-18T20:47:09.670",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.257",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10451.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10451.json
index c179408baed..6fedf2f6ccd 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10451.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10451.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10451",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:13.043",
- "lastModified": "2019-10-22T17:22:13.580",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.317",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10452.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10452.json
index 96fd850e281..03376954d61 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10452.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10452.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10452",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:13.120",
- "lastModified": "2019-10-18T20:42:59.127",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10453.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10453.json
index 2f56add9dd1..877dd0fb53e 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10453.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10453.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10453",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:13.213",
- "lastModified": "2019-10-18T20:41:08.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.447",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10454.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10454.json
index 206eefb7b03..2c286c396bb 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10454.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10454.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10454",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:13.277",
- "lastModified": "2019-10-18T12:31:32.387",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.510",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10455.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10455.json
index bbcf4421b5b..40bea6f4624 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10455.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10455.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10455",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:13.370",
- "lastModified": "2020-10-01T15:38:10.137",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.570",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10456.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10456.json
index 24b297e0f6b..68e8cad6652 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10456.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10456.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10456",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:13.447",
- "lastModified": "2019-10-18T12:24:59.367",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.627",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10457.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10457.json
index 385c1dd08b7..4c11ae5642c 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10457.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10457.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10457",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:13.527",
- "lastModified": "2020-10-01T15:38:02.077",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.683",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10458.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10458.json
index 462f0dda509..4947a5deef4 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10458.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10458.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10458",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-16T14:15:13.607",
- "lastModified": "2021-10-29T19:41:59.083",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.740",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-183"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10459.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10459.json
index 2be04868e5e..9321da723b8 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10459.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10459.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10459",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:10.300",
- "lastModified": "2019-10-25T15:28:29.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.807",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10460.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10460.json
index 0e79f1c65cb..7a058323d16 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10460.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10460.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10460",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:10.393",
- "lastModified": "2019-10-24T16:32:51.283",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.883",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10461.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10461.json
index f799365db36..24aa0f86ed9 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10461.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10461.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10461",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:10.457",
- "lastModified": "2019-10-24T17:04:36.620",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:24.943",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10462.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10462.json
index 2023029306d..33a31521a10 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10462.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10462.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10462",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:10.550",
- "lastModified": "2019-10-25T15:17:47.910",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.000",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10463.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10463.json
index ee100652fa1..21bdc30a5f8 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10463.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10463.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10463",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:10.627",
- "lastModified": "2019-10-25T15:07:01.767",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.063",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10464.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10464.json
index 21729a1ed10..54d228a6d99 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10464.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10464.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10464",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:10.690",
- "lastModified": "2019-10-24T17:08:10.567",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.123",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10465.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10465.json
index ea84439d2b3..590ddff0638 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10465.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10465.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10465",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:10.770",
- "lastModified": "2019-10-24T17:25:33.300",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.193",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10466.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10466.json
index c4d7c7505e3..7152cd05ade 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10466.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10466.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10466",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:10.830",
- "lastModified": "2019-10-25T14:59:42.377",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.247",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10467.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10467.json
index 90830c4581d..8d6ab7162fd 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10467.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10467.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10467",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:10.927",
- "lastModified": "2019-10-24T14:07:34.407",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.307",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10468.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10468.json
index c5450512d02..40dd3d9b67f 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10468.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10468.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10468",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:10.987",
- "lastModified": "2019-10-24T19:42:03.063",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.377",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10469.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10469.json
index ee1b3b17bdd..fb25f2152a2 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10469.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10469.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10469",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:11.067",
- "lastModified": "2019-10-24T19:23:14.340",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.440",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10470.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10470.json
index 6b72b2daa96..d14b50c1d8d 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10470.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10470.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10470",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:11.143",
- "lastModified": "2019-10-24T19:05:32.260",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.503",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10471.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10471.json
index a9ff17b5f90..9eafb7ffb74 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10471.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10471.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10471",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:11.223",
- "lastModified": "2019-10-24T17:15:19.883",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.567",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10472.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10472.json
index 345dcf0dbd7..4d6c7c20011 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10472.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10472.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10472",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:11.300",
- "lastModified": "2019-10-24T18:15:58.767",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.630",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10473.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10473.json
index 71789c4258c..4ad86ded69c 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10473.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10473.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10473",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:11.363",
- "lastModified": "2019-10-24T17:46:20.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.697",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10474.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10474.json
index 6c8e0a48426..aa957e2ba77 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10474.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10474.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10474",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:11.427",
- "lastModified": "2019-10-24T17:35:52.220",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.763",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10475.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10475.json
index bef51a352bb..dad39caaeee 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10475.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10475.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10475",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:11.487",
- "lastModified": "2023-01-27T18:04:01.513",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.820",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10476.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10476.json
index bff7c7640e8..c44e24603fc 100644
--- a/CVE-2019/CVE-2019-104xx/CVE-2019-10476.json
+++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10476.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-10476",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-10-23T13:15:11.550",
- "lastModified": "2019-10-24T14:48:30.377",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.880",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-139xx/CVE-2019-13990.json b/CVE-2019/CVE-2019-139xx/CVE-2019-13990.json
index 6a92d7fd373..742a45c8509 100644
--- a/CVE-2019/CVE-2019-139xx/CVE-2019-13990.json
+++ b/CVE-2019/CVE-2019-139xx/CVE-2019-13990.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-13990",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-07-26T19:15:11.730",
- "lastModified": "2023-03-03T15:22:57.467",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-28T06:15:39.563",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -418,6 +418,10 @@
}
],
"references": [
+ {
+ "url": "https://confluence.atlassian.com/security/ssot-117-cve-2019-13990-xxe-xml-external-entity-injection-vulnerability-in-jira-service-management-data-center-and-jira-service-management-server-1295385959.html",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://github.com/quartz-scheduler/quartz/issues/467",
"source": "cve@mitre.org",
diff --git a/CVE-2019/CVE-2019-13xx/CVE-2019-1357.json b/CVE-2019/CVE-2019-13xx/CVE-2019-1357.json
index 2b54fa8aa37..ec80059550f 100644
--- a/CVE-2019/CVE-2019-13xx/CVE-2019-1357.json
+++ b/CVE-2019/CVE-2019-13xx/CVE-2019-1357.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-1357",
"sourceIdentifier": "secure@microsoft.com",
"published": "2019-10-10T14:15:17.860",
- "lastModified": "2019-10-11T20:22:12.070",
+ "lastModified": "2023-10-17T19:00:53.147",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -181,11 +181,6 @@
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
- {
- "vulnerable": false,
- "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "504D0038-4CFC-4CF6-A013-008B8F3F852E"
- },
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16538.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16538.json
index 177bd52af10..02f2c2512e0 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16538.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16538.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16538",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:13.947",
- "lastModified": "2020-07-13T15:47:49.603",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:25.950",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16539.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16539.json
index ee4af612f26..755bd532785 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16539.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16539.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16539",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:14.073",
- "lastModified": "2019-11-25T04:21:58.583",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.033",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-281"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16540.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16540.json
index f5e4d80b973..6c89438e9af 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16540.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16540.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16540",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:14.167",
- "lastModified": "2019-11-25T04:15:29.467",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.107",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16541.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16541.json
index 39ecde2ea51..aeaac16d9e6 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16541.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16541.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16541",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:14.260",
- "lastModified": "2019-12-03T17:36:49.710",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.167",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-668"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-668"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16542.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16542.json
index a50160702ed..f415a0260f1 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16542.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16542.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16542",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:14.323",
- "lastModified": "2019-12-03T17:31:03.867",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.230",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16543.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16543.json
index 26af15b3186..aefa9fa1939 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16543.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16543.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16543",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:14.417",
- "lastModified": "2019-12-03T17:22:50.327",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.293",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16544.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16544.json
index 60765e21248..d260b50854f 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16544.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16544.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16544",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:14.477",
- "lastModified": "2019-11-22T20:11:30.223",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.353",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-727%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-727%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16545.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16545.json
index 6f3cf738bf6..7e87c8a224c 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16545.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16545.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16545",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:14.540",
- "lastModified": "2021-10-28T13:53:59.303",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.423",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-727%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-11-21/#SECURITY-727%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16546.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16546.json
index f6a9f0f7370..31d96bec8bc 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16546.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16546.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16546",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:14.603",
- "lastModified": "2019-11-22T00:49:34.833",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.487",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-639"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-300"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16547.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16547.json
index f3738edcf14..5b7861651b6 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16547.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16547.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16547",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:14.667",
- "lastModified": "2020-10-09T13:14:24.530",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.563",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16548.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16548.json
index 861b44a3789..496ae93e673 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16548.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16548.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16548",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-11-21T15:15:14.727",
- "lastModified": "2019-11-22T00:38:05.613",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.633",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16549.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16549.json
index daa0a315551..05d0456acf0 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16549.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16549.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16549",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:14.787",
- "lastModified": "2020-01-03T16:03:35.593",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.697",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16550.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16550.json
index f9596db4c20..7c8246364be 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16550.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16550.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16550",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:15.147",
- "lastModified": "2020-01-03T16:20:02.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.777",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16551.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16551.json
index 0436b27c9a0..6d9865a7909 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16551.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16551.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16551",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:15.550",
- "lastModified": "2020-01-03T17:50:34.133",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.843",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16552.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16552.json
index 24cc79e64f8..739e0a5a32c 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16552.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16552.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16552",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:15.863",
- "lastModified": "2020-01-03T18:48:44.777",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.897",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16553.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16553.json
index 79d232bdc3e..feeef1750d5 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16553.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16553.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16553",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:16.160",
- "lastModified": "2020-01-03T18:59:47.760",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:26.957",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16554.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16554.json
index 92b994fb2d2..52bf7171efc 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16554.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16554.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16554",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:16.443",
- "lastModified": "2020-01-03T19:08:00.300",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.017",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16555.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16555.json
index 441c98bd8e4..69e84548645 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16555.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16555.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16555",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:16.707",
- "lastModified": "2020-01-03T19:20:09.490",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-400"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-400"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16556.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16556.json
index 728b5f6cb0a..3bf2b912c73 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16556.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16556.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16556",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:16.987",
- "lastModified": "2020-01-03T19:51:39.043",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.133",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16557.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16557.json
index 42893b410f5..8b6b9099dc1 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16557.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16557.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16557",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:17.397",
- "lastModified": "2020-01-03T20:03:30.527",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.197",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16558.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16558.json
index 7e669ba6439..b12a39381aa 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16558.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16558.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16558",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:17.800",
- "lastModified": "2020-01-03T19:54:52.113",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16559.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16559.json
index a75cb2d36b4..31642ee6bc1 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16559.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16559.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16559",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:18.223",
- "lastModified": "2020-01-03T17:25:08.267",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.320",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16560.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16560.json
index 9bd3a22db94..6308010d2b8 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16560.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16560.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16560",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:18.550",
- "lastModified": "2020-01-03T17:22:42.247",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16561.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16561.json
index 38e37314cf0..fb9e0096896 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16561.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16561.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16561",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:18.880",
- "lastModified": "2019-12-18T19:00:02.657",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.447",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16562.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16562.json
index 4e168ae4f28..e3a9fabb7c6 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16562.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16562.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16562",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:19.503",
- "lastModified": "2021-09-16T15:51:50.677",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.513",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16563.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16563.json
index 5ea1506e5b1..6b5ee486e23 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16563.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16563.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16563",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:19.753",
- "lastModified": "2019-12-18T19:12:19.303",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.587",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16564.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16564.json
index d73e646451b..9f1f400c41b 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16564.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16564.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16564",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:20.193",
- "lastModified": "2019-12-18T20:07:49.083",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.647",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16565.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16565.json
index 661b97590f6..4248ceed466 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16565.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16565.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16565",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:20.537",
- "lastModified": "2019-12-18T19:40:51.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.710",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16566.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16566.json
index 68034c91412..e93ce5527ae 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16566.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16566.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16566",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:20.880",
- "lastModified": "2020-10-05T15:28:40.567",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.770",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16567.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16567.json
index 59f91cf4330..a5b32f2c2c2 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16567.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16567.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16567",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:21.347",
- "lastModified": "2020-10-05T15:13:35.917",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.833",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1605%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16568.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16568.json
index 24e004789e7..fc518dfb8a6 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16568.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16568.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16568",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:21.597",
- "lastModified": "2019-12-18T20:03:08.040",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.897",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16569.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16569.json
index f6a78b51da4..ce18b00ef8b 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16569.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16569.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16569",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:22.083",
- "lastModified": "2019-12-31T15:19:09.827",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:27.957",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16570.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16570.json
index 5db476ff4eb..c597817bebc 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16570.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16570.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16570",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:22.410",
- "lastModified": "2019-12-18T19:21:21.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.027",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16571.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16571.json
index adfc0406a17..46ddd126d5d 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16571.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16571.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16571",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:22.800",
- "lastModified": "2020-10-05T15:09:32.083",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.087",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16572.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16572.json
index 76a92a39a2c..637b6eafe0e 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16572.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16572.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16572",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:23.240",
- "lastModified": "2019-12-18T19:20:27.297",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.150",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16573.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16573.json
index ded5739e325..c41213302e9 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16573.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16573.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16573",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:23.520",
- "lastModified": "2019-12-18T19:56:24.630",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.213",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16574.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16574.json
index 93f79d9e52f..3a12fa903f7 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16574.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16574.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16574",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:24.083",
- "lastModified": "2020-10-05T14:51:21.900",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.280",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16575.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16575.json
index 21efa0188e0..ee8e730a419 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16575.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16575.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16575",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:24.457",
- "lastModified": "2019-12-18T20:31:26.960",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.340",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16576.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16576.json
index 84a295fc50a..d1ba1add0bc 100644
--- a/CVE-2019/CVE-2019-165xx/CVE-2019-16576.json
+++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16576.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-16576",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2019-12-17T15:15:24.863",
- "lastModified": "2020-10-05T14:47:48.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.400",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-188xx/CVE-2019-18854.json b/CVE-2019/CVE-2019-188xx/CVE-2019-18854.json
index 1d998c3de97..5b63471e0e2 100644
--- a/CVE-2019/CVE-2019-188xx/CVE-2019-18854.json
+++ b/CVE-2019/CVE-2019-188xx/CVE-2019-18854.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-18854",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-11-11T15:15:12.313",
- "lastModified": "2019-11-12T17:27:06.767",
+ "lastModified": "2023-10-24T18:41:32.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:safe_svg_project:safe_svg:*:*:*:*:*:wordpress:*:*",
+ "criteria": "cpe:2.3:a:10up:safe_svg:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.9.4",
- "matchCriteriaId": "7B7D4D42-BFE5-4763-83CC-963CDB23EDD4"
+ "matchCriteriaId": "F4964893-4BF7-465E-AA2F-6DAE8A347984"
}
]
}
diff --git a/CVE-2019/CVE-2019-188xx/CVE-2019-18855.json b/CVE-2019/CVE-2019-188xx/CVE-2019-18855.json
index d85e6441a0e..2365996c492 100644
--- a/CVE-2019/CVE-2019-188xx/CVE-2019-18855.json
+++ b/CVE-2019/CVE-2019-188xx/CVE-2019-18855.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-18855",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-11-11T15:15:12.390",
- "lastModified": "2020-08-24T17:37:01.140",
+ "lastModified": "2023-10-24T18:41:32.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:safe_svg_project:safe_svg:*:*:*:*:*:wordpress:*:*",
+ "criteria": "cpe:2.3:a:10up:safe_svg:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.9.4",
- "matchCriteriaId": "7B7D4D42-BFE5-4763-83CC-963CDB23EDD4"
+ "matchCriteriaId": "F4964893-4BF7-465E-AA2F-6DAE8A347984"
}
]
}
diff --git a/CVE-2019/CVE-2019-199xx/CVE-2019-19912.json b/CVE-2019/CVE-2019-199xx/CVE-2019-19912.json
index 3e3b7ae94d9..98450230dd7 100644
--- a/CVE-2019/CVE-2019-199xx/CVE-2019-19912.json
+++ b/CVE-2019/CVE-2019-199xx/CVE-2019-19912.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-19912",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-30T22:15:13.853",
- "lastModified": "2020-03-31T14:42:28.083",
+ "lastModified": "2023-10-18T19:04:17.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:intland:codebeamer:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.5",
- "matchCriteriaId": "CBA3FFC2-EB4A-49F0-B8CD-0838509BF983"
+ "matchCriteriaId": "EF349D26-233D-41A4-880C-9956F96735E0"
}
]
}
diff --git a/CVE-2019/CVE-2019-199xx/CVE-2019-19913.json b/CVE-2019/CVE-2019-199xx/CVE-2019-19913.json
index 37fd17fbd6f..1d2f88caa12 100644
--- a/CVE-2019/CVE-2019-199xx/CVE-2019-19913.json
+++ b/CVE-2019/CVE-2019-199xx/CVE-2019-19913.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-19913",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-30T22:15:13.977",
- "lastModified": "2020-04-14T19:15:16.873",
+ "lastModified": "2023-10-18T19:04:17.487",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:intland:codebeamer:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.5",
- "matchCriteriaId": "CBA3FFC2-EB4A-49F0-B8CD-0838509BF983"
+ "matchCriteriaId": "EF349D26-233D-41A4-880C-9956F96735E0"
}
]
}
diff --git a/CVE-2019/CVE-2019-206xx/CVE-2019-20636.json b/CVE-2019/CVE-2019-206xx/CVE-2019-20636.json
index 563dde2c3bc..59dc767fc84 100644
--- a/CVE-2019/CVE-2019-206xx/CVE-2019-20636.json
+++ b/CVE-2019/CVE-2019-206xx/CVE-2019-20636.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-20636",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-04-08T14:15:12.600",
- "lastModified": "2020-06-10T13:15:10.823",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:00:37.447",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -85,8 +85,138 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "3.16.83",
+ "matchCriteriaId": "C14B7F23-A015-486D-8F2C-72102CC22AA8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.17",
+ "versionEndExcluding": "4.4.210",
+ "matchCriteriaId": "CCF305A9-2B36-47C1-9483-5D0D79AAAA11"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.5",
+ "versionEndExcluding": "4.9.210",
+ "matchCriteriaId": "8F7DE47D-5081-4C9C-B39E-48F6B1D0AF43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.10",
+ "versionEndExcluding": "4.14.165",
+ "matchCriteriaId": "5C24DF72-54A9-4E0F-947F-406D5976C65A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.15",
+ "versionEndExcluding": "4.19.96",
+ "matchCriteriaId": "F9CE32D3-58DD-43FC-B9A9-3D218D2084E8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.12",
- "matchCriteriaId": "DE51CB48-9127-43B3-B48C-877FE4A131D5"
+ "matchCriteriaId": "81529934-E2E4-4EDA-8787-54E9CB8B046D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:baseboard_management_controller_h300s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04FD1F9A-8F43-4509-9A49-714C54C4783C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:baseboard_management_controller_h410s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2934495-6D4D-4C21-89E3-A2414ABDD5CE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:baseboard_management_controller_h500s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "504201E4-04CD-4224-9264-C1AEAD480E36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:baseboard_management_controller_h610c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CE6E747-ED1F-4EE1-A4A5-69FB6FD21D81"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:baseboard_management_controller_h610s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B023DB49-71F5-43CF-9558-CF721AEA4B91"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:baseboard_management_controller_h615c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0A89CCC-1189-4190-A88B-A4EF42305A10"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:baseboard_management_controller_h700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDDA0D1D-3A1E-4CF5-BD6A-F05AE4E8CDDA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:fas_8300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E64576DE-90F0-4F5E-9C82-AB745CFEDBB7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:fas_8700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6415E28A-4EAC-4F7F-BD81-1A55CE8B6F40"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:fas_a400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "18C138F0-706F-44A8-880E-133F66DE164A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:fas_baseboard_management_controller_a220:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49D2C8CB-0929-4E5E-AD54-0248B29754D7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:fas_baseboard_management_controller_a320:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7F428DC-28B9-463A-9479-D04FD265A300"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:fas_baseboard_management_controller_a800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE354DF1-66D5-47C8-9D53-BB65995E3505"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:h:netapp:fas_baseboard_management_controller_c190:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A4E1ADC-AE6E-433F-89BE-A65978109C8B"
}
]
}
@@ -120,15 +250,26 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20200430-0004/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25070.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25070.json
index bc21e7187da..9f7ee88bb67 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25070.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25070.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-06-09T17:15:08.483",
- "lastModified": "2023-02-23T17:57:27.757",
+ "lastModified": "2023-10-29T02:38:07.767",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in WolfCMS up to 0.8.3.1. It has been rated as problematic. This issue affects some unknown processing of the file /wolfcms/?/admin/user/add of the component User Add. The manipulation of the argument name leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-135125 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in WolfCMS up to 0.8.3.1. It has been rated as problematic. This issue affects some unknown processing of the file /wolfcms/?/admin/user/add of the component User Add. The manipulation of the argument name leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-135125 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
@@ -110,22 +110,22 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "CWE-80"
+ "value": "CWE-79"
}
]
},
{
- "source": "nvd@nist.gov",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-79"
+ "value": "CWE-80"
}
]
}
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25093.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25093.json
index 09205492e1a..b70bc504bcc 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25093.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25093.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T11:15:10.760",
- "lastModified": "2023-01-09T18:25:03.190",
+ "lastModified": "2023-10-29T02:37:51.517",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in dragonexpert Recent Threads on Index. Affected is the function recentthread_list_threads of the file inc/plugins/recentthreads/hooks.php of the component Setting Handler. The manipulation of the argument recentthread_forumskip leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 051465d807a8fcc6a8b0f4bcbb19299672399f48. It is recommended to apply a patch to fix this issue. VDB-217182 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, was found in dragonexpert Recent Threads on Index. Affected is the function recentthread_list_threads of the file inc/plugins/recentthreads/hooks.php of the component Setting Handler. The manipulation of the argument recentthread_forumskip leads to cross site scripting. It is possible to launch the attack remotely. The patch is identified as 051465d807a8fcc6a8b0f4bcbb19299672399f48. It is recommended to apply a patch to fix this issue. VDB-217182 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -126,8 +126,7 @@
"url": "https://github.com/dragonexpert/recentthreads/commit/051465d807a8fcc6a8b0f4bcbb19299672399f48",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25094.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25094.json
index f98c893e8d2..6143f586609 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25094.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25094.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25094",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T10:15:10.300",
- "lastModified": "2023-01-10T17:31:20.633",
+ "lastModified": "2023-10-29T02:37:44.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The name of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5 on TYPO3. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The identifier of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -116,8 +126,7 @@
"url": "https://github.com/innologi/typo3-appointments/commit/986d3cb34e5e086c6f04e061f600ffc5837abe7f",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25095.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25095.json
index 6d16f5bebfe..3e07c348144 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25095.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25095.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25095",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T08:15:08.273",
- "lastModified": "2023-01-11T17:44:57.200",
+ "lastModified": "2023-10-29T02:37:34.853",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to 0.x. Affected is an unknown function of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The patch is identified as 6f98076281e9452fdb1adcd1bcbb70a6f968ade9. It is recommended to upgrade the affected component. VDB-217434 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -126,8 +126,7 @@
"url": "https://github.com/kakwa/ldapcherry/commit/6f98076281e9452fdb1adcd1bcbb70a6f968ade9",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
@@ -135,8 +134,7 @@
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25096.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25096.json
index dcc2dac6e4c..ced7d8ba4be 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25096.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25096.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T08:15:08.510",
- "lastModified": "2023-01-11T17:51:25.817",
+ "lastModified": "2023-10-27T20:01:22.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in soerennb eXtplorer up to 2.1.12 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.13 is able to address this issue. The name of the patch is b8fcb888f4ff5e171c16797a4b075c6c6f50bf46. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217435."
+ "value": "A vulnerability has been found in soerennb eXtplorer up to 2.1.12 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.13 is able to address this issue. The patch is named b8fcb888f4ff5e171c16797a4b075c6c6f50bf46. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217435."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -116,16 +126,14 @@
"url": "https://github.com/soerennb/extplorer/commit/b8fcb888f4ff5e171c16797a4b075c6c6f50bf46",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/soerennb/extplorer/releases/tag/v2.1.13",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25098.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25098.json
index ebce613537e..8821a58daa9 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25098.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25098.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T08:15:08.673",
- "lastModified": "2023-01-11T18:17:29.510",
+ "lastModified": "2023-10-27T20:03:35.850",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in soerennb eXtplorer up to 2.1.12. It has been classified as critical. This affects an unknown part of the file include/archive.php of the component Archive Handler. The manipulation leads to path traversal. Upgrading to version 2.1.13 is able to address this issue. The name of the patch is b8fcb888f4ff5e171c16797a4b075c6c6f50bf46. It is recommended to upgrade the affected component. The identifier VDB-217437 was assigned to this vulnerability."
+ "value": "A vulnerability was found in soerennb eXtplorer up to 2.1.12. It has been classified as critical. This affects an unknown part of the file include/archive.php of the component Archive Handler. The manipulation leads to path traversal. Upgrading to version 2.1.13 is able to address this issue. The identifier of the patch is b8fcb888f4ff5e171c16797a4b075c6c6f50bf46. It is recommended to upgrade the affected component. The identifier VDB-217437 was assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-22"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
}
],
"configurations": [
@@ -116,16 +126,14 @@
"url": "https://github.com/soerennb/extplorer/commit/b8fcb888f4ff5e171c16797a4b075c6c6f50bf46",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/soerennb/extplorer/releases/tag/v2.1.13",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25099.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25099.json
index 152fd5c2bfa..f01fb8d315c 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25099.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25099.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.927",
- "lastModified": "2023-01-12T15:32:54.390",
+ "lastModified": "2023-10-27T20:30:06.360",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in Arthmoor QSF-Portal. This vulnerability affects unknown code of the file index.php. The manipulation of the argument a leads to path traversal. The name of the patch is ea4f61e23ecb83247d174bc2e2cbab521c751a7d. It is recommended to apply a patch to fix this issue. VDB-217558 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as critical was found in Arthmoor QSF-Portal. This vulnerability affects unknown code of the file index.php. The manipulation of the argument a leads to path traversal. The patch is identified as ea4f61e23ecb83247d174bc2e2cbab521c751a7d. It is recommended to apply a patch to fix this issue. VDB-217558 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-22"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
}
],
"configurations": [
@@ -116,8 +126,7 @@
"url": "https://github.com/Arthmoor/QSF-Portal/commit/ea4f61e23ecb83247d174bc2e2cbab521c751a7d",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25100.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25100.json
index 691c38a71fe..005081f5567 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25100.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25100.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T11:15:10.130",
- "lastModified": "2023-01-12T16:26:03.960",
+ "lastModified": "2023-10-27T20:28:32.857",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in happyman twmap. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file twmap3/data/ajaxCRUD/pointdata2.php. The manipulation of the argument id leads to sql injection. Upgrading to version v2.9_v4.31 is able to address this issue. The name of the patch is babbec79b3fa4efb3bd581ea68af0528d11bba0c. It is recommended to upgrade the affected component. The identifier VDB-217645 was assigned to this vulnerability."
+ "value": "A vulnerability was found in happyman twmap. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file twmap3/data/ajaxCRUD/pointdata2.php. The manipulation of the argument id leads to sql injection. Upgrading to version v2.9_v4.31 is able to address this issue. The identifier of the patch is babbec79b3fa4efb3bd581ea68af0528d11bba0c. It is recommended to upgrade the affected component. The identifier VDB-217645 was assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -116,14 +126,14 @@
"url": "https://github.com/happyman/twmap/commit/babbec79b3fa4efb3bd581ea68af0528d11bba0c",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/happyman/twmap/issues/42",
"source": "cna@vuldb.com",
"tags": [
+ "Issue Tracking",
"Third Party Advisory"
]
},
@@ -131,8 +141,7 @@
"url": "https://github.com/happyman/twmap/releases/tag/v2.9_v4.31",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25101.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25101.json
index 69d1a78924d..f2fb9022e93 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25101.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25101.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T08:15:07.870",
- "lastModified": "2023-02-14T01:53:48.710",
+ "lastModified": "2023-10-27T20:14:06.147",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The name of the patch is f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059."
+ "value": "A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading to version 1.0.11.11 is able to address this issue. The patch is named f68bbaba47f4474e1da553aa51564a73e1d92a84. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220059."
}
],
"metrics": {
@@ -83,8 +83,18 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-436"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25102.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25102.json
index 135a0a1b1e4..f469e8c4a19 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25102.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25102.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T14:15:11.003",
- "lastModified": "2023-02-22T13:45:42.820",
+ "lastModified": "2023-10-27T20:20:00.393",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in simple-markdown 0.6.0. Affected is an unknown function of the file simple-markdown.js. The manipulation with the input <<<<<<<<<<:/:/:/:/:/:/:/:/:/:/ leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.6.1 is able to address this issue. The name of the patch is 015a719bf5cdc561feea05500ecb3274ef609cd2. It is recommended to upgrade the affected component. VDB-220638 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, was found in simple-markdown 0.6.0. Affected is an unknown function of the file simple-markdown.js. The manipulation with the input <<<<<<<<<<:/:/:/:/:/:/:/:/:/:/ leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.6.1 is able to address this issue. The patch is identified as 015a719bf5cdc561feea05500ecb3274ef609cd2. It is recommended to upgrade the affected component. VDB-220638 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-1333"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1333"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25103.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25103.json
index 8d1aaad0d9b..5eace37f32f 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25103.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25103.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25103",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T15:15:10.610",
- "lastModified": "2023-02-24T06:23:30.793",
+ "lastModified": "2023-10-27T20:20:26.023",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in simple-markdown 0.5.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file simple-markdown.js. The manipulation leads to inefficient regular expression complexity. The attack can be launched remotely. Upgrading to version 0.5.2 is able to address this issue. The name of the patch is 89797fef9abb4cab2fb76a335968266a92588816. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220639."
+ "value": "A vulnerability has been found in simple-markdown 0.5.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file simple-markdown.js. The manipulation leads to inefficient regular expression complexity. The attack can be launched remotely. Upgrading to version 0.5.2 is able to address this issue. The patch is named 89797fef9abb4cab2fb76a335968266a92588816. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220639."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-1333"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1333"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25104.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25104.json
index 1af3666abcc..237f7a17b7c 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25104.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25104.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25104",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T18:15:10.387",
- "lastModified": "2023-03-03T15:27:56.210",
+ "lastModified": "2023-10-27T20:20:41.583",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in rtcwcoop 1.0.2 and classified as problematic. Affected by this vulnerability is the function AICast_ScriptLoad of the file code/game/ai_cast_script.c of the component Team Command Handler. The manipulation leads to denial of service. The name of the patch is f2cd18bc2e1cbca8c4b78bee9c392272bd5f42ac. It is recommended to apply a patch to fix this issue. The identifier VDB-221485 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in rtcwcoop 1.0.2 and classified as problematic. Affected by this vulnerability is the function AICast_ScriptLoad of the file code/game/ai_cast_script.c of the component Team Command Handler. The manipulation leads to denial of service. The identifier of the patch is f2cd18bc2e1cbca8c4b78bee9c392272bd5f42ac. It is recommended to apply a patch to fix this issue. The identifier VDB-221485 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25105.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25105.json
index 8abe56dca22..ce4b07b8502 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25105.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25105.json
@@ -2,12 +2,12 @@
"id": "CVE-2019-25105",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T08:15:09.547",
- "lastModified": "2023-03-07T19:08:35.110",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:08.580",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in dro.pm. This affects an unknown part of the file web/fileman.php. The manipulation of the argument secret/key leads to cross site scripting. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The name of the patch is fa73c3a42bc5c246a1b8f815699ea241aef154bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221763."
+ "value": "A vulnerability, which was classified as problematic, was found in dro.pm. This affects an unknown part of the file web/fileman.php. The manipulation of the argument secret/key leads to cross site scripting. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named fa73c3a42bc5c246a1b8f815699ea241aef154bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221763."
}
],
"metrics": {
diff --git a/CVE-2019/CVE-2019-91xx/CVE-2019-9199.json b/CVE-2019/CVE-2019-91xx/CVE-2019-9199.json
index c3e3165c0d7..6f587cb3917 100644
--- a/CVE-2019/CVE-2019-91xx/CVE-2019-9199.json
+++ b/CVE-2019/CVE-2019-91xx/CVE-2019-9199.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-9199",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-02-26T23:29:00.247",
- "lastModified": "2019-04-03T13:42:39.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T21:15:08.017",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -113,6 +113,14 @@
}
],
"references": [
+ {
+ "url": "https://github.com/jjanku/podofo/commit/ada821df68fb0bf673840ed525daf4ec709dbfd9",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/mksdev/podofo/commit/1400a9aaf611299b9a56aa2abeb158918b9743c8",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIC2EXSSMBT3MY2HY42IIY4BUQS2SVYB/",
"source": "cve@mitre.org",
diff --git a/CVE-2019/CVE-2019-95xx/CVE-2019-9514.json b/CVE-2019/CVE-2019-95xx/CVE-2019-9514.json
index aec2c0bfdef..949aba51a93 100644
--- a/CVE-2019/CVE-2019-95xx/CVE-2019-9514.json
+++ b/CVE-2019/CVE-2019-95xx/CVE-2019-9514.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-9514",
"sourceIdentifier": "cret@cert.org",
"published": "2019-08-13T21:15:12.443",
- "lastModified": "2022-08-12T18:41:03.370",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-19T03:15:07.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -145,7 +145,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -177,7 +176,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -193,7 +191,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -219,7 +216,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -240,7 +236,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -288,7 +283,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -309,7 +303,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -330,7 +323,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -431,7 +423,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -447,7 +438,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -479,7 +469,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -500,7 +489,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -553,7 +541,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -672,6 +659,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/18/8",
+ "source": "cret@cert.org"
+ },
{
"url": "https://access.redhat.com/errata/RHSA-2019:2594",
"source": "cret@cert.org",
diff --git a/CVE-2020/CVE-2020-107xx/CVE-2020-10753.json b/CVE-2020/CVE-2020-107xx/CVE-2020-10753.json
index aeb8797e168..42339b2b0fd 100644
--- a/CVE-2020/CVE-2020-107xx/CVE-2020-10753.json
+++ b/CVE-2020/CVE-2020-107xx/CVE-2020-10753.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-10753",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-06-26T15:15:11.573",
- "lastModified": "2021-10-26T20:13:28.297",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:09.757",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -87,22 +87,22 @@
},
"weaknesses": [
{
- "source": "secalert@redhat.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "CWE-113"
+ "value": "CWE-74"
}
]
},
{
- "source": "nvd@nist.gov",
+ "source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-74"
+ "value": "CWE-113"
}
]
}
@@ -226,6 +226,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FFU7LXEL2UZE565FJBTY7UGH2O7ZUBVS/",
"source": "secalert@redhat.com",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11017.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11017.json
index 911380c9a86..514e2f0630b 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11017.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11017.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11017",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T16:15:09.993",
- "lastModified": "2023-10-07T21:15:11.420",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:31:19.213",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -156,7 +171,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11018.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11018.json
index da1ec1df5b3..f0d16d8050e 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11018.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11018.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11018",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T17:15:11.523",
- "lastModified": "2023-10-07T21:15:11.587",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:31:22.383",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -156,7 +171,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11019.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11019.json
index 7ae69ca67dc..8c5be3218a5 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11019.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11019.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11019",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T19:15:10.233",
- "lastModified": "2023-10-07T21:15:11.690",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:31:25.567",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -156,7 +171,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11038.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11038.json
index 7ceb2f22134..a791195b4d2 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11038.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11038.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11038",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T19:15:10.310",
- "lastModified": "2023-10-07T21:15:11.797",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:31:29.087",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -156,7 +171,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11039.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11039.json
index 096aa65837d..bd8333781a4 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11039.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11039.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11039",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T19:15:10.390",
- "lastModified": "2023-10-07T21:15:11.927",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:30:22.390",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -155,7 +170,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11040.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11040.json
index effb1849595..fc70dc665e1 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11040.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11040.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11040",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T20:15:10.500",
- "lastModified": "2023-10-07T21:15:12.057",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:30:28.230",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -155,7 +170,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11041.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11041.json
index 5b90ddf6ffd..4361f8cf993 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11041.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11041.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11041",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T19:15:10.497",
- "lastModified": "2023-10-07T21:15:12.160",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:30:25.283",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -155,7 +170,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11042.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11042.json
index 43d181f2674..2f984bf0158 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11042.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11042.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11042",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-07T19:15:11.673",
- "lastModified": "2023-10-07T21:15:12.263",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:04:40.737",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -133,6 +133,11 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@@ -202,7 +207,10 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11043.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11043.json
index 41c1971a827..53026a8bd53 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11043.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11043.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11043",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T20:15:10.577",
- "lastModified": "2023-10-07T21:15:12.403",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:30:31.093",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -156,7 +171,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11044.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11044.json
index 7e6e4b6de7b..e6dac4f26c3 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11044.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11044.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11044",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-07T19:15:11.720",
- "lastModified": "2023-10-07T21:15:12.507",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:06:05.697",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -151,6 +151,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -179,7 +194,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11045.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11045.json
index c13991dcb38..e9d42723db3 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11045.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11045.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11045",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-07T19:15:11.783",
- "lastModified": "2023-10-07T21:15:12.620",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:06:09.040",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -133,6 +133,11 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@@ -202,7 +207,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11046.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11046.json
index 1eaec718a81..3d87f277c71 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11046.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11046.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11046",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-07T19:15:11.843",
- "lastModified": "2023-10-07T21:15:12.727",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:06:52.900",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,8 +136,8 @@
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -163,6 +163,11 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@@ -202,7 +207,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11047.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11047.json
index 3e3f328000a..2cfcb5bf008 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11047.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11047.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11047",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-07T20:15:12.127",
- "lastModified": "2023-10-07T21:15:12.833",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:03:09.627",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -131,8 +131,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -147,6 +147,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -175,7 +190,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11048.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11048.json
index f7a40c4b739..84467a1895d 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11048.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11048.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11048",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-07T20:15:12.190",
- "lastModified": "2023-10-07T21:15:12.943",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:03:44.663",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,8 +136,8 @@
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -163,6 +163,11 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@@ -202,7 +207,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11049.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11049.json
index adb6912b8d4..053bb9991f2 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11049.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11049.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11049",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-07T20:15:12.237",
- "lastModified": "2023-10-07T21:15:13.057",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:03:47.923",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,8 +136,8 @@
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -152,6 +152,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -188,7 +203,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11058.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11058.json
index 53aa3c01552..caa987a271e 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11058.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11058.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11058",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-12T21:15:11.383",
- "lastModified": "2023-10-07T21:15:13.173",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:03:51.260",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,8 +136,8 @@
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -152,6 +152,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -187,7 +207,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11085.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11085.json
index 09e383fc194..17ab3cb9e00 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11085.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11085.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11085",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T20:15:10.670",
- "lastModified": "2023-10-07T21:15:13.290",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:30:34.303",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -164,7 +179,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11086.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11086.json
index de3e476e86c..2cb90ce458e 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11086.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11086.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11086",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T20:15:10.767",
- "lastModified": "2023-10-07T21:15:13.407",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:24:27.183",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -164,7 +179,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11087.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11087.json
index f4cc6b98350..95701b39b4d 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11087.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11087.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11087",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T20:15:10.843",
- "lastModified": "2023-10-07T21:15:13.517",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:38:58.073",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -164,7 +179,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11088.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11088.json
index 3e6a60c671a..6f98af42d9e 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11088.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11088.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11088",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T20:15:10.937",
- "lastModified": "2023-10-07T21:15:13.617",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:38:54.480",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -162,7 +177,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11089.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11089.json
index 4925e87ed03..b9554eb11b8 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11089.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11089.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11089",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-29T20:15:11.017",
- "lastModified": "2023-10-07T21:15:13.713",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:38:50.217",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -136,6 +136,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -171,7 +186,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11095.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11095.json
index 10966525f2f..f1be91bb0ef 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11095.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11095.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11095",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-06-22T22:15:11.913",
- "lastModified": "2023-10-07T21:15:13.810",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:38:28.160",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -155,8 +155,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -166,6 +166,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -201,7 +216,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11096.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11096.json
index 2a1f9b921bd..fb4d9bbfce3 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11096.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11096.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11096",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-06-22T22:15:12.007",
- "lastModified": "2023-10-07T21:15:13.937",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:38:24.617",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -155,8 +155,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -166,6 +166,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -202,7 +217,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11097.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11097.json
index d178c9f6674..79d4014bec5 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11097.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11097.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11097",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-06-22T22:15:12.103",
- "lastModified": "2023-10-07T21:15:14.067",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:38:20.520",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -155,8 +155,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -166,6 +166,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -201,7 +216,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11098.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11098.json
index fa86874388b..14944dff00c 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11098.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11098.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11098",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-06-22T22:15:12.180",
- "lastModified": "2023-10-07T21:15:14.173",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:27:19.760",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -165,8 +165,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -176,6 +176,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -212,7 +227,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/",
diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11099.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11099.json
index 52e11899b49..77da4523f41 100644
--- a/CVE-2020/CVE-2020-110xx/CVE-2020-11099.json
+++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11099.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-11099",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-06-22T22:15:12.273",
- "lastModified": "2023-10-07T21:15:14.277",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:27:16.317",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -155,8 +155,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -166,6 +166,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -201,7 +216,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/",
diff --git a/CVE-2020/CVE-2020-120xx/CVE-2020-12059.json b/CVE-2020/CVE-2020-120xx/CVE-2020-12059.json
index 2686b69aeb6..c5068490e25 100644
--- a/CVE-2020/CVE-2020-120xx/CVE-2020-12059.json
+++ b/CVE-2020/CVE-2020-120xx/CVE-2020-12059.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-12059",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-04-22T13:15:11.337",
- "lastModified": "2023-01-20T18:33:16.383",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:09.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -131,6 +131,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://tracker.ceph.com/issues/44967",
"source": "cve@mitre.org",
diff --git a/CVE-2020/CVE-2020-133xx/CVE-2020-13396.json b/CVE-2020/CVE-2020-133xx/CVE-2020-13396.json
index b5fb1bac7df..0f3b1c981b1 100644
--- a/CVE-2020/CVE-2020-133xx/CVE-2020-13396.json
+++ b/CVE-2020/CVE-2020-133xx/CVE-2020-13396.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-13396",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-05-22T18:15:11.677",
- "lastModified": "2023-10-07T21:15:14.397",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:23:04.800",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -100,13 +100,13 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -123,6 +123,11 @@
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
},
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
@@ -173,7 +178,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-133xx/CVE-2020-13397.json b/CVE-2020/CVE-2020-133xx/CVE-2020-13397.json
index 5df15ad92ef..03f2b66f969 100644
--- a/CVE-2020/CVE-2020-133xx/CVE-2020-13397.json
+++ b/CVE-2020/CVE-2020-133xx/CVE-2020-13397.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-13397",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-05-22T18:15:11.737",
- "lastModified": "2023-10-07T21:15:14.513",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:31:10.777",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -100,13 +100,13 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -123,6 +123,11 @@
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
},
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
@@ -173,7 +178,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-133xx/CVE-2020-13398.json b/CVE-2020/CVE-2020-133xx/CVE-2020-13398.json
index 6d37ad35675..8d1ed4324c0 100644
--- a/CVE-2020/CVE-2020-133xx/CVE-2020-13398.json
+++ b/CVE-2020/CVE-2020-133xx/CVE-2020-13398.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-13398",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-05-22T18:15:11.833",
- "lastModified": "2023-10-07T21:15:14.607",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T15:31:16.180",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -100,13 +100,13 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -123,6 +123,11 @@
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
},
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
@@ -173,7 +178,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://usn.ubuntu.com/4379-1/",
diff --git a/CVE-2020/CVE-2020-151xx/CVE-2020-15103.json b/CVE-2020/CVE-2020-151xx/CVE-2020-15103.json
index 1fdf67c1c62..5c6241127e5 100644
--- a/CVE-2020/CVE-2020-151xx/CVE-2020-15103.json
+++ b/CVE-2020/CVE-2020-151xx/CVE-2020-15103.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-15103",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-07-27T18:15:13.903",
- "lastModified": "2023-10-07T21:15:14.697",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:26:33.053",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -165,8 +165,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -176,6 +176,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -212,7 +227,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/",
diff --git a/CVE-2020/CVE-2020-174xx/CVE-2020-17477.json b/CVE-2020/CVE-2020-174xx/CVE-2020-17477.json
new file mode 100644
index 00000000000..5d73c918516
--- /dev/null
+++ b/CVE-2020/CVE-2020-174xx/CVE-2020-17477.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2020-17477",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T13:15:09.293",
+ "lastModified": "2023-10-26T15:32:27.440",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Incorrect LDAP ACLs in ucs-school-ldap-acls-master in UCS@school before 4.4v5-errata allow remote teachers, staff, and school administrators to read LDAP password hashes (sambaNTPassword, krb5Key, sambaPasswordHistory, and pwhistory) via LDAP search requests. For example, a teacher can gain administrator access via an NTLM hash."
+ },
+ {
+ "lang": "es",
+ "value": "Las ACL de LDAP incorrectas en ucs-school-ldap-acls-master en UCS@school antes de 4.4v5-errata permiten a los profesores, el personal y los administradores escolares remotos leer hashes de contrase\u00f1as LDAP (sambaNTPassword, krb5Key, sambaPasswordHistory y pwhistory) a trav\u00e9s de solicitudes de b\u00fasqueda LDAP. Por ejemplo, un profesor puede obtener acceso de administrador mediante un hash NTLM."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://forge.univention.org/bugzilla/show_bug.cgi?id=50669",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-17xx/CVE-2020-1700.json b/CVE-2020/CVE-2020-17xx/CVE-2020-1700.json
index c5cf34f6fa0..caa813b6e70 100644
--- a/CVE-2020/CVE-2020-17xx/CVE-2020-1700.json
+++ b/CVE-2020/CVE-2020-17xx/CVE-2020-1700.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-1700",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-02-07T21:15:10.433",
- "lastModified": "2022-01-01T19:57:19.710",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:09.963",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -191,6 +191,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://usn.ubuntu.com/4304-1/",
"source": "secalert@redhat.com",
diff --git a/CVE-2020/CVE-2020-17xx/CVE-2020-1760.json b/CVE-2020/CVE-2020-17xx/CVE-2020-1760.json
index afea7bb12ad..15d0b407345 100644
--- a/CVE-2020/CVE-2020-17xx/CVE-2020-1760.json
+++ b/CVE-2020/CVE-2020-17xx/CVE-2020-1760.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-1760",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-04-23T15:15:14.607",
- "lastModified": "2021-09-16T15:46:07.160",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:10.070",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -87,7 +87,7 @@
},
"weaknesses": [
{
- "source": "secalert@redhat.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -97,7 +97,7 @@
]
},
{
- "source": "nvd@nist.gov",
+ "source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@@ -217,6 +217,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/",
"source": "secalert@redhat.com",
diff --git a/CVE-2020/CVE-2020-191xx/CVE-2020-19185.json b/CVE-2020/CVE-2020-191xx/CVE-2020-19185.json
index e103fdc4e3c..94adfb37dd5 100644
--- a/CVE-2020/CVE-2020-191xx/CVE-2020-19185.json
+++ b/CVE-2020/CVE-2020-191xx/CVE-2020-19185.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-19185",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:57.233",
- "lastModified": "2023-10-06T15:15:12.147",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:07:46.990",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -61,6 +61,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
+ "matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -74,7 +89,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0005/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-191xx/CVE-2020-19186.json b/CVE-2020/CVE-2020-191xx/CVE-2020-19186.json
index 5b055dff39b..3ac0e1ce755 100644
--- a/CVE-2020/CVE-2020-191xx/CVE-2020-19186.json
+++ b/CVE-2020/CVE-2020-191xx/CVE-2020-19186.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-19186",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:58.247",
- "lastModified": "2023-10-06T15:15:12.233",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:09:02.453",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -61,6 +61,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
+ "matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -74,7 +89,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0005/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-191xx/CVE-2020-19187.json b/CVE-2020/CVE-2020-191xx/CVE-2020-19187.json
index e3e7b6ce3d7..11f6bc20d79 100644
--- a/CVE-2020/CVE-2020-191xx/CVE-2020-19187.json
+++ b/CVE-2020/CVE-2020-191xx/CVE-2020-19187.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-19187",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:59.317",
- "lastModified": "2023-10-06T15:15:12.297",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:09:22.640",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -61,6 +61,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
+ "matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -74,7 +89,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0005/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-191xx/CVE-2020-19188.json b/CVE-2020/CVE-2020-191xx/CVE-2020-19188.json
index 928d98aa21b..cb133d144ac 100644
--- a/CVE-2020/CVE-2020-191xx/CVE-2020-19188.json
+++ b/CVE-2020/CVE-2020-191xx/CVE-2020-19188.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-19188",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:00.380",
- "lastModified": "2023-10-06T15:15:12.367",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:11:19.547",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -61,6 +61,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
+ "matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -74,7 +89,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0005/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-191xx/CVE-2020-19189.json b/CVE-2020/CVE-2020-191xx/CVE-2020-19189.json
index 2c6076c0570..bbdca09a7fd 100644
--- a/CVE-2020/CVE-2020-191xx/CVE-2020-19189.json
+++ b/CVE-2020/CVE-2020-191xx/CVE-2020-19189.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-19189",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:01.020",
- "lastModified": "2023-10-06T15:15:12.440",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:21:18.277",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -61,6 +61,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
+ "matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -74,11 +104,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00033.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0005/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-191xx/CVE-2020-19190.json b/CVE-2020/CVE-2020-191xx/CVE-2020-19190.json
index cd747288698..6c186cd0db4 100644
--- a/CVE-2020/CVE-2020-191xx/CVE-2020-19190.json
+++ b/CVE-2020/CVE-2020-191xx/CVE-2020-19190.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-19190",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:01.803",
- "lastModified": "2023-10-06T15:15:12.517",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:11:51.893",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -61,6 +61,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
+ "matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -74,7 +89,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0005/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-197xx/CVE-2020-19752.json b/CVE-2020/CVE-2020-197xx/CVE-2020-19752.json
index 5d0fb11493a..9087fbfcd2e 100644
--- a/CVE-2020/CVE-2020-197xx/CVE-2020-19752.json
+++ b/CVE-2020/CVE-2020-197xx/CVE-2020-19752.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-19752",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-09-07T20:15:07.510",
- "lastModified": "2021-12-02T20:42:33.297",
+ "lastModified": "2023-10-24T16:06:23.780",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:gifsicle_project:gifsicle:1.92:*:*:*:*:*:*:*",
- "matchCriteriaId": "0B2471C6-EA45-4BAA-91FF-E7A4C366390B"
+ "criteria": "cpe:2.3:a:lcdf:gifsicle:1.92:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5C85CFB-9F07-4835-8D51-65C78293DF19"
}
]
}
diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2090.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2090.json
index 3f632becbe7..8070bd079b1 100644
--- a/CVE-2020/CVE-2020-20xx/CVE-2020-2090.json
+++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2090.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2090",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-15T16:15:14.260",
- "lastModified": "2020-01-17T21:37:47.900",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.477",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2091.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2091.json
index 94ab203eda0..a36488eef22 100644
--- a/CVE-2020/CVE-2020-20xx/CVE-2020-2091.json
+++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2091.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2091",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-15T16:15:14.370",
- "lastModified": "2022-11-08T02:51:32.737",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.567",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2092.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2092.json
index fa2002e1502..2f4cb8a338e 100644
--- a/CVE-2020/CVE-2020-20xx/CVE-2020-2092.json
+++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2092.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2092",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-15T16:15:14.447",
- "lastModified": "2020-01-22T18:23:10.837",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.657",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2093.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2093.json
index d1fe739e39d..74b15ed81f6 100644
--- a/CVE-2020/CVE-2020-20xx/CVE-2020-2093.json
+++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2093.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2093",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-15T16:15:14.557",
- "lastModified": "2020-01-22T19:01:57.003",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.727",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2094.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2094.json
index a0eb9e0bcad..938ccd8f500 100644
--- a/CVE-2020/CVE-2020-20xx/CVE-2020-2094.json
+++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2094.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2094",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-15T16:15:14.683",
- "lastModified": "2022-10-17T19:26:25.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.790",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2095.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2095.json
index 0040280cf1a..d2ccb9669a5 100644
--- a/CVE-2020/CVE-2020-20xx/CVE-2020-2095.json
+++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2095.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2095",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-15T16:15:14.760",
- "lastModified": "2022-04-25T17:36:54.787",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.863",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2096.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2096.json
index c56483d2d0c..4b7195baa40 100644
--- a/CVE-2020/CVE-2020-20xx/CVE-2020-2096.json
+++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2096.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2096",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-15T16:15:14.853",
- "lastModified": "2020-01-21T21:53:57.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.930",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2097.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2097.json
index 07c20c50f97..c056d8aa780 100644
--- a/CVE-2020/CVE-2020-20xx/CVE-2020-2097.json
+++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2097.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2097",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-15T16:15:14.947",
- "lastModified": "2020-01-23T18:15:19.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:28.997",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2098.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2098.json
index 5641b01055a..3e8264b942e 100644
--- a/CVE-2020/CVE-2020-20xx/CVE-2020-2098.json
+++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2098.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2098",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-15T16:15:15.073",
- "lastModified": "2020-01-22T20:50:04.203",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:29.053",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2099.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2099.json
index c9234a6b6fd..6f32aa87f6d 100644
--- a/CVE-2020/CVE-2020-20xx/CVE-2020-2099.json
+++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2099.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2099",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-29T16:15:12.037",
- "lastModified": "2020-03-17T04:15:13.960",
+ "lastModified": "2023-10-25T18:16:29.113",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-330"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-323"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2100.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2100.json
index 6f779c82462..bc1ea6dca53 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2100.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2100.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2100",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-29T16:15:12.130",
- "lastModified": "2020-03-17T04:15:18.507",
+ "lastModified": "2023-10-25T18:16:29.210",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-406"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2101.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2101.json
index 8c33daacef8..5a9f43e4d54 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2101.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2101.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2101",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-29T16:15:12.240",
- "lastModified": "2020-03-17T04:15:19.087",
+ "lastModified": "2023-10-25T18:16:29.290",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-203"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-208"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2102.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2102.json
index 9035ea3ebe4..eed2b0d6519 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2102.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2102.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2102",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-29T16:15:12.303",
- "lastModified": "2020-03-17T04:15:19.680",
+ "lastModified": "2023-10-25T18:16:29.380",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-203"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-208"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2103.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2103.json
index bff38820969..57bf69c78df 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2103.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2103.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2103",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-29T16:15:12.380",
- "lastModified": "2020-03-17T04:15:19.867",
+ "lastModified": "2023-10-25T18:16:29.450",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-200"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-200"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2104.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2104.json
index 46038883a5c..47af74c3b8e 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2104.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2104.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2104",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-29T16:15:12.427",
- "lastModified": "2020-03-17T04:15:20.320",
+ "lastModified": "2023-10-25T18:16:29.520",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2105.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2105.json
index 54226f9b267..2e16e366c2f 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2105.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2105.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2105",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-29T16:15:12.507",
- "lastModified": "2020-03-17T04:15:20.540",
+ "lastModified": "2023-10-25T18:16:29.593",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-1021"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-1021"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2106.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2106.json
index 95dda05a253..6895bb16966 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2106.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2106.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2106",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-29T16:15:12.630",
- "lastModified": "2020-01-30T15:59:05.297",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:29.660",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2107.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2107.json
index bee9c714642..0c8d704cfa4 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2107.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2107.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2107",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-29T16:15:12.693",
- "lastModified": "2020-01-30T18:12:41.890",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:29.733",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2108.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2108.json
index ecb3e127505..e27b0144465 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2108.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2108.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2108",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-01-29T16:15:12.787",
- "lastModified": "2020-01-30T17:56:16.827",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:29.803",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2109.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2109.json
index f6c05e3715f..d79d5792fce 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2109.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2109.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2109",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:12.430",
- "lastModified": "2020-07-13T15:51:37.160",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:29.873",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-20"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2110.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2110.json
index b171d6d664b..21f079f5ecb 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2110.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2110.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2110",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:12.507",
- "lastModified": "2020-07-13T15:56:37.827",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:29.957",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-20"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-265"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2111.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2111.json
index ee53d562ce9..158f21a8d36 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2111.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2111.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2111",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:12.617",
- "lastModified": "2020-02-14T16:25:50.070",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.023",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2112.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2112.json
index 852836337e1..d1c0a737fcb 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2112.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2112.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2112",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:12.710",
- "lastModified": "2020-02-14T17:31:12.110",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.097",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2113.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2113.json
index 181a68aa20b..6695724c546 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2113.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2113.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2113",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:12.820",
- "lastModified": "2020-02-14T17:32:53.537",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.167",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2114.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2114.json
index ed2716da68e..2e252f35a43 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2114.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2114.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2114",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:12.883",
- "lastModified": "2020-02-14T17:34:51.480",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.233",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2115.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2115.json
index decbd3cd104..96fd5c424ee 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2115.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2115.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2115",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.023",
- "lastModified": "2020-02-14T17:38:18.470",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.297",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2116.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2116.json
index 2e013bc5017..adee3904250 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2116.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2116.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2116",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.147",
- "lastModified": "2020-02-14T17:30:00.233",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.360",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-812%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-812%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2117.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2117.json
index 6a36001645c..89b3d9f45b8 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2117.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2117.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2117",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.243",
- "lastModified": "2022-07-23T16:38:21.433",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.427",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-812%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-812%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2118.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2118.json
index a54f0f67ab5..8e0cb9367c6 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2118.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2118.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2118",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.367",
- "lastModified": "2022-07-23T16:37:11.667",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.497",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-812%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-02-12/#SECURITY-812%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2119.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2119.json
index 61a32bd5f31..70c8e4e3280 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2119.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2119.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2119",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.430",
- "lastModified": "2020-02-14T18:34:44.320",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.557",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2120.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2120.json
index 6d9cbbae88d..ee4c49d3b18 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2120.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2120.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2120",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.540",
- "lastModified": "2020-02-14T18:36:07.090",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.610",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2121.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2121.json
index da4dc6a0788..0be4c1b00f4 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2121.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2121.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2121",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.633",
- "lastModified": "2020-02-14T18:44:23.287",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.670",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2122.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2122.json
index 0ff437e64d8..091376794d1 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2122.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2122.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2122",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.743",
- "lastModified": "2020-02-14T18:48:33.283",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.733",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2123.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2123.json
index 994f51699cb..62cde977ec3 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2123.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2123.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2123",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.820",
- "lastModified": "2020-02-14T15:15:25.747",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.797",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-502"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2124.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2124.json
index 34aaa9aafa0..e514586ab43 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2124.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2124.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2124",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.883",
- "lastModified": "2020-02-13T21:57:07.217",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.853",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2125.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2125.json
index af3a68fa4fe..e9e21da9d2e 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2125.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2125.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2125",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:13.977",
- "lastModified": "2020-02-13T22:12:32.057",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:30.933",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2126.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2126.json
index 0069aa17dfe..e8c89653a68 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2126.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2126.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2126",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:14.040",
- "lastModified": "2020-02-13T22:09:34.190",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.013",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2127.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2127.json
index 42b05df623d..577a3c367df 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2127.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2127.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2127",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:14.117",
- "lastModified": "2020-02-14T14:38:47.760",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.080",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2128.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2128.json
index 9067c05c9ed..dbbd793ae86 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2128.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2128.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2128",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:14.197",
- "lastModified": "2020-02-14T14:34:08.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.147",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2129.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2129.json
index c83cacbbc1c..44fe517ce80 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2129.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2129.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2129",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:14.290",
- "lastModified": "2020-02-14T16:28:19.233",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.207",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2130.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2130.json
index 59bb5a70aeb..b83a1ad987f 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2130.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2130.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2130",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:14.397",
- "lastModified": "2020-02-14T16:23:21.313",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2131.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2131.json
index d5f318463ae..7e617b317c3 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2131.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2131.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2131",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:14.460",
- "lastModified": "2020-02-14T16:21:53.497",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.320",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2132.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2132.json
index e92eaef42f6..94a23a61b2d 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2132.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2132.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2132",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:14.570",
- "lastModified": "2020-02-14T15:37:34.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.380",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2133.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2133.json
index 6939570b2f2..1f59be1d3f3 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2133.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2133.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2133",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-02-12T15:15:14.633",
- "lastModified": "2020-02-14T15:34:07.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.440",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2134.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2134.json
index 2d7143bfdbf..9ab4a3ae369 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2134.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2134.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2134",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:12.623",
- "lastModified": "2020-03-10T14:29:48.270",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.497",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2135.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2135.json
index 472d4ee33b3..eb8eb6e95f9 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2135.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2135.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2135",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:12.703",
- "lastModified": "2020-03-10T14:29:14.847",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.580",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2136.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2136.json
index a69cb9c5699..5f96f7e7baf 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2136.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2136.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2136",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:12.797",
- "lastModified": "2020-03-09T20:04:46.857",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.637",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2137.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2137.json
index ddf4cff37ce..9ac269c1136 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2137.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2137.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2137",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:12.890",
- "lastModified": "2020-03-09T19:19:46.783",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.697",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2138.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2138.json
index 5c33f51ae7c..e7823894659 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2138.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2138.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2138",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:12.967",
- "lastModified": "2020-03-10T13:22:31.270",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.760",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2139.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2139.json
index 96f40638367..f54135b5c10 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2139.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2139.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2139",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:13.077",
- "lastModified": "2020-03-09T19:33:02.100",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.820",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2140.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2140.json
index 396b70d60c4..3cd14fc7a8c 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2140.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2140.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2140",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:13.157",
- "lastModified": "2020-03-09T19:11:50.730",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.880",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2141.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2141.json
index e3c74cd7fb8..f1afb7b8044 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2141.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2141.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2141",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:13.250",
- "lastModified": "2020-03-09T19:34:11.010",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:31.937",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2142.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2142.json
index 377ce746782..b6f45003a95 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2142.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2142.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2142",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:13.343",
- "lastModified": "2020-03-09T19:45:45.357",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.003",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2143.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2143.json
index a420cfe1387..52f4b7d1c2d 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2143.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2143.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2143",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:13.420",
- "lastModified": "2020-03-09T18:37:37.010",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.063",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2144.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2144.json
index 56b59c022a7..1a7d5adc58f 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2144.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2144.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2144",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:13.547",
- "lastModified": "2020-03-10T17:51:36.573",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.123",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2145.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2145.json
index 4413380cf71..aeff454d9af 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2145.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2145.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2145",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:13.640",
- "lastModified": "2020-03-10T14:56:19.737",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.183",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2146.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2146.json
index 1408395b60b..adf01660141 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2146.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2146.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2146",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:13.717",
- "lastModified": "2020-03-09T19:55:53.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.253",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-347"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-300"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2147.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2147.json
index 4c777c9948e..7d488427d64 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2147.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2147.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2147",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:13.827",
- "lastModified": "2020-03-09T19:56:27.870",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.317",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2148.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2148.json
index 9e539281ab3..bd4fea6f036 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2148.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2148.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2148",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:13.937",
- "lastModified": "2020-03-09T19:58:49.970",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.373",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2149.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2149.json
index 3a9554f085e..8991460fadf 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2149.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2149.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2149",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:14.017",
- "lastModified": "2020-03-09T18:42:10.207",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.433",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2150.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2150.json
index a15d0f14caf..a318803dc52 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2150.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2150.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2150",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:14.233",
- "lastModified": "2020-03-09T18:43:13.557",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.500",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2151.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2151.json
index d37722ca029..58e0fc7e710 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2151.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2151.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2151",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:14.467",
- "lastModified": "2020-03-09T18:45:08.607",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.557",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2152.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2152.json
index fdfd1ca1006..544f9e20b28 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2152.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2152.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2152",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:14.547",
- "lastModified": "2022-10-07T13:47:53.907",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.620",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2153.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2153.json
index ffe17222018..3b6ee04d2ef 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2153.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2153.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2153",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:14.670",
- "lastModified": "2020-03-11T18:41:39.167",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.693",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2154.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2154.json
index 77181af4706..52d6a1a6f8f 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2154.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2154.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2154",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:14.767",
- "lastModified": "2020-03-09T19:13:20.157",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.767",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2155.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2155.json
index 1a27b3ecf71..32e121bbf56 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2155.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2155.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2155",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:14.863",
- "lastModified": "2020-03-09T18:51:05.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.820",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2156.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2156.json
index b16e1384081..c157dd402c6 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2156.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2156.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2156",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:14.967",
- "lastModified": "2020-03-09T18:46:02.453",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2157.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2157.json
index d1d5e8dbeb2..5544089817d 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2157.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2157.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2157",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:15.063",
- "lastModified": "2020-03-09T18:38:48.183",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.940",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2158.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2158.json
index 0229be05bc8..999c984c813 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2158.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2158.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2158",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:15.140",
- "lastModified": "2020-03-09T20:02:42.940",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:32.997",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-502"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2159.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2159.json
index 73ef4246e20..1c19360b072 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2159.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2159.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2159",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-09T16:15:15.343",
- "lastModified": "2022-10-07T13:58:26.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.057",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-78"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-78"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2160.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2160.json
index 88d18cfea7f..46fdd51b413 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2160.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2160.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2160",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:14.907",
- "lastModified": "2020-03-30T19:37:40.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.120",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-435"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2161.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2161.json
index e871b936dc5..d9f5959d0f2 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2161.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2161.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2161",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.000",
- "lastModified": "2020-03-30T19:35:32.407",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.197",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2162.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2162.json
index d2c5bf102e3..9b85b7cf1bc 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2162.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2162.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2162",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.093",
- "lastModified": "2020-03-27T16:37:36.740",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.277",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2163.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2163.json
index 326c7cb6f01..98364a49034 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2163.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2163.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2163",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.203",
- "lastModified": "2020-03-27T16:38:30.573",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.337",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2164.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2164.json
index 9b921512456..9c32e70a35b 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2164.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2164.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2164",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.280",
- "lastModified": "2020-03-27T20:23:52.563",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.427",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-312"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2165.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2165.json
index 64dcf8c4c1a..29bb3ea357f 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2165.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2165.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2165",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.390",
- "lastModified": "2020-03-27T20:01:31.537",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.500",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2166.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2166.json
index 654267e0190..32b0fa26a2f 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2166.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2166.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2166",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.467",
- "lastModified": "2020-03-30T13:49:44.207",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.560",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-20"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2167.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2167.json
index f0fbd244ff7..1e2c18db989 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2167.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2167.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2167",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.560",
- "lastModified": "2020-03-30T13:46:57.363",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.627",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-20"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2168.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2168.json
index bbc49f740f2..a71550670fe 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2168.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2168.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2168",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.657",
- "lastModified": "2020-03-30T13:39:31.047",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.723",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-20"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2169.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2169.json
index 319d96a7b5e..459fc065932 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2169.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2169.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2169",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.763",
- "lastModified": "2020-03-27T20:30:01.383",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.830",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2170.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2170.json
index d60f1fcc7c4..77b4894a8f5 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2170.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2170.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2170",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.843",
- "lastModified": "2020-03-27T20:17:59.603",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.903",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2171.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2171.json
index 471e861d71b..45f55916166 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2171.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2171.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2171",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-03-25T17:15:15.953",
- "lastModified": "2020-03-30T13:33:44.903",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:33.970",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2172.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2172.json
index 2c5ab3695db..cd93224c542 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2172.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2172.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2172",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-04-07T13:15:13.493",
- "lastModified": "2020-04-07T16:15:18.167",
+ "lastModified": "2023-10-25T18:16:34.043",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-776"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2173.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2173.json
index 62579d431cc..b308bf0099e 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2173.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2173.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2173",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-04-07T13:15:13.633",
- "lastModified": "2020-04-07T16:15:18.243",
+ "lastModified": "2023-10-25T18:16:34.127",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2174.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2174.json
index c7c81016a29..3dff2012705 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2174.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2174.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2174",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-04-07T13:15:13.727",
- "lastModified": "2020-04-07T16:15:18.323",
+ "lastModified": "2023-10-25T18:16:34.217",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2175.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2175.json
index e6f4db17027..7eca796f718 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2175.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2175.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2175",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-04-07T13:15:13.777",
- "lastModified": "2020-04-07T16:15:18.387",
+ "lastModified": "2023-10-25T18:16:34.283",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2176.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2176.json
index 3ccdb06d946..e887ea0540a 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2176.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2176.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-2176",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-04-07T13:15:13.853",
- "lastModified": "2020-04-07T16:15:18.480",
+ "lastModified": "2023-10-25T18:16:34.340",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2177.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2177.json
index 17cf0b73792..d5f55f94875 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2177.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2177.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2177",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-04-16T19:15:28.353",
- "lastModified": "2020-04-29T13:38:40.140",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:34.403",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2178.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2178.json
index 18dd503d230..22641d8a31f 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2178.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2178.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2178",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-04-16T19:15:28.417",
- "lastModified": "2020-04-27T18:45:33.113",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:34.487",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2179.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2179.json
index 5996de8cb80..d4157725722 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2179.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2179.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2179",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-04-16T19:15:28.493",
- "lastModified": "2020-04-27T19:36:46.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:34.547",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-502"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2180.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2180.json
index bdb39eca3f2..1e8f84914be 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2180.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2180.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2180",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-04-16T19:15:28.573",
- "lastModified": "2020-04-28T15:58:58.870",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:34.603",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-502"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2181.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2181.json
index 8dfdc56c486..f1605c4a69d 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2181.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2181.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2181",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-05-06T13:15:14.103",
- "lastModified": "2020-05-11T20:44:09.543",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:34.663",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-522"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2182.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2182.json
index a235c74f13a..c26db7ffa58 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2182.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2182.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2182",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-05-06T13:15:14.180",
- "lastModified": "2020-05-11T20:36:59.983",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:34.737",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-522"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2183.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2183.json
index 9d489fd5766..29a9584b264 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2183.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2183.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2183",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-05-06T13:15:14.243",
- "lastModified": "2020-05-11T20:17:48.530",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:34.800",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2184.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2184.json
index a3850f52cdb..dd51e10e8b2 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2184.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2184.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2184",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-05-06T13:15:14.307",
- "lastModified": "2020-05-11T15:03:51.753",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:34.870",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2185.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2185.json
index bd207223650..8f3dc2c5a44 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2185.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2185.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2185",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-05-06T13:15:14.367",
- "lastModified": "2020-05-11T15:03:50.503",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:34.933",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-300"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2186.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2186.json
index de8869ec5e3..1fdc117fbf6 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2186.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2186.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2186",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-05-06T13:15:14.430",
- "lastModified": "2020-05-08T21:03:54.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:34.997",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2187.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2187.json
index 330591d5b21..334da769337 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2187.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2187.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2187",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-05-06T13:15:14.493",
- "lastModified": "2020-05-11T16:40:59.190",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.067",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-300"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2188.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2188.json
index d440217f57e..b0b54a96e3e 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2188.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2188.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2188",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-05-06T13:15:14.557",
- "lastModified": "2020-05-11T20:19:34.297",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.133",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2189.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2189.json
index 7b08a030c0c..12134d646d4 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2189.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2189.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2189",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-05-06T13:15:14.633",
- "lastModified": "2020-05-07T20:46:14.790",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.203",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-502"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2190.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2190.json
index bd73fa20cd1..7484b4ae25f 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2190.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2190.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2190",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:10.540",
- "lastModified": "2020-06-03T17:51:39.810",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.283",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2191.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2191.json
index 6efcb47031a..dd1b2ccfa4a 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2191.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2191.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2191",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:10.617",
- "lastModified": "2020-06-03T19:37:20.457",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.370",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2192.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2192.json
index 7c0130162cb..8ff36f0ae67 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2192.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2192.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2192",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:10.697",
- "lastModified": "2020-06-03T19:26:09.950",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.443",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2193.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2193.json
index 7a873671e83..74c6f16288a 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2193.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2193.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2193",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:10.773",
- "lastModified": "2020-06-03T19:09:46.190",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.503",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2194.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2194.json
index 80f628bc241..5defab7846b 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2194.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2194.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2194",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:10.853",
- "lastModified": "2020-06-03T19:18:58.153",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.563",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2195.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2195.json
index 40800edd138..28ecae8c109 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2195.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2195.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2195",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:10.913",
- "lastModified": "2020-06-03T19:13:02.807",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.627",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2196.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2196.json
index 5b86c9b8f70..780d760428d 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2196.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2196.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2196",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:11.007",
- "lastModified": "2022-06-01T20:42:42.597",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.687",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2197.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2197.json
index 9f005cb2afa..462d1b1e6e6 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2197.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2197.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2197",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:11.087",
- "lastModified": "2020-06-03T19:37:25.610",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.757",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-276"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2198.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2198.json
index 986acef4cd7..404b36e1e25 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2198.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2198.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2198",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:11.163",
- "lastModified": "2020-06-03T19:47:15.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.817",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-522"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2199.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2199.json
index 2a0b30f5ca3..4e982d24e7a 100644
--- a/CVE-2020/CVE-2020-21xx/CVE-2020-2199.json
+++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2199.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2199",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:11.227",
- "lastModified": "2020-06-03T19:50:55.773",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2200.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2200.json
index d28f6cf7c85..6c80ad4877d 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2200.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2200.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2200",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-06-03T13:15:11.307",
- "lastModified": "2020-06-04T17:14:42.827",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:35.940",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-78"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-78"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2201.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2201.json
index 7198c8f54fa..0a8a794573f 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2201.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2201.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2201",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:17.163",
- "lastModified": "2020-07-09T13:53:58.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.003",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2202.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2202.json
index e0cb9faa8cf..8847b196ea5 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2202.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2202.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2202",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:17.240",
- "lastModified": "2020-07-15T15:10:09.130",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2203.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2203.json
index a0aa02b3e75..d7ea37d08cc 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2203.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2203.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2203",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:17.317",
- "lastModified": "2020-07-16T18:00:52.767",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.137",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2204.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2204.json
index 4aa87f7aad2..687ad7ac66a 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2204.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2204.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2204",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:17.413",
- "lastModified": "2020-07-15T15:13:19.793",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.200",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2205.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2205.json
index 2b0c18a62cd..ff43c7f1bcf 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2205.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2205.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2205",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:17.507",
- "lastModified": "2020-07-06T21:17:08.293",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
@@ -112,11 +102,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1728%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1728%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2206.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2206.json
index e5dd653cc0c..1c754ad8f69 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2206.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2206.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2206",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:17.600",
- "lastModified": "2020-07-09T13:17:01.970",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.323",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
@@ -112,11 +102,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1728%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1728%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2207.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2207.json
index 88d5190209e..89a5375ecd4 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2207.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2207.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2207",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:17.677",
- "lastModified": "2020-07-06T20:53:07.853",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.383",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2208.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2208.json
index 342b5df2c21..50372151d44 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2208.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2208.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2208",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:17.770",
- "lastModified": "2020-07-15T15:27:29.203",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.437",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2209.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2209.json
index 309517bac0c..71fe6c0c593 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2209.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2209.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2209",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:17.867",
- "lastModified": "2020-07-09T13:15:58.060",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.500",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2210.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2210.json
index 519f641f83e..406b84fa796 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2210.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2210.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2210",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:17.960",
- "lastModified": "2020-07-08T20:21:00.083",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.557",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2211.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2211.json
index 3d1957734a7..05e2aff6dba 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2211.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2211.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2211",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:18.037",
- "lastModified": "2020-07-06T19:58:56.597",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.613",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-502"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2212.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2212.json
index f2e527062d0..60e7f558ba7 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2212.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2212.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2212",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:18.117",
- "lastModified": "2020-07-08T20:09:46.243",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.673",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2213.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2213.json
index d6653c79153..febd427ba78 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2213.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2213.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2213",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:18.210",
- "lastModified": "2020-07-08T20:08:36.927",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.737",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2214.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2214.json
index 646a770d34c..227d74d92df 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2214.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2214.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2214",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:18.303",
- "lastModified": "2020-07-08T19:57:24.377",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.797",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2215.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2215.json
index caf81bcc6ab..82448c51824 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2215.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2215.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2215",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:18.380",
- "lastModified": "2020-07-07T20:24:22.687",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.853",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2216.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2216.json
index 9e9dd328109..5a45737517c 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2216.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2216.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2216",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:18.507",
- "lastModified": "2020-07-15T15:24:37.993",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.907",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2217.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2217.json
index 9da48f3a4f7..0630a9ae50b 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2217.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2217.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2217",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:18.600",
- "lastModified": "2020-07-07T18:58:09.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:36.967",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2218.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2218.json
index ebdc171ea81..9789733ac38 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2218.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2218.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2218",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:18.677",
- "lastModified": "2020-07-08T20:20:39.363",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.023",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2219.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2219.json
index 4b329f5d099..aa0626a47d5 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2219.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2219.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2219",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-02T15:15:18.757",
- "lastModified": "2020-07-06T19:09:03.590",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.080",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2220.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2220.json
index 5924d396788..075abc6d7b8 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2220.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2220.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2220",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-15T18:15:36.927",
- "lastModified": "2020-07-21T16:41:32.997",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.140",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2221.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2221.json
index 776f171b812..2b34b4010da 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2221.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2221.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2221",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-15T18:15:37.003",
- "lastModified": "2020-07-21T16:45:08.603",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.213",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2222.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2222.json
index 624fea7cdb9..1a6052282f6 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2222.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2222.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2222",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-15T18:15:37.083",
- "lastModified": "2020-07-21T16:36:07.247",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.280",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2223.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2223.json
index df67cb43923..d495f130dfb 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2223.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2223.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2223",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-15T18:15:37.160",
- "lastModified": "2020-07-21T16:29:36.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.340",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2224.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2224.json
index c178cf5002f..6cbef230081 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2224.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2224.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2224",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-15T18:15:37.253",
- "lastModified": "2020-07-21T16:29:30.273",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.397",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2225.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2225.json
index 3b649853fd4..3d0abc41d7f 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2225.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2225.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2225",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-15T18:15:37.333",
- "lastModified": "2020-07-21T16:27:45.317",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.470",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2226.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2226.json
index 3d5fd10c1e8..6f3466b0e5d 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2226.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2226.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2226",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-15T18:15:37.427",
- "lastModified": "2020-07-22T16:37:31.530",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.533",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2227.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2227.json
index d1480f11312..03b2c943fbe 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2227.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2227.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2227",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-15T18:15:37.520",
- "lastModified": "2020-07-22T16:44:56.270",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.607",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2228.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2228.json
index 0bc6562989c..537f3db3bd2 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2228.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2228.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2228",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-07-15T18:15:37.597",
- "lastModified": "2021-10-19T12:52:59.403",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.667",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-269"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2229.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2229.json
index 9772990bce3..460cddee653 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2229.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2229.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2229",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-08-12T14:15:13.110",
- "lastModified": "2022-10-05T19:14:15.647",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.737",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2230.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2230.json
index 797afddde06..a0d849ef74d 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2230.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2230.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2230",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-08-12T14:15:13.190",
- "lastModified": "2022-10-05T19:14:08.220",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.813",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2231.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2231.json
index e8a1268cb59..2b2b738acc8 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2231.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2231.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2231",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-08-12T14:15:13.267",
- "lastModified": "2022-10-28T23:29:50.817",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2232.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2232.json
index b601393d996..f9d25029a83 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2232.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2232.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2232",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-08-12T14:15:13.330",
- "lastModified": "2020-08-13T19:48:49.800",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:37.943",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2233.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2233.json
index e78df6c1eff..3cf43789bcc 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2233.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2233.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2233",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-08-12T14:15:13.423",
- "lastModified": "2020-08-13T15:34:12.060",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.023",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2234.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2234.json
index cf21731bb7a..6faa59de76e 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2234.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2234.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2234",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-08-12T14:15:13.533",
- "lastModified": "2020-08-13T19:49:34.693",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.097",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-285"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2235.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2235.json
index e052875fc0c..9aa70cef06c 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2235.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2235.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2235",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-08-12T14:15:13.597",
- "lastModified": "2020-08-13T20:03:37.110",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.163",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1794%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2236.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2236.json
index 126be388ff5..36e58c280ed 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2236.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2236.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2236",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-08-12T14:15:13.657",
- "lastModified": "2020-08-13T20:04:27.110",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.227",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2237.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2237.json
index 0833f1348a7..677207d2991 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2237.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2237.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2237",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-08-12T14:15:13.737",
- "lastModified": "2020-08-13T20:16:30.197",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.293",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2238.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2238.json
index c6c3b790731..4db2d781a3c 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2238.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2238.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2238",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:12.550",
- "lastModified": "2020-09-04T17:43:50.287",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.357",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2239.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2239.json
index aa3d1b95d06..08788e3c060 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2239.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2239.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2239",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:12.627",
- "lastModified": "2020-09-03T13:34:13.127",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.433",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2240.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2240.json
index cbe6f594082..aeed5837420 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2240.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2240.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2240",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:12.707",
- "lastModified": "2020-09-04T16:21:43.630",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.490",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2241.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2241.json
index 03285455d85..436b7e5acc6 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2241.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2241.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2241",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:12.783",
- "lastModified": "2020-09-04T16:21:38.287",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.553",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2242.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2242.json
index 3e03344a676..4b812ef0fdb 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2242.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2242.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2242",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:12.863",
- "lastModified": "2020-09-03T13:28:53.503",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.610",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2243.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2243.json
index fd5024e7c01..b74b05dd077 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2243.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2243.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2243",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:12.927",
- "lastModified": "2020-09-04T15:53:04.197",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.670",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2244.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2244.json
index f8e081173df..74dc77efaad 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2244.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2244.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2244",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:12.987",
- "lastModified": "2020-09-04T15:00:33.197",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.730",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2245.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2245.json
index e2702cc630d..5e905dd1298 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2245.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2245.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2245",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:13.050",
- "lastModified": "2020-09-04T15:27:21.983",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.790",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2246.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2246.json
index f2c121d4ed3..a26b81cbb45 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2246.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2246.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2246",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:13.113",
- "lastModified": "2020-09-04T14:25:01.513",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.850",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2247.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2247.json
index 8ef710b775a..bb28b5a2797 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2247.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2247.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2247",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:13.160",
- "lastModified": "2020-09-04T14:17:51.667",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.907",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2248.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2248.json
index e236706d485..94482bd2125 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2248.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2248.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2248",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:13.223",
- "lastModified": "2020-09-04T14:03:46.943",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:38.970",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2249.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2249.json
index 90862f40a1a..767471fae74 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2249.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2249.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2249",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:13.283",
- "lastModified": "2020-09-04T14:13:05.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.040",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2250.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2250.json
index f867d094908..fe3d3749c4b 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2250.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2250.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2250",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:13.363",
- "lastModified": "2020-09-04T14:09:04.757",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.120",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2251.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2251.json
index 41aa5aeea98..906c67f2032 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2251.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2251.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2251",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:13.487",
- "lastModified": "2020-09-04T14:04:25.087",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.180",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
@@ -119,11 +109,8 @@
]
},
{
- "url": "https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1631%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2252.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2252.json
index d328b420d6a..31ce0e169ed 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2252.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2252.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2252",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.000",
- "lastModified": "2020-09-18T13:57:12.777",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.237",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-297"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2253.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2253.json
index 6488a84c697..ded8aa426ca 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2253.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2253.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2253",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.097",
- "lastModified": "2020-09-18T13:46:39.563",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.320",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-297"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2254.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2254.json
index 57ffa543094..0a65e74cf4b 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2254.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2254.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2254",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.173",
- "lastModified": "2020-09-18T13:39:57.217",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.377",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2255.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2255.json
index a393bf31dc1..1bb62a299b3 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2255.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2255.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2255",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.237",
- "lastModified": "2020-09-18T13:29:52.050",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.430",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2256.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2256.json
index 71773837fb5..d1b0c3c3f4a 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2256.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2256.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2256",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.313",
- "lastModified": "2020-09-16T20:19:49.587",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.487",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2257.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2257.json
index c25d5a414d5..54f3eea6685 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2257.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2257.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2257",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.377",
- "lastModified": "2020-09-16T20:20:22.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.550",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2258.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2258.json
index b0e999987ae..ab9bc73ec55 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2258.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2258.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2258",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.437",
- "lastModified": "2020-09-18T13:20:41.417",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.607",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2259.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2259.json
index 3eccaca72ae..66864571262 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2259.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2259.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2259",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.517",
- "lastModified": "2020-09-16T20:18:21.347",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.667",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2260.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2260.json
index 840e1b57ebf..9884b43ef05 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2260.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2260.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2260",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.580",
- "lastModified": "2020-09-18T13:19:20.853",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.723",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2261.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2261.json
index 98b5b7c1301..3776d33f84b 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2261.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2261.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2261",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.640",
- "lastModified": "2020-09-18T13:15:36.740",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.783",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-78"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-78"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2262.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2262.json
index 491a76a5445..cabe2f69914 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2262.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2262.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2262",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.703",
- "lastModified": "2020-09-16T20:20:57.947",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.843",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2263.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2263.json
index 8dc81f76467..3c60af6bbad 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2263.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2263.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2263",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.783",
- "lastModified": "2020-09-16T20:20:44.760",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.900",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2264.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2264.json
index 7020aaf0532..969a8b02153 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2264.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2264.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2264",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.847",
- "lastModified": "2020-09-16T20:20:35.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:39.960",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2265.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2265.json
index 9d50141f9e3..660f56bb142 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2265.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2265.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2265",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.923",
- "lastModified": "2020-09-18T13:13:54.940",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.017",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2266.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2266.json
index 1166572931b..00fdb4c52b2 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2266.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2266.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2266",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:13.987",
- "lastModified": "2020-09-16T20:19:39.787",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2267.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2267.json
index 7ccdef0a0e9..cffb3fac887 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2267.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2267.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2267",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.063",
- "lastModified": "2020-09-18T12:59:53.193",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.133",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2268.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2268.json
index a76d6669052..3bee0035718 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2268.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2268.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2268",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.157",
- "lastModified": "2020-09-21T15:09:28.157",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.193",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2269.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2269.json
index 72cdf233d7c..9cccaf39651 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2269.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2269.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2269",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.250",
- "lastModified": "2020-09-16T20:18:32.970",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.257",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2270.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2270.json
index 3954b2dcdd1..99524e0602b 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2270.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2270.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2270",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.330",
- "lastModified": "2020-09-16T20:10:20.540",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.313",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2271.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2271.json
index 3bc9933366a..122d3748e6b 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2271.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2271.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2271",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.437",
- "lastModified": "2020-09-18T15:15:27.017",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.367",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2272.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2272.json
index 4af3b50c3df..bcdc3b63f9d 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2272.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2272.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2272",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.517",
- "lastModified": "2020-09-18T12:58:54.477",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.430",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2273.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2273.json
index ccd49de870a..33040051b8f 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2273.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2273.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2273",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.597",
- "lastModified": "2020-09-18T12:57:44.350",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.487",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2274.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2274.json
index 95550b8ae0b..4ab8d294423 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2274.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2274.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2274",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.657",
- "lastModified": "2020-09-18T12:56:53.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.543",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-312"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-312"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2275.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2275.json
index c4c51ca1ed8..6da6e8f9825 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2275.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2275.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2275",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.750",
- "lastModified": "2020-09-18T15:04:16.477",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.603",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2276.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2276.json
index f1668f3ec6d..ade11f22544 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2276.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2276.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2276",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.813",
- "lastModified": "2020-09-18T14:51:50.200",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.657",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-78"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-78"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2277.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2277.json
index 491f357f649..e100566e12c 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2277.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2277.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2277",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.893",
- "lastModified": "2020-09-18T12:51:35.063",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.713",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
@@ -112,11 +102,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1968%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1968%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2278.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2278.json
index c6091706aff..1daa9179956 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2278.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2278.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2278",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-16T14:15:14.953",
- "lastModified": "2020-09-18T12:50:14.060",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.773",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
@@ -112,11 +102,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1968%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1968%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2279.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2279.json
index 586fb6b53bf..7f2f3be52d6 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2279.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2279.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2279",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-23T14:15:13.007",
- "lastModified": "2020-09-28T20:32:12.843",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.827",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2280.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2280.json
index 7278764425a..5da322daade 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2280.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2280.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2280",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-23T14:15:13.103",
- "lastModified": "2020-09-28T20:30:40.933",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.907",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2281.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2281.json
index 429bc52ff77..a6e64bed643 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2281.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2281.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2281",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-23T14:15:13.210",
- "lastModified": "2020-09-28T20:13:25.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:40.967",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2282.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2282.json
index 2b09f208e8d..8b2e8dde1eb 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2282.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2282.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2282",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-23T14:15:13.273",
- "lastModified": "2020-09-28T20:11:43.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.030",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2283.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2283.json
index 7612f811c88..1d6bc63c51a 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2283.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2283.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2283",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-23T14:15:13.353",
- "lastModified": "2020-09-28T20:03:30.617",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.110",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2284.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2284.json
index df0081204b1..1c78ba10b96 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2284.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2284.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2284",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-23T14:15:13.413",
- "lastModified": "2020-09-28T19:59:43.520",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.190",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2285.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2285.json
index 1dab92059e2..a456a3e46ea 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2285.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2285.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2285",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-23T14:15:13.493",
- "lastModified": "2020-09-30T17:57:39.320",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.280",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2286.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2286.json
index 73680c9a642..4f31826d3cc 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2286.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2286.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2286",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:11.313",
- "lastModified": "2020-10-23T18:27:12.020",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.343",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2287.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2287.json
index cfca084c83c..db26d49d338 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2287.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2287.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2287",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:11.407",
- "lastModified": "2020-10-16T16:25:34.297",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.430",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-435"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2288.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2288.json
index affdeb126cf..5bca1fe0b9e 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2288.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2288.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2288",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:11.487",
- "lastModified": "2020-10-09T19:41:10.027",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.490",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-185"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2289.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2289.json
index abde367fd20..b9ed7aab9d2 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2289.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2289.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2289",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:11.547",
- "lastModified": "2020-10-09T19:46:41.747",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.560",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2290.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2290.json
index e4a1c48a8ea..0b1fecebdc0 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2290.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2290.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2290",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:11.610",
- "lastModified": "2020-10-09T19:48:26.143",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.620",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2291.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2291.json
index 6e39447c1d0..ffd72485567 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2291.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2291.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2291",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:11.673",
- "lastModified": "2022-04-25T17:42:18.653",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.680",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2292.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2292.json
index 898673feef1..bdb37b4cb9e 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2292.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2292.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2292",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:11.750",
- "lastModified": "2020-10-15T19:38:40.090",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.747",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2293.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2293.json
index fac3291e743..05b1acd7fe4 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2293.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2293.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2293",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:11.827",
- "lastModified": "2020-10-09T19:52:50.140",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.803",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2294.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2294.json
index f25dbd6a019..89398017bf2 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2294.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2294.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2294",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:11.907",
- "lastModified": "2020-10-09T19:53:35.640",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.867",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2295.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2295.json
index dce27c17a52..8ccd9fe8602 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2295.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2295.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2295",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:11.987",
- "lastModified": "2020-10-09T19:55:41.287",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.937",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2296.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2296.json
index 6d285c5c76e..fbbab6592d0 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2296.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2296.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2296",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:12.077",
- "lastModified": "2020-10-09T19:26:39.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:41.993",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2297.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2297.json
index 1003b6c035a..f1c6497cdc6 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2297.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2297.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2297",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:12.140",
- "lastModified": "2022-04-25T17:42:29.347",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.057",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2298.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2298.json
index bf2a68f0ded..29727ae6a81 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2298.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2298.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2298",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-10-08T13:15:12.220",
- "lastModified": "2020-10-16T19:56:55.457",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.117",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2299.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2299.json
index 0127abd3dd7..731d450fb42 100644
--- a/CVE-2020/CVE-2020-22xx/CVE-2020-2299.json
+++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2299.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2299",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:10.897",
- "lastModified": "2020-11-10T13:54:24.997",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.180",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-287"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2300.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2300.json
index 7fad9786e4a..532af19ed45 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2300.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2300.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2300",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.067",
- "lastModified": "2020-11-09T20:39:00.240",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.260",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-287"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2301.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2301.json
index a59bcabf7a4..d05140c4aad 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2301.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2301.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2301",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.193",
- "lastModified": "2020-11-09T20:49:30.570",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.320",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-287"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2302.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2302.json
index 5cb58975db1..2e9426ef4ba 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2302.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2302.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2302",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.257",
- "lastModified": "2020-11-06T18:13:05.323",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.380",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2303.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2303.json
index 1935ffee0e6..5a78d5c09f5 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2303.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2303.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2303",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.333",
- "lastModified": "2020-11-06T18:35:39.063",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.443",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2304.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2304.json
index 4130360d314..2b9ef4d4cdd 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2304.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2304.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2304",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.397",
- "lastModified": "2020-11-10T14:39:32.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.507",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2305.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2305.json
index 90c782c9511..47f04981b6a 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2305.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2305.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2305",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.490",
- "lastModified": "2020-11-10T14:24:25.377",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.567",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2306.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2306.json
index 143098ac630..8037bf49870 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2306.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2306.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2306",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.583",
- "lastModified": "2020-11-06T19:10:26.040",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.627",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2307.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2307.json
index b3fb526cf90..4e352f4c281 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2307.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2307.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2307",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.663",
- "lastModified": "2020-11-09T19:21:33.670",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-200"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2308.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2308.json
index e7c4ec1a2af..18c651ed0ad 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2308.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2308.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2308",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.727",
- "lastModified": "2020-11-06T18:43:08.767",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.757",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2309.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2309.json
index 72ca42df350..e0f599b5e53 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2309.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2309.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2309",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.803",
- "lastModified": "2020-11-06T19:03:26.093",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.857",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2310.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2310.json
index 8adeae12222..cd9c52dcf86 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2310.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2310.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2310",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.880",
- "lastModified": "2020-11-10T15:51:40.040",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:42.963",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2311.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2311.json
index d9c306e0171..502ba4f3eb9 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2311.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2311.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2311",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:11.990",
- "lastModified": "2020-11-06T18:17:36.160",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:43.087",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2312.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2312.json
index c500b49b081..4c160d41c1d 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2312.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2312.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2312",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:12.070",
- "lastModified": "2020-11-10T16:01:40.287",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:43.150",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-522"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2313.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2313.json
index 2a3c0c70fe2..aedcb1b6e81 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2313.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2313.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2313",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:12.147",
- "lastModified": "2020-11-06T18:19:33.727",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:43.213",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2314.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2314.json
index 67b987dc147..e8c4449e371 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2314.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2314.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2314",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:12.273",
- "lastModified": "2022-04-25T17:42:46.970",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:43.273",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2315.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2315.json
index 9efd491555f..629c5beebc9 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2315.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2315.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2315",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:12.350",
- "lastModified": "2020-11-10T15:52:37.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:43.347",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2316.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2316.json
index 091a81ad7a3..c05fd971b20 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2316.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2316.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2316",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:12.413",
- "lastModified": "2020-11-10T14:28:42.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:43.417",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2317.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2317.json
index 1e2e1f1ada0..f7e022c7b6f 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2317.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2317.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2317",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:12.490",
- "lastModified": "2020-11-10T14:11:47.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:43.483",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2318.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2318.json
index 1535eb68dc5..0d9a23a38de 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2318.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2318.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2318",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:12.553",
- "lastModified": "2022-04-25T17:43:06.480",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:43.570",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2319.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2319.json
index 79a9fd6c0a1..f3a8aab71d7 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2319.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2319.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2319",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-11-04T15:15:12.647",
- "lastModified": "2022-04-25T17:43:00.707",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:43.737",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2320.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2320.json
index 1b1ba5c4cd1..aa5dd5c92a3 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2320.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2320.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2320",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-12-03T16:15:12.573",
- "lastModified": "2020-12-08T15:58:21.307",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:43.890",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-494"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-494"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2321.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2321.json
index 12cc455850d..1592f8cb88d 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2321.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2321.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2321",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-12-03T16:15:12.763",
- "lastModified": "2020-12-04T14:33:26.747",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:44.100",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2322.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2322.json
index 1d13d599705..e40d59c96a5 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2322.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2322.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2322",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-12-03T16:15:12.857",
- "lastModified": "2022-10-20T16:17:38.887",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:44.273",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Third Party Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2323.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2323.json
index 8dd9da69b79..fc51f2c548a 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2323.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2323.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2323",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-12-03T16:15:12.917",
- "lastModified": "2020-12-07T18:30:08.260",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:44.370",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
@@ -112,11 +102,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Third Party Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2324.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2324.json
index 1322beef9f2..fc3f6068fdc 100644
--- a/CVE-2020/CVE-2020-23xx/CVE-2020-2324.json
+++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2324.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-2324",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-12-03T16:15:12.980",
- "lastModified": "2020-12-07T19:54:01.620",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:44.467",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-252xx/CVE-2020-25223.json b/CVE-2020/CVE-2020-252xx/CVE-2020-25223.json
index 1f507e1ce59..08666ce00b0 100644
--- a/CVE-2020/CVE-2020-252xx/CVE-2020-25223.json
+++ b/CVE-2020/CVE-2020-252xx/CVE-2020-25223.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-25223",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-09-25T04:23:04.857",
- "lastModified": "2022-10-05T18:28:25.627",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-17T17:15:09.623",
+ "vulnStatus": "Modified",
"cisaExploitAdd": "2022-03-25",
"cisaActionDue": "2022-04-15",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@@ -156,6 +156,10 @@
"tags": [
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.secpod.com/blog/remote-code-execution-in-sophos-utm/",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-256xx/CVE-2020-25648.json b/CVE-2020/CVE-2020-256xx/CVE-2020-25648.json
index f23c9b3e4a1..2a0b115e720 100644
--- a/CVE-2020/CVE-2020-256xx/CVE-2020-25648.json
+++ b/CVE-2020/CVE-2020-256xx/CVE-2020-25648.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-25648",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-10-20T22:15:43.217",
- "lastModified": "2022-05-10T15:45:28.503",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-28T17:15:39.133",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -65,7 +65,7 @@
},
"weaknesses": [
{
- "source": "secalert@redhat.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -75,7 +75,7 @@
]
},
{
- "source": "nvd@nist.gov",
+ "source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@@ -199,6 +199,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00039.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/",
"source": "secalert@redhat.com",
diff --git a/CVE-2020/CVE-2020-256xx/CVE-2020-25678.json b/CVE-2020/CVE-2020-256xx/CVE-2020-25678.json
index 8b24de41f93..79baee18edf 100644
--- a/CVE-2020/CVE-2020-256xx/CVE-2020-25678.json
+++ b/CVE-2020/CVE-2020-256xx/CVE-2020-25678.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-25678",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-01-08T18:15:13.293",
- "lastModified": "2023-02-12T23:40:39.997",
+ "lastModified": "2023-10-23T19:15:10.177",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -122,6 +122,10 @@
"Patch"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQTBKVXVYP7GPQNZ5VASOIJHMLK7727M/",
"source": "secalert@redhat.com"
diff --git a/CVE-2020/CVE-2020-265xx/CVE-2020-26513.json b/CVE-2020/CVE-2020-265xx/CVE-2020-26513.json
index eaa63e06d79..2e70677ad6e 100644
--- a/CVE-2020/CVE-2020-265xx/CVE-2020-26513.json
+++ b/CVE-2020/CVE-2020-265xx/CVE-2020-26513.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-26513",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-07T16:15:12.153",
- "lastModified": "2020-12-08T18:03:21.793",
+ "lastModified": "2023-10-18T19:04:17.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,35 +84,35 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:intland:codebeamer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.1.0",
- "matchCriteriaId": "FC456609-B95D-48B6-86A8-AAA9F6989A44"
+ "matchCriteriaId": "3F3BE8BD-0868-4A50-BF06-BAE474BF5328"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:-:*:*:*:*:*:*",
- "matchCriteriaId": "29EA9491-EC5A-4E04-A797-719FC87EB86C"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "A0128D1A-DA5B-49EE-ABC2-DA75EF2B5594"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "C779D2FF-F4E0-4DC4-A2CC-A3456AB16681"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp1:*:*:*:*:*:*",
+ "matchCriteriaId": "35461BDC-7A06-49AE-A528-DB6A986C9F14"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp2:*:*:*:*:*:*",
- "matchCriteriaId": "11D9F5E1-CC89-4E32-9FE5-F5E0CA6839C2"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp2:*:*:*:*:*:*",
+ "matchCriteriaId": "B32DF425-549F-4BEC-A7B6-F66CE063C878"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp3:*:*:*:*:*:*",
- "matchCriteriaId": "B6E5E3CB-B9E4-445A-8654-A506A52C4815"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp3:*:*:*:*:*:*",
+ "matchCriteriaId": "8166F01E-B271-4491-B932-00BF843D2146"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp4:*:*:*:*:*:*",
- "matchCriteriaId": "4B11CD25-3A00-4B2E-8B00-D6D11AB06737"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp4:*:*:*:*:*:*",
+ "matchCriteriaId": "504110BC-FC0C-4A3F-824C-5BF4C573A792"
}
]
}
diff --git a/CVE-2020/CVE-2020-265xx/CVE-2020-26515.json b/CVE-2020/CVE-2020-265xx/CVE-2020-26515.json
index 9f0627a5bcd..13ee3b40464 100644
--- a/CVE-2020/CVE-2020-265xx/CVE-2020-26515.json
+++ b/CVE-2020/CVE-2020-265xx/CVE-2020-26515.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-26515",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-08T13:15:07.457",
- "lastModified": "2022-07-12T17:42:04.277",
+ "lastModified": "2023-10-18T19:04:17.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -88,35 +88,35 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:intland:codebeamer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.1.0",
- "matchCriteriaId": "FC456609-B95D-48B6-86A8-AAA9F6989A44"
+ "matchCriteriaId": "3F3BE8BD-0868-4A50-BF06-BAE474BF5328"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:-:*:*:*:*:*:*",
- "matchCriteriaId": "29EA9491-EC5A-4E04-A797-719FC87EB86C"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "A0128D1A-DA5B-49EE-ABC2-DA75EF2B5594"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "C779D2FF-F4E0-4DC4-A2CC-A3456AB16681"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp1:*:*:*:*:*:*",
+ "matchCriteriaId": "35461BDC-7A06-49AE-A528-DB6A986C9F14"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp2:*:*:*:*:*:*",
- "matchCriteriaId": "11D9F5E1-CC89-4E32-9FE5-F5E0CA6839C2"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp2:*:*:*:*:*:*",
+ "matchCriteriaId": "B32DF425-549F-4BEC-A7B6-F66CE063C878"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp3:*:*:*:*:*:*",
- "matchCriteriaId": "B6E5E3CB-B9E4-445A-8654-A506A52C4815"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp3:*:*:*:*:*:*",
+ "matchCriteriaId": "8166F01E-B271-4491-B932-00BF843D2146"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp4:*:*:*:*:*:*",
- "matchCriteriaId": "4B11CD25-3A00-4B2E-8B00-D6D11AB06737"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp4:*:*:*:*:*:*",
+ "matchCriteriaId": "504110BC-FC0C-4A3F-824C-5BF4C573A792"
}
]
}
diff --git a/CVE-2020/CVE-2020-265xx/CVE-2020-26516.json b/CVE-2020/CVE-2020-265xx/CVE-2020-26516.json
index 094bbda946b..17691e87046 100644
--- a/CVE-2020/CVE-2020-265xx/CVE-2020-26516.json
+++ b/CVE-2020/CVE-2020-265xx/CVE-2020-26516.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-26516",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-08T13:15:07.493",
- "lastModified": "2021-06-15T14:01:47.773",
+ "lastModified": "2023-10-18T19:04:17.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,63 +84,63 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.0:-:*:*:*:*:*:*",
- "matchCriteriaId": "D7256650-C44F-4A3F-918D-A186F6A62948"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "EE5B0480-89AF-44AE-A9C1-0656627FA777"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.0:prerelease4:*:*:*:*:*:*",
- "matchCriteriaId": "F11152A1-FCD7-4B89-B4D6-BA16111D04C1"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:prerelease4:*:*:*:*:*:*",
+ "matchCriteriaId": "E3C0AE05-0E16-498D-B38D-4104C764CDAC"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.0:rc1:*:*:*:*:*:*",
- "matchCriteriaId": "593CA18F-2BE1-4AC1-9518-4E6A647A1848"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "83F33C62-2D1B-462D-B3D6-FA0BB3EF4BE4"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.0:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "C8EDDB84-727E-440A-8B28-B9F7A3453866"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:sp1:*:*:*:*:*:*",
+ "matchCriteriaId": "F9DC14C6-92A8-4388-9D8F-AD2C3201AD5C"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.0:sp2:*:*:*:*:*:*",
- "matchCriteriaId": "374FD2B9-1DBE-4F8A-8963-FD0B6A402DFA"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:sp2:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D61084-CBE7-464D-BA6A-485627BCB2B8"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.1:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "D12BBF90-DE0D-4965-B319-5E9BB3CE4A8C"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.1:sp1:*:*:*:*:*:*",
+ "matchCriteriaId": "568A8794-36C0-40BE-9867-7D29D77DBC6A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:-:*:*:*:*:*:*",
- "matchCriteriaId": "29EA9491-EC5A-4E04-A797-719FC87EB86C"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "A0128D1A-DA5B-49EE-ABC2-DA75EF2B5594"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "C779D2FF-F4E0-4DC4-A2CC-A3456AB16681"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp1:*:*:*:*:*:*",
+ "matchCriteriaId": "35461BDC-7A06-49AE-A528-DB6A986C9F14"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp2:*:*:*:*:*:*",
- "matchCriteriaId": "11D9F5E1-CC89-4E32-9FE5-F5E0CA6839C2"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp2:*:*:*:*:*:*",
+ "matchCriteriaId": "B32DF425-549F-4BEC-A7B6-F66CE063C878"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp3:*:*:*:*:*:*",
- "matchCriteriaId": "B6E5E3CB-B9E4-445A-8654-A506A52C4815"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp3:*:*:*:*:*:*",
+ "matchCriteriaId": "8166F01E-B271-4491-B932-00BF843D2146"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp4:*:*:*:*:*:*",
- "matchCriteriaId": "4B11CD25-3A00-4B2E-8B00-D6D11AB06737"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp4:*:*:*:*:*:*",
+ "matchCriteriaId": "504110BC-FC0C-4A3F-824C-5BF4C573A792"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:21.04:*:*:*:*:*:*:*",
- "matchCriteriaId": "007BD6B0-1F0C-419C-812A-08A497B80F94"
+ "criteria": "cpe:2.3:a:intland:codebeamer:21.04:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A3B7C6A7-5FA8-42B8-B83B-0BF908A72E44"
}
]
}
diff --git a/CVE-2020/CVE-2020-265xx/CVE-2020-26517.json b/CVE-2020/CVE-2020-265xx/CVE-2020-26517.json
index 033a834e28b..af3d613eb25 100644
--- a/CVE-2020/CVE-2020-265xx/CVE-2020-26517.json
+++ b/CVE-2020/CVE-2020-265xx/CVE-2020-26517.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-26517",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-08T13:15:07.527",
- "lastModified": "2021-06-15T14:10:20.363",
+ "lastModified": "2023-10-18T19:04:17.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,63 +84,63 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.0:-:*:*:*:*:*:*",
- "matchCriteriaId": "D7256650-C44F-4A3F-918D-A186F6A62948"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "EE5B0480-89AF-44AE-A9C1-0656627FA777"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.0:prerelease4:*:*:*:*:*:*",
- "matchCriteriaId": "F11152A1-FCD7-4B89-B4D6-BA16111D04C1"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:prerelease4:*:*:*:*:*:*",
+ "matchCriteriaId": "E3C0AE05-0E16-498D-B38D-4104C764CDAC"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.0:rc1:*:*:*:*:*:*",
- "matchCriteriaId": "593CA18F-2BE1-4AC1-9518-4E6A647A1848"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "83F33C62-2D1B-462D-B3D6-FA0BB3EF4BE4"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.0:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "C8EDDB84-727E-440A-8B28-B9F7A3453866"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:sp1:*:*:*:*:*:*",
+ "matchCriteriaId": "F9DC14C6-92A8-4388-9D8F-AD2C3201AD5C"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.0:sp2:*:*:*:*:*:*",
- "matchCriteriaId": "374FD2B9-1DBE-4F8A-8963-FD0B6A402DFA"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.0:sp2:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D61084-CBE7-464D-BA6A-485627BCB2B8"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.0.1:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "D12BBF90-DE0D-4965-B319-5E9BB3CE4A8C"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.0.1:sp1:*:*:*:*:*:*",
+ "matchCriteriaId": "568A8794-36C0-40BE-9867-7D29D77DBC6A"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:-:*:*:*:*:*:*",
- "matchCriteriaId": "29EA9491-EC5A-4E04-A797-719FC87EB86C"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "A0128D1A-DA5B-49EE-ABC2-DA75EF2B5594"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "C779D2FF-F4E0-4DC4-A2CC-A3456AB16681"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp1:*:*:*:*:*:*",
+ "matchCriteriaId": "35461BDC-7A06-49AE-A528-DB6A986C9F14"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp2:*:*:*:*:*:*",
- "matchCriteriaId": "11D9F5E1-CC89-4E32-9FE5-F5E0CA6839C2"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp2:*:*:*:*:*:*",
+ "matchCriteriaId": "B32DF425-549F-4BEC-A7B6-F66CE063C878"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp3:*:*:*:*:*:*",
- "matchCriteriaId": "B6E5E3CB-B9E4-445A-8654-A506A52C4815"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp3:*:*:*:*:*:*",
+ "matchCriteriaId": "8166F01E-B271-4491-B932-00BF843D2146"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:10.1.0:sp4:*:*:*:*:*:*",
- "matchCriteriaId": "4B11CD25-3A00-4B2E-8B00-D6D11AB06737"
+ "criteria": "cpe:2.3:a:intland:codebeamer:10.1.0:sp4:*:*:*:*:*:*",
+ "matchCriteriaId": "504110BC-FC0C-4A3F-824C-5BF4C573A792"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:intland:codebeamer_application_lifecycle_management:21.04:*:*:*:*:*:*:*",
- "matchCriteriaId": "007BD6B0-1F0C-419C-812A-08A497B80F94"
+ "criteria": "cpe:2.3:a:intland:codebeamer:21.04:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A3B7C6A7-5FA8-42B8-B83B-0BF908A72E44"
}
]
}
diff --git a/CVE-2020/CVE-2020-272xx/CVE-2020-27213.json b/CVE-2020/CVE-2020-272xx/CVE-2020-27213.json
index 8e3045cb5e3..aaa7a05576c 100644
--- a/CVE-2020/CVE-2020-272xx/CVE-2020-27213.json
+++ b/CVE-2020/CVE-2020-272xx/CVE-2020-27213.json
@@ -2,31 +2,101 @@
"id": "CVE-2020-27213",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T17:15:10.337",
- "lastModified": "2023-10-10T17:52:17.703",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-27T19:34:58.647",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Ethernut Nut/OS 5.1. The code that generates Initial Sequence Numbers (ISNs) for TCP connections derives the ISN from an insufficiently random source. As a result, an attacker may be able to determine the ISN of current and future TCP connections and either hijack existing ones or spoof future ones. While the ISN generator seems to adhere to RFC 793 (where a global 32-bit counter is incremented roughly every 4 microseconds), proper ISN generation should aim to follow at least the specifications outlined in RFC 6528."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en Ethernut Nut/OS 5.1. El c\u00f3digo que genera Initial Sequence Numbers (ISN) para conexiones TCP deriva el ISN de una fuente insuficientemente aleatoria. Como resultado, un atacante puede determinar el ISN de las conexiones TCP actuales y futuras y secuestrar las existentes o falsificar las futuras. Si bien el generador de ISN parece cumplir con RFC 793 (donde un contador global de 32 bits se incrementa aproximadamente cada 4 microsegundos), la generaci\u00f3n de ISN adecuada debe aspirar a seguir al menos las especificaciones descritas en RFC 6528."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-330"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ethernut:nut\\/os:5.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33F926DD-C48D-4FB6-9CEC-E48DC7FDA4D7"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "http://lists.egnite.de/mailman/listinfo/en-nut-announce",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Not Applicable"
+ ]
},
{
"url": "http://www.ethernut.de/en/download/index.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
},
{
"url": "https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-277xx/CVE-2020-27781.json b/CVE-2020/CVE-2020-277xx/CVE-2020-27781.json
index e9871a47354..bac65fc6d8a 100644
--- a/CVE-2020/CVE-2020-277xx/CVE-2020-27781.json
+++ b/CVE-2020/CVE-2020-277xx/CVE-2020-27781.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-27781",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-12-18T21:15:12.660",
- "lastModified": "2021-06-03T18:40:08.803",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:10.277",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -176,6 +176,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJ7FFROL25FYRL6FMI33VRKOD74LINRP/",
"source": "secalert@redhat.com",
diff --git a/CVE-2020/CVE-2020-295xx/CVE-2020-29583.json b/CVE-2020/CVE-2020-295xx/CVE-2020-29583.json
index 88878a333e0..6ac16b3b6c1 100644
--- a/CVE-2020/CVE-2020-295xx/CVE-2020-29583.json
+++ b/CVE-2020/CVE-2020-295xx/CVE-2020-29583.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-29583",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-22T22:15:14.443",
- "lastModified": "2022-07-12T17:42:04.277",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-28T01:15:51.480",
+ "vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
- "cisaVulnerabilityName": "Zyxel Unified Security Gateway Undocumented Administrator Account with Default Credentials",
+ "cisaVulnerabilityName": "Zyxel Multiple Products Use of Hard-Coded Credentials Vulnerability",
"descriptions": [
{
"lang": "en",
@@ -517,6 +517,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.secpod.com/blog/a-secret-zyxel-firewall-and-ap-controllers-could-allow-for-administrative-access-cve-2020-29583/",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://www.zyxel.com/support/CVE-2020-29583.shtml",
"source": "cve@mitre.org",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36637.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36637.json
index efe96a56c2f..4f0797ddac1 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36637.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36637.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36637",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:09.217",
- "lastModified": "2023-01-06T20:39:10.883",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:08.750",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Chris92de AdminServ. It has been declared as problematic. This vulnerability affects unknown code of the file resources/core/adminserv.php. The manipulation of the argument text leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 3ed17dab3b4d6e8bf1c82ddfbf882314365e9cd7. It is recommended to apply a patch to fix this issue. VDB-217042 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Chris92de AdminServ. It has been declared as problematic. This vulnerability affects unknown code of the file resources/core/adminserv.php. The manipulation of the argument text leads to cross site scripting. The attack can be initiated remotely. The patch is identified as 3ed17dab3b4d6e8bf1c82ddfbf882314365e9cd7. It is recommended to apply a patch to fix this issue. VDB-217042 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36638.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36638.json
index 82f53fdeff8..73f5fddba9a 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36638.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36638.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36638",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:09.300",
- "lastModified": "2023-01-06T20:38:31.473",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:08.823",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Chris92de AdminServ. It has been rated as problematic. This issue affects some unknown processing of the file resources/core/adminserv.php. The manipulation of the argument error leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 9a45087814295de6fb3a3fe38f96293665234da1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217043. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Chris92de AdminServ. It has been rated as problematic. This issue affects some unknown processing of the file resources/core/adminserv.php. The manipulation of the argument error leads to cross site scripting. The attack may be initiated remotely. The patch is named 9a45087814295de6fb3a3fe38f96293665234da1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217043. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36639.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36639.json
index 71357f9af41..5b0881925e6 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36639.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36639.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36639",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T10:15:10.383",
- "lastModified": "2023-01-10T17:38:58.630",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:08.890",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in AlliedModders AMX Mod X and classified as critical. This vulnerability affects the function cmdVoteMap of the file plugins/adminvote.sma of the component Console Command Handler. The manipulation of the argument amx_votemap leads to path traversal. The name of the patch is a5f2b5539f6d61050b68df8b22ebb343a2862681. It is recommended to apply a patch to fix this issue. VDB-217354 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in AlliedModders AMX Mod X on Windows and classified as critical. This vulnerability affects the function cmdVoteMap of the file plugins/adminvote.sma of the component Console Command Handler. The manipulation of the argument amx_votemap leads to path traversal. The patch is identified as a5f2b5539f6d61050b68df8b22ebb343a2862681. It is recommended to apply a patch to fix this issue. VDB-217354 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36640.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36640.json
index 26ca4fd3e74..40845d01fd3 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36640.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36640.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36640",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T10:15:09.773",
- "lastModified": "2023-01-11T18:34:10.540",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:08.967",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in bonitasoft bonita-connector-webservice up to 1.3.0. This affects the function TransformerConfigurationException of the file src/main/java/org/bonitasoft/connectors/ws/SecureWSConnector.java. The manipulation leads to xml external entity reference. Upgrading to version 1.3.1 is able to address this issue. The name of the patch is a12ad691c05af19e9061d7949b6b828ce48815d5. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217443."
+ "value": "A vulnerability, which was classified as problematic, was found in bonitasoft bonita-connector-webservice up to 1.3.0. This affects the function TransformerConfigurationException of the file src/main/java/org/bonitasoft/connectors/ws/SecureWSConnector.java. The manipulation leads to xml external entity reference. Upgrading to version 1.3.1 is able to address this issue. The patch is named a12ad691c05af19e9061d7949b6b828ce48815d5. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217443."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36641.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36641.json
index 43a62c44ac3..81d1347ed9a 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36641.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36641.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36641",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T12:15:09.287",
- "lastModified": "2023-01-11T19:33:44.993",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.033",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in gturri aXMLRPC up to 1.12.0. This vulnerability affects the function ResponseParser of the file src/main/java/de/timroes/axmlrpc/ResponseParser.java. The manipulation leads to xml external entity reference. Upgrading to version 1.12.1 is able to address this issue. The name of the patch is ad6615b3ec41353e614f6ea5fdd5b046442a832b. It is recommended to upgrade the affected component. VDB-217450 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic was found in gturri aXMLRPC up to 1.12.0. This vulnerability affects the function ResponseParser of the file src/main/java/de/timroes/axmlrpc/ResponseParser.java. The manipulation leads to xml external entity reference. Upgrading to version 1.12.1 is able to address this issue. The patch is identified as ad6615b3ec41353e614f6ea5fdd5b046442a832b. It is recommended to upgrade the affected component. VDB-217450 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36642.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36642.json
index 3a418910d65..70eb7f84335 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36642.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36642.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36642",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T11:15:09.443",
- "lastModified": "2023-01-12T15:52:22.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.107",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in trampgeek jobe up to 1.6.x and classified as critical. This issue affects the function run_in_sandbox of the file application/libraries/LanguageTask.php. The manipulation leads to command injection. Upgrading to version 1.7.0 is able to address this issue. The name of the patch is 8f43daf50c943b98eaf0c542da901a4a16e85b02. It is recommended to upgrade the affected component. The identifier VDB-217553 was assigned to this vulnerability."
+ "value": "A vulnerability was found in trampgeek jobe up to 1.6.x and classified as critical. This issue affects the function run_in_sandbox of the file application/libraries/LanguageTask.php. The manipulation leads to command injection. Upgrading to version 1.7.0 is able to address this issue. The identifier of the patch is 8f43daf50c943b98eaf0c542da901a4a16e85b02. It is recommended to upgrade the affected component. The identifier VDB-217553 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36644.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36644.json
index 2af0946c0f3..0c948880039 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36644.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36644.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36644",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T10:15:09.417",
- "lastModified": "2023-01-12T16:40:20.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.183",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in jamesmartin Inline SVG up to 1.7.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file lib/inline_svg/action_view/helpers.rb of the component URL Parameter Handler. The manipulation of the argument filename leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.7.2 is able to address this issue. The name of the patch is f5363b351508486021f99e083c92068cf2943621. It is recommended to upgrade the affected component. The identifier VDB-217597 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in jamesmartin Inline SVG up to 1.7.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file lib/inline_svg/action_view/helpers.rb of the component URL Parameter Handler. The manipulation of the argument filename leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.7.2 is able to address this issue. The identifier of the patch is f5363b351508486021f99e083c92068cf2943621. It is recommended to upgrade the affected component. The identifier VDB-217597 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36645.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36645.json
index 9c8c9a92693..cdeaa3aa4b7 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36645.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36645.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36645",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T19:15:09.383",
- "lastModified": "2023-01-12T18:40:31.593",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.263",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in square squalor. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version v0.0.0 is able to address this issue. The name of the patch is f6f0a47cc344711042eb0970cb423e6950ba3f93. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217623."
+ "value": "A vulnerability, which was classified as critical, was found in square squalor. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version v0.0.0 is able to address this issue. The patch is named f6f0a47cc344711042eb0970cb423e6950ba3f93. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217623."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36646.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36646.json
index 559d32763fa..c08b9db0b9e 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36646.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36646.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36646",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.523",
- "lastModified": "2023-01-12T20:32:59.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.333",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in MediaArea ZenLib up to 0.4.38. This affects the function Ztring::Date_From_Seconds_1970_Local of the file Source/ZenLib/Ztring.cpp. The manipulation of the argument Value leads to unchecked return value to null pointer dereference. Upgrading to version 0.4.39 is able to address this issue. The name of the patch is 6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408. It is recommended to upgrade the affected component. The identifier VDB-217629 was assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic has been found in MediaArea ZenLib up to 0.4.38. This affects the function Ztring::Date_From_Seconds_1970_Local of the file Source/ZenLib/Ztring.cpp. The manipulation of the argument Value leads to unchecked return value to null pointer dereference. Upgrading to version 0.4.39 is able to address this issue. The identifier of the patch is 6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408. It is recommended to upgrade the affected component. The identifier VDB-217629 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36647.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36647.json
index f8ecfeddd62..27eec9dff0f 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36647.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36647.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36647",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:11.707",
- "lastModified": "2023-01-12T16:54:49.220",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.407",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in YunoHost-Apps transmission_ynh. Affected is an unknown function of the file conf/nginx.conf. The manipulation leads to path traversal. The name of the patch is f136dfd44eda128129e5fd2d850a3a3c600e6a4a. It is recommended to apply a patch to fix this issue. VDB-217638 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as critical has been found in YunoHost-Apps transmission_ynh. Affected is an unknown function of the file conf/nginx.conf. The manipulation leads to path traversal. The patch is identified as f136dfd44eda128129e5fd2d850a3a3c600e6a4a. It is recommended to apply a patch to fix this issue. VDB-217638 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36648.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36648.json
index 640b156f667..ab910e6cb03 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36648.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36648.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36648",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:11.793",
- "lastModified": "2023-01-12T16:47:45.590",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.473",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in pouetnet pouet 2.0. This affects an unknown part. The manipulation of the argument howmany leads to sql injection. The name of the patch is 11d615931352066fb2f6dcb07428277c2cd99baf. It is recommended to apply a patch to fix this issue. The identifier VDB-217641 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, was found in pouetnet pouet 2.0. This affects an unknown part. The manipulation of the argument howmany leads to sql injection. The identifier of the patch is 11d615931352066fb2f6dcb07428277c2cd99baf. It is recommended to apply a patch to fix this issue. The identifier VDB-217641 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36650.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36650.json
index 8823d8e4068..bb7cf45bb0c 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36650.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36650.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36650",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T18:15:09.003",
- "lastModified": "2023-01-18T19:20:51.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.550",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in IonicaBizau node-gry up to 5.x. This affects an unknown part. The manipulation leads to command injection. Upgrading to version 6.0.0 is able to address this issue. The name of the patch is 5108446c1e23960d65e8b973f1d9486f9f9dbd6c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218019."
+ "value": "A vulnerability, which was classified as critical, was found in IonicaBizau node-gry up to 5.x. This affects an unknown part. The manipulation leads to command injection. Upgrading to version 6.0.0 is able to address this issue. The patch is named 5108446c1e23960d65e8b973f1d9486f9f9dbd6c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218019."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36651.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36651.json
index c3e6af45cca..42c889c4a82 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36651.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36651.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36651",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T01:15:11.800",
- "lastModified": "2023-01-25T17:51:15.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.627",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in youngerheart nodeserver and classified as critical. Affected by this vulnerability is an unknown functionality of the file nodeserver.js. The manipulation leads to path traversal. The name of the patch is c4c0f0138ab5afbac58e03915d446680421bde28. It is recommended to apply a patch to fix this issue. The identifier VDB-218461 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in youngerheart nodeserver and classified as critical. Affected by this vulnerability is an unknown functionality of the file nodeserver.js. The manipulation leads to path traversal. The identifier of the patch is c4c0f0138ab5afbac58e03915d446680421bde28. It is recommended to apply a patch to fix this issue. The identifier VDB-218461 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36653.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36653.json
index f683b827fb0..2198aea1938 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36653.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36653.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36653",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T08:15:09.957",
- "lastModified": "2023-01-25T16:59:24.830",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.700",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in GENI Portal. It has been rated as problematic. Affected by this issue is some unknown functionality of the file portal/www/portal/error-text.php. The manipulation of the argument error leads to cross site scripting. The attack may be launched remotely. The name of the patch is c2356cc41260551073bfaa3a94d1ab074f554938. It is recommended to apply a patch to fix this issue. VDB-218474 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in GENI Portal. It has been rated as problematic. Affected by this issue is some unknown functionality of the file portal/www/portal/error-text.php. The manipulation of the argument error leads to cross site scripting. The attack may be launched remotely. The patch is identified as c2356cc41260551073bfaa3a94d1ab074f554938. It is recommended to apply a patch to fix this issue. VDB-218474 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36654.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36654.json
index 9d379e48e0f..3a27e608c2d 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36654.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36654.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36654",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T08:15:10.073",
- "lastModified": "2023-01-25T19:25:21.523",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.780",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic has been found in GENI Portal. This affects the function no_invocation_id_error of the file portal/www/portal/sliceresource.php. The manipulation of the argument invocation_id/invocation_user leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 39a96fb4b822bd3497442a96135de498d4a81337. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218475."
+ "value": "A vulnerability classified as problematic has been found in GENI Portal. This affects the function no_invocation_id_error of the file portal/www/portal/sliceresource.php. The manipulation of the argument invocation_id/invocation_user leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 39a96fb4b822bd3497442a96135de498d4a81337. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218475."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36660.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36660.json
index 8dfe5efbfdc..55af50e0e4d 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36660.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36660.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36660",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T17:15:09.437",
- "lastModified": "2023-02-14T22:47:33.603",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.853",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in paxswill EVE Ship Replacement Program 0.12.11. It has been rated as problematic. This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. Upgrading to version 0.12.12 is able to address this issue. The name of the patch is 9e03f68e46e85ca9c9694a6971859b3ee66f0240. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220211."
+ "value": "A vulnerability was found in paxswill EVE Ship Replacement Program 0.12.11. It has been rated as problematic. This issue affects some unknown processing of the file src/evesrp/views/api.py of the component User Information Handler. The manipulation leads to information disclosure. The attack may be initiated remotely. Upgrading to version 0.12.12 is able to address this issue. The patch is named 9e03f68e46e85ca9c9694a6971859b3ee66f0240. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220211."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36661.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36661.json
index d21853b9869..45e5520919c 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36661.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36661.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36661",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T21:15:10.650",
- "lastModified": "2023-02-24T06:24:34.020",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:09.943",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Kong lua-multipart 0.5.8-1. It has been declared as problematic. This vulnerability affects the function is_header of the file src/multipart.lua. The manipulation leads to inefficient regular expression complexity. Upgrading to version 0.5.9-1 is able to address this issue. The name of the patch is d632e5df43a2928fd537784a99a79dec288bf01b. It is recommended to upgrade the affected component. VDB-220642 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Kong lua-multipart 0.5.8-1. It has been declared as problematic. This vulnerability affects the function is_header of the file src/multipart.lua. The manipulation leads to inefficient regular expression complexity. Upgrading to version 0.5.9-1 is able to address this issue. The patch is identified as d632e5df43a2928fd537784a99a79dec288bf01b. It is recommended to upgrade the affected component. VDB-220642 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36663.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36663.json
index eab922bd89a..4767107fc61 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36663.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36663.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36663",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-04T07:15:08.690",
- "lastModified": "2023-03-09T21:03:57.110",
+ "lastModified": "2023-10-29T02:34:51.557",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in Artes\u00e3os SEOTools up to 0.17.1. This affects the function makeTag of the file OpenGraph.php. The manipulation of the argument value leads to open redirect. Upgrading to version 0.17.2 is able to address this issue. The name of the patch is ca27cd0edf917e0bc805227013859b8b5a1f01fb. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222231."
+ "value": "A vulnerability, which was classified as problematic, was found in Artes\u00e3os SEOTools up to 0.17.1. This affects the function makeTag of the file OpenGraph.php. The manipulation of the argument value leads to open redirect. Upgrading to version 0.17.2 is able to address this issue. The patch is named ca27cd0edf917e0bc805227013859b8b5a1f01fb. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222231."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-601"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-601"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36665.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36665.json
index f781b83a7f2..ea08f59dcf0 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36665.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36665.json
@@ -2,12 +2,12 @@
"id": "CVE-2020-36665",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-04T19:15:10.193",
- "lastModified": "2023-03-09T21:01:58.203",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:10.107",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Artes\u00e3os SEOTools up to 0.17.1 and classified as critical. This issue affects the function eachValue of the file TwitterCards.php. The manipulation of the argument value leads to open redirect. Upgrading to version 0.17.2 is able to address this issue. The name of the patch is ca27cd0edf917e0bc805227013859b8b5a1f01fb. It is recommended to upgrade the affected component. The identifier VDB-222233 was assigned to this vulnerability."
+ "value": "A vulnerability was found in Artes\u00e3os SEOTools up to 0.17.1 and classified as critical. This issue affects the function eachValue of the file TwitterCards.php. The manipulation of the argument value leads to open redirect. Upgrading to version 0.17.2 is able to address this issue. The identifier of the patch is ca27cd0edf917e0bc805227013859b8b5a1f01fb. It is recommended to upgrade the affected component. The identifier VDB-222233 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36698.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36698.json
new file mode 100644
index 00000000000..d229c1bd803
--- /dev/null
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36698.json
@@ -0,0 +1,125 @@
+{
+ "id": "CVE-2020-36698",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:14.487",
+ "lastModified": "2023-10-26T17:32:52.447",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to unauthorized user interaction in versions up to, and including, 2.50. This is due to missing capability checks on several AJAX actions and nonce disclosure in the source page of the administrative dashboard. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to call functions and delete and/or upload files."
+ },
+ {
+ "lang": "es",
+ "value": "El an\u00e1lisis de Seguridad y Malware del complemento CleanTalk para WordPress es vulnerable a la interacci\u00f3n no autorizada del usuario en versiones hasta la 2.50 incluida. Esto se debe a que faltan comprobaciones de capacidad en varias acciones AJAX y a la divulgaci\u00f3n nonce en la p\u00e1gina de origen del panel administrativo. Esto hace posible que atacantes autenticados, con permisos de nivel de suscriptor y superiores, llamen funciones y eliminen y/o carguen archivos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cleantalk:security_\\&_malware_scan:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.51",
+ "matchCriteriaId": "FD64F886-2406-4186-9649-43C2DC48E05E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/multiple-vulnerabilities-fixed-in-security-malware-scan-by-cleantalk-plugin/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://wpscan.com/vulnerability/23960f42-dfc1-4951-9169-02d889283f01",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0fb9b039-eb04-4c27-89eb-1932c9c31962?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36706.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36706.json
new file mode 100644
index 00000000000..4e9f15f0fd3
--- /dev/null
+++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36706.json
@@ -0,0 +1,132 @@
+{
+ "id": "CVE-2020-36706",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:14.650",
+ "lastModified": "2023-10-26T17:32:28.667",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Simple:Press \u2013 WordPress Forum Plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ~/admin/resources/jscript/ajaxupload/sf-uploader.php file in versions up to, and including, 6.6.0. This makes it possible for attackers to upload arbitrary files on the affected sites server which may make remote code execution possible."
+ },
+ {
+ "lang": "es",
+ "value": "The Simple:Press \u2013 WordPress Forum Plugin para WordPress es vulnerable a cargas de archivos arbitrarias debido a la falta de validaci\u00f3n del tipo de archivo en el archivo ~/admin/resources/jscript/ajaxupload/sf-uploader.php en versiones hasta la 6.6.0 incluida. Esto hace posible que los atacantes carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:simple-press:simple\\:press:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "6.6.1",
+ "matchCriteriaId": "D7B168C0-0C23-496A-B9E4-0A6A947C576E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/wordpress-simplepress-plugin-fixed-critical-vulnerabilities/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://wpscan.com/vulnerability/27d4a8a5-9d81-4b42-92be-3f7d1ef22843",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-simple-press-wordpress-forum-arbitrary-file-upload-6-6-0/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/53eba5b4-7cc0-48e1-bb9c-6ed3207151ab?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36714.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36714.json
new file mode 100644
index 00000000000..8706b79bd90
--- /dev/null
+++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36714.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2020-36714",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.020",
+ "lastModified": "2023-10-26T17:23:11.363",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Brizy plugin for WordPress is vulnerable to authorization bypass due to a incorrect capability check on the is_administrator() function in versions up to, and including, 1.0.125. This makes it possible for authenticated attackers to access and interact with available AJAX functions."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Brizy para WordPress es vulnerable a la omisi\u00f3n de autorizaci\u00f3n debido a una verificaci\u00f3n de capacidad incorrecta en la funci\u00f3n is_administrator() en versiones hasta la 1.0.125 incluida. Esto hace posible que los atacantes autenticados accedan e interact\u00faen con las funciones AJAX disponibles."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-285"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:brizy:brizy-page_builder:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.0.125",
+ "matchCriteriaId": "2711C8DC-F5A7-40F7-8517-6C5B6EF560BA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/wordpress-brizy-page-builder-plugin-fixed-critical-vulnerabilities/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9495e25d-a5a6-4f25-9363-783626e58a4a?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36751.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36751.json
new file mode 100644
index 00000000000..d74aeb0a1bf
--- /dev/null
+++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36751.json
@@ -0,0 +1,167 @@
+{
+ "id": "CVE-2020-36751",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.100",
+ "lastModified": "2023-10-27T16:45:20.603",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Coupon Creator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.1. This is due to missing or incorrect nonce validation on the save_meta() function. This makes it possible for unauthenticated attackers to save meta fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Coupon Creator para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 3.1 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n save_meta(). Esto hace posible que atacantes no autenticados guarden metacampos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jesseeproductions:coupon_creator:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.1",
+ "matchCriteriaId": "DAD701D5-D608-4E14-A82E-C0C238E24491"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2368658/coupon-creator/tags/2.5.2.1/plugin-engine/src/Pngx/Admin/Meta.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab57f010-4fd2-40c2-950f-c03888521c8f?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36753.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36753.json
new file mode 100644
index 00000000000..49d98aae978
--- /dev/null
+++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36753.json
@@ -0,0 +1,167 @@
+{
+ "id": "CVE-2020-36753",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.177",
+ "lastModified": "2023-10-27T16:37:17.417",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Hueman theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.6.3. This is due to missing or incorrect nonce validation on the save_meta_box() function. This makes it possible for unauthenticated attackers to save metabox data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El Hueman theme para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 3.6.3 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n save_meta_box(). Esto hace posible que atacantes no autenticados guarden datos de Metabox a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:presscustomizr:hueman:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.6.3",
+ "matchCriteriaId": "0A9E4B9C-029A-4028-AD58-05B71D103B45"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://themes.trac.wordpress.org/browser/hueman/3.6.4/option-tree/includes/class-ot-meta-box.php#L207",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d54b4dc9-8590-433c-873a-efb49e2e79cd?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36754.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36754.json
new file mode 100644
index 00000000000..ac5ab65bdf1
--- /dev/null
+++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36754.json
@@ -0,0 +1,167 @@
+{
+ "id": "CVE-2020-36754",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.250",
+ "lastModified": "2023-10-27T16:32:39.073",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Paid Memberships Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.4.2. This is due to missing or incorrect nonce validation on the pmpro_page_save() function. This makes it possible for unauthenticated attackers to save pages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Paid Memberships Pro para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 2.4.2 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n pmpro_page_save(). Esto hace posible que atacantes no autenticados guarden p\u00e1ginas a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:paidmembershipspro:paid_memberships_pro:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.4.2",
+ "matchCriteriaId": "6E4AD015-E3FF-4AB7-8CCB-ECB0A0043953"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2368689%40paid-memberships-pro&new=2368689%40paid-memberships-pro&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d74553a4-0ef7-4908-a2e8-5e0216f7b256?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36755.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36755.json
new file mode 100644
index 00000000000..18ffa367a8f
--- /dev/null
+++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36755.json
@@ -0,0 +1,167 @@
+{
+ "id": "CVE-2020-36755",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.327",
+ "lastModified": "2023-10-27T16:32:00.433",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Customizr theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.3.0. This is due to missing or incorrect nonce validation on the czr_fn_post_fields_save() function. This makes it possible for unauthenticated attackers to post fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El Customizr theme para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 4.3.0 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n czr_fn_post_fields_save(). Esto hace posible que atacantes no autenticados publiquen campos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:presscustomizr:customizr:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "4.3.0",
+ "matchCriteriaId": "A13010DD-61C9-46E0-B6B6-E2C77C24952A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://themes.trac.wordpress.org/browser/customizr/4.3.1/core/czr-admin-ccat.php?rev=135570#L1764",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9f6b600-a35a-49c2-8758-a7cc5c00e947?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36758.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36758.json
new file mode 100644
index 00000000000..3df2392495f
--- /dev/null
+++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36758.json
@@ -0,0 +1,167 @@
+{
+ "id": "CVE-2020-36758",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.393",
+ "lastModified": "2023-10-27T18:54:33.777",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The RSS Aggregator by Feedzy plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.4.2. This is due to missing or incorrect nonce validation on the save_feedzy_post_type_meta() function. This makes it possible for unauthenticated attackers to update post meta via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento RSS Aggregator de Feedzy para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 3.4.2 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n save_feedzy_post_type_meta(). Esto hace posible que atacantes no autenticados actualicen el metadato de la publicaci\u00f3n a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:themeisle:rss_aggregator_by_feedzy:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.4.2",
+ "matchCriteriaId": "A8178F22-EB49-4843-A03C-AC5DCC69DE0D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2369394/feedzy-rss-feeds/trunk/includes/admin/feedzy-rss-feeds-admin.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3b916dc-3b94-4319-a805-0ea99d14429f?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36759.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36759.json
new file mode 100644
index 00000000000..9d83f7fb2c3
--- /dev/null
+++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36759.json
@@ -0,0 +1,167 @@
+{
+ "id": "CVE-2020-36759",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.473",
+ "lastModified": "2023-10-27T18:54:19.870",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Woody code snippets plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.9. This is due to missing or incorrect nonce validation on the runActions() function. This makes it possible for unauthenticated attackers to activate and deactivate snippets via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Woody code snippets para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 2.3.9 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n runActions(). Esto hace posible que atacantes no autenticados activen y desactiven fragmentos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cm-wp:woody_code_snippets:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.3.9",
+ "matchCriteriaId": "5890F565-03DC-41E3-86CE-93EE81E282E8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2368332%40insert-php&new=2368332%40insert-php&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e573c0a4-d053-400b-828c-0d0eca880776?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2020/CVE-2020-40xx/CVE-2020-4030.json b/CVE-2020/CVE-2020-40xx/CVE-2020-4030.json
index ffcd42a9f76..b75a3521b44 100644
--- a/CVE-2020/CVE-2020-40xx/CVE-2020-4030.json
+++ b/CVE-2020/CVE-2020-40xx/CVE-2020-4030.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-4030",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-06-22T22:15:13.087",
- "lastModified": "2023-10-07T21:15:14.837",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:27:12.637",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -165,8 +165,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -176,6 +176,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -212,7 +227,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/",
diff --git a/CVE-2020/CVE-2020-40xx/CVE-2020-4031.json b/CVE-2020/CVE-2020-40xx/CVE-2020-4031.json
index 050f17d8650..e62318e2907 100644
--- a/CVE-2020/CVE-2020-40xx/CVE-2020-4031.json
+++ b/CVE-2020/CVE-2020-40xx/CVE-2020-4031.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-4031",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-06-22T22:15:13.163",
- "lastModified": "2023-10-07T21:15:14.957",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:27:09.040",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -165,8 +165,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -176,6 +176,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -213,7 +228,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/",
diff --git a/CVE-2020/CVE-2020-40xx/CVE-2020-4032.json b/CVE-2020/CVE-2020-40xx/CVE-2020-4032.json
index c11ed2da59a..02debd9581c 100644
--- a/CVE-2020/CVE-2020-40xx/CVE-2020-4032.json
+++ b/CVE-2020/CVE-2020-40xx/CVE-2020-4032.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-4032",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-06-22T22:15:13.257",
- "lastModified": "2023-10-07T21:15:15.087",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:27:02.060",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -155,8 +155,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -166,6 +166,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -202,7 +217,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/",
diff --git a/CVE-2020/CVE-2020-40xx/CVE-2020-4033.json b/CVE-2020/CVE-2020-40xx/CVE-2020-4033.json
index b30cac44dc5..2823dbb9cd5 100644
--- a/CVE-2020/CVE-2020-40xx/CVE-2020-4033.json
+++ b/CVE-2020/CVE-2020-40xx/CVE-2020-4033.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-4033",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-06-22T22:15:13.353",
- "lastModified": "2023-10-07T21:15:15.193",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:26:55.590",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -165,8 +165,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
- "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
@@ -176,6 +176,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -213,7 +228,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/",
diff --git a/CVE-2021/CVE-2021-10xx/CVE-2021-1050.json b/CVE-2021/CVE-2021-10xx/CVE-2021-1050.json
index 88257f20f83..8116b03a26e 100644
--- a/CVE-2021/CVE-2021-10xx/CVE-2021-1050.json
+++ b/CVE-2021/CVE-2021-10xx/CVE-2021-1050.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-1050",
"sourceIdentifier": "security@android.com",
"published": "2022-11-08T22:15:10.173",
- "lastModified": "2022-11-09T17:19:53.960",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T16:15:08.827",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -64,6 +64,10 @@
}
],
"references": [
+ {
+ "url": "http://packetstormsecurity.com/files/175260/PowerVR-Out-Of-Bounds-Access-Information-Leak.html",
+ "source": "security@android.com"
+ },
{
"url": "https://source.android.com/security/bulletin/2022-11-01",
"source": "security@android.com",
diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1704.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1704.json
index 14d71826e31..40ba63673b8 100644
--- a/CVE-2021/CVE-2021-17xx/CVE-2021-1704.json
+++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1704.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-1704",
"sourceIdentifier": "secure@microsoft.com",
"published": "2021-01-12T20:15:34.040",
- "lastModified": "2021-01-21T15:41:29.590",
+ "lastModified": "2023-10-17T19:01:11.130",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -144,8 +144,8 @@
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:sp1:*:*:*:*:*:*",
- "matchCriteriaId": "504D0038-4CFC-4CF6-A013-008B8F3F852E"
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json
index 546e3baabac..ad5bbbc3a2d 100644
--- a/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json
+++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20090.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-20090",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2021-04-29T15:15:10.630",
- "lastModified": "2022-04-26T17:05:38.987",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T01:15:24.427",
+ "vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
- "cisaVulnerabilityName": "Arcadyan Buffalo Firmware Multiple Versions Path Traversal",
+ "cisaVulnerabilityName": "Arcadyan Buffalo Firmware Path Traversal Vulnerability",
"descriptions": [
{
"lang": "en",
@@ -146,6 +146,10 @@
"US Government Resource"
]
},
+ {
+ "url": "https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/",
+ "source": "vulnreport@tenable.com"
+ },
{
"url": "https://www.tenable.com/security/research/tra-2021-13",
"source": "vulnreport@tenable.com",
diff --git a/CVE-2021/CVE-2021-202xx/CVE-2021-20288.json b/CVE-2021/CVE-2021-202xx/CVE-2021-20288.json
index 7bccf77e0e0..aee2d7bbdf0 100644
--- a/CVE-2021/CVE-2021-202xx/CVE-2021-20288.json
+++ b/CVE-2021/CVE-2021-202xx/CVE-2021-20288.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-20288",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-04-15T15:15:12.257",
- "lastModified": "2021-06-03T18:28:00.477",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:10.387",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -143,6 +143,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/362CEPPYF3YMJZBEJQUT3KDE2EHYYIYQ/",
"source": "secalert@redhat.com",
diff --git a/CVE-2021/CVE-2021-205xx/CVE-2021-20581.json b/CVE-2021/CVE-2021-205xx/CVE-2021-20581.json
index e88a05b7ee4..995cd63e5b8 100644
--- a/CVE-2021/CVE-2021-205xx/CVE-2021-20581.json
+++ b/CVE-2021/CVE-2021-205xx/CVE-2021-20581.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-20581",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T02:15:09.813",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T17:58:51.443",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-613"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/199324",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-205xx/CVE-2021-20588.json b/CVE-2021/CVE-2021-205xx/CVE-2021-20588.json
index 50c93d10cb3..11e85d2650d 100644
--- a/CVE-2021/CVE-2021-205xx/CVE-2021-20588.json
+++ b/CVE-2021/CVE-2021-205xx/CVE-2021-20588.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-20588",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2021-02-19T20:15:13.023",
- "lastModified": "2022-11-21T17:15:23.613",
+ "lastModified": "2023-10-18T00:15:10.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -322,12 +322,8 @@
]
},
{
- "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-049-02",
- "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
- "tags": [
- "Third Party Advisory",
- "US Government Resource"
- ]
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-049-02",
+ "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-021_en.pdf",
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21602.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21602.json
index 7c52f3e5357..a6f3eecb3d2 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21602.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21602.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21602",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:13.337",
- "lastModified": "2021-01-15T18:38:19.507",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:44.590",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-59"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-59"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21603.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21603.json
index 44de31ac155..c1542adab27 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21603.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21603.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21603",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:13.460",
- "lastModified": "2021-01-15T18:40:44.310",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:44.693",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21604.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21604.json
index 965a2e20723..d126a63ab42 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21604.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21604.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21604",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:13.523",
- "lastModified": "2021-01-15T19:08:04.457",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:44.763",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-502"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21605.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21605.json
index e89e56ae385..3751ca403ab 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21605.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21605.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21605",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:13.600",
- "lastModified": "2022-10-24T16:59:53.027",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:44.873",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-20"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21606.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21606.json
index 65035b9e09c..bf7771be555 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21606.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21606.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21606",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:13.663",
- "lastModified": "2021-01-15T18:58:36.943",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:45.017",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-20"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-20"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21607.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21607.json
index 5a0092a2042..31c7db0df24 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21607.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21607.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21607",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:13.740",
- "lastModified": "2021-01-15T20:32:44.777",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:45.097",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-770"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-789"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21608.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21608.json
index 2c14cc4f2d5..7789cccdda6 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21608.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21608.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21608",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:13.837",
- "lastModified": "2021-01-15T19:45:20.460",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:45.210",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21609.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21609.json
index e97f845edb1..1a560010938 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21609.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21609.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21609",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:13.897",
- "lastModified": "2021-01-15T20:00:06.520",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:45.280",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21610.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21610.json
index 90171c4ee9f..24b05592279 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21610.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21610.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21610",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:14.007",
- "lastModified": "2021-01-15T19:41:32.033",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:45.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21611.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21611.json
index 14a73e485b9..f8d5951119d 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21611.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21611.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21611",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:14.087",
- "lastModified": "2021-01-15T19:25:57.793",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:45.470",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21612.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21612.json
index 5f50a3896c9..6b085308748 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21612.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21612.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21612",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:14.147",
- "lastModified": "2021-01-19T16:59:32.280",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:45.603",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21613.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21613.json
index 88d9e50de7b..23890b0318a 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21613.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21613.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21613",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:14.273",
- "lastModified": "2021-01-19T17:19:45.323",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:45.717",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21614.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21614.json
index 5948d59e6ed..eb39c4b4bd6 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21614.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21614.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21614",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-13T16:15:14.350",
- "lastModified": "2021-01-19T17:39:52.870",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:45.830",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21615.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21615.json
index 1e391b844ee..0db33a555b3 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21615.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21615.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21615",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-01-26T18:16:18.693",
- "lastModified": "2021-02-02T16:20:54.827",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:45.913",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-367"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-367"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21616.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21616.json
index 48c5786f90e..dbbeba43ac2 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21616.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21616.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21616",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-02-24T16:15:14.663",
- "lastModified": "2021-02-27T04:56:50.777",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:46.033",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21617.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21617.json
index 546a93361ed..c291d8a81a3 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21617.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21617.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21617",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-02-24T16:15:14.807",
- "lastModified": "2021-02-26T22:33:30.130",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:46.157",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21618.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21618.json
index 147f8bdb17e..783744b6bbd 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21618.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21618.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21618",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-02-24T16:15:14.897",
- "lastModified": "2021-02-27T04:53:40.507",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:46.270",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21619.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21619.json
index cd30b6acb21..91797f2107a 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21619.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21619.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21619",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-02-24T16:15:14.983",
- "lastModified": "2021-02-27T04:52:14.507",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:46.350",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21620.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21620.json
index 3eb8b07d2f2..44003f100a8 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21620.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21620.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21620",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-02-24T16:15:15.053",
- "lastModified": "2021-02-26T22:31:31.800",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:46.417",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -105,11 +95,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21621.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21621.json
index 798e3dc760a..0b2de6f28b1 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21621.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21621.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21621",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-02-24T16:15:15.133",
- "lastModified": "2022-10-25T16:03:04.260",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:46.520",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-200"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-201"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21622.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21622.json
index d33d0f135c2..208a79349f6 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21622.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21622.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21622",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-02-24T16:15:15.227",
- "lastModified": "2021-02-27T04:46:34.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:46.620",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21623.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21623.json
index 4f6c98c63f9..79c933dd852 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21623.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21623.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21623",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-18T14:15:13.227",
- "lastModified": "2021-03-23T19:58:17.833",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:46.727",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21624.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21624.json
index 77ff87895cb..2347e1f5ef3 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21624.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21624.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21624",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-18T14:15:13.350",
- "lastModified": "2021-03-24T15:55:52.877",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:46.860",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21625.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21625.json
index 73167539879..8196b6162fe 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21625.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21625.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21625",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-18T14:15:13.427",
- "lastModified": "2021-03-24T16:12:13.943",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:46.943",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21626.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21626.json
index 8efc387bef8..8ed84660d18 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21626.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21626.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21626",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-18T14:15:13.490",
- "lastModified": "2021-03-24T16:43:53.127",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:47.017",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21627.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21627.json
index 3f2cbb22316..789efad3cf5 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21627.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21627.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21627",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-18T14:15:13.570",
- "lastModified": "2021-03-24T12:23:35.180",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:47.130",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21628.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21628.json
index c14c09d39bc..832b8653d6a 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21628.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21628.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21628",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.187",
- "lastModified": "2021-04-02T17:29:00.497",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:47.207",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21629.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21629.json
index b40852fc747..9688804bf97 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21629.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21629.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21629",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.327",
- "lastModified": "2021-04-02T17:41:23.513",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:47.320",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21630.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21630.json
index 92c0e2f27f5..e161132afeb 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21630.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21630.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21630",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.407",
- "lastModified": "2021-04-02T17:51:14.887",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:47.470",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21631.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21631.json
index 86b134a662b..2e466edcf04 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21631.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21631.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21631",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.470",
- "lastModified": "2021-04-02T16:56:09.400",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:47.607",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21632.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21632.json
index 6e7866a08bc..681e6df9845 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21632.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21632.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21632",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.547",
- "lastModified": "2021-04-02T16:24:02.207",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:47.680",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21633.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21633.json
index 2f03ae51f29..5f0ce3ef21d 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21633.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21633.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21633",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.627",
- "lastModified": "2021-04-02T16:23:13.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:47.797",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21634.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21634.json
index 8c036904ce6..1ca3334b8f0 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21634.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21634.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21634",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.687",
- "lastModified": "2021-04-02T16:16:54.697",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:47.873",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21635.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21635.json
index 4379818ccc0..9ea8ae94a2f 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21635.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21635.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21635",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.767",
- "lastModified": "2021-04-05T18:01:58.607",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:47.963",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21636.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21636.json
index 4916b45743b..59b8cb29973 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21636.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21636.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21636",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.843",
- "lastModified": "2021-04-05T18:39:00.167",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:48.093",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21637.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21637.json
index 516c99c0aa8..a61ad95d786 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21637.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21637.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21637",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.907",
- "lastModified": "2021-04-05T18:43:14.497",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:48.193",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21638.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21638.json
index e49eb4b77f9..0113a94f746 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21638.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21638.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21638",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-03-30T12:16:10.987",
- "lastModified": "2021-04-02T20:59:22.890",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:48.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2283%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21639.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21639.json
index 3dc081b480f..451803eff80 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21639.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21639.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21639",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-04-07T14:15:16.890",
- "lastModified": "2021-04-13T18:16:14.217",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:48.380",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-20"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21640.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21640.json
index 3b6f4aab812..b42ad8d800c 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21640.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21640.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21640",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-04-07T14:15:17.017",
- "lastModified": "2021-04-13T18:00:15.817",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:48.480",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-240"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21641.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21641.json
index 662012dbb9e..1fd187b5700 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21641.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21641.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21641",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-04-07T14:15:17.093",
- "lastModified": "2021-04-13T03:17:12.097",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:48.573",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21642.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21642.json
index ee577fa8a32..f9d97c95420 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21642.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21642.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21642",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-04-21T15:15:08.287",
- "lastModified": "2021-04-23T19:46:57.893",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:48.677",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21643.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21643.json
index 2cb702bce45..4ca7c4abb55 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21643.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21643.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21643",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-04-21T15:15:08.340",
- "lastModified": "2021-04-24T03:47:43.517",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:48.810",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21644.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21644.json
index 766a4fa1ce9..f26e5167bb6 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21644.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21644.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21644",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-04-21T15:15:08.373",
- "lastModified": "2021-04-26T19:59:33.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:48.910",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21645.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21645.json
index 345eb80170a..81750885f74 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21645.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21645.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21645",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-04-21T15:15:08.407",
- "lastModified": "2021-04-26T20:00:27.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.003",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21646.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21646.json
index 523b0ffbdd4..f2ba12e2599 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21646.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21646.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21646",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-04-21T15:15:08.440",
- "lastModified": "2021-04-26T18:12:26.070",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.080",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21647.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21647.json
index bd527623aa7..cd991e25d88 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21647.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21647.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21647",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-04-21T15:15:08.477",
- "lastModified": "2021-04-26T18:06:19.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.153",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21648.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21648.json
index 5e080fecdeb..198b47dc3ef 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21648.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21648.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21648",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-11T15:15:07.873",
- "lastModified": "2021-05-14T21:39:52.740",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21649.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21649.json
index 6bda4096c4d..1160c691c69 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21649.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21649.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21649",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-11T15:15:07.917",
- "lastModified": "2021-05-14T21:40:22.630",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.473",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21650.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21650.json
index f2cf26a46b1..c2e1ae62b5d 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21650.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21650.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21650",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-11T15:15:07.953",
- "lastModified": "2021-05-19T13:24:28.963",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.620",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21651.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21651.json
index 28a805c608c..644d6b68de8 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21651.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21651.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21651",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-11T15:15:07.993",
- "lastModified": "2021-05-19T12:26:15.283",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.687",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21652.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21652.json
index 33df1d92bce..0a2554de9a9 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21652.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21652.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21652",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-11T15:15:08.030",
- "lastModified": "2023-01-30T19:18:25.510",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.753",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -95,11 +83,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21653.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21653.json
index 0a43de5faa7..e26bb003cf2 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21653.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21653.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21653",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-11T15:15:08.070",
- "lastModified": "2021-05-19T18:01:49.933",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.830",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -95,11 +83,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21654.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21654.json
index 52bf59701aa..1233e74b6c0 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21654.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21654.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21654",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-11T15:15:08.110",
- "lastModified": "2021-05-19T15:15:43.413",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.907",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21655.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21655.json
index d47021a8a77..1bdb5bdd573 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21655.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21655.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21655",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-11T15:15:08.147",
- "lastModified": "2021-05-20T13:56:33.673",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:49.970",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21656.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21656.json
index ded6a9107e1..91b53acbb5f 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21656.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21656.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21656",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-11T15:15:08.183",
- "lastModified": "2021-05-19T15:48:21.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.037",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21657.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21657.json
index 1971492c46e..55eb4c9a9c0 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21657.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21657.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21657",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-25T17:15:08.037",
- "lastModified": "2021-06-01T18:16:50.203",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.100",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21658.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21658.json
index 314e51dfb42..3fbabc49abf 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21658.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21658.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21658",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-25T17:15:08.073",
- "lastModified": "2021-06-01T14:32:00.243",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.183",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21659.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21659.json
index c521728ba2d..cb4939a4dda 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21659.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21659.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21659",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-25T17:15:08.110",
- "lastModified": "2021-05-28T21:26:29.663",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.250",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21660.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21660.json
index 25ad72b669c..85675b16dfd 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21660.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21660.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21660",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-05-25T17:15:08.150",
- "lastModified": "2021-06-01T12:18:22.893",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.313",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21661.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21661.json
index 37e635b0b84..283449960a2 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21661.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21661.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21661",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-10T15:15:08.693",
- "lastModified": "2021-06-15T16:18:31.287",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21662.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21662.json
index 1f09bb7c97e..17e58f7fd4e 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21662.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21662.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21662",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-10T15:15:08.767",
- "lastModified": "2021-06-15T18:24:37.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.467",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21663.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21663.json
index 71236e830ed..e8c6cb5cdfa 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21663.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21663.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21663",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-10T15:15:08.837",
- "lastModified": "2021-06-15T18:25:23.753",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.530",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21664.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21664.json
index e790b374f19..0aa0eac665a 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21664.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21664.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21664",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-10T15:15:08.907",
- "lastModified": "2021-06-15T18:00:03.840",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.597",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21665.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21665.json
index 5a1f830747a..af60faaa291 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21665.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21665.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21665",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-10T15:15:08.977",
- "lastModified": "2021-06-15T18:01:53.950",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.660",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21666.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21666.json
index c4f5bc692b4..701a16b863d 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21666.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21666.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21666",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-10T15:15:09.057",
- "lastModified": "2021-06-15T17:20:15.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.727",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21667.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21667.json
index ff7b35b4ef0..de74a2882ca 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21667.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21667.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21667",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-16T14:15:08.523",
- "lastModified": "2021-06-22T14:06:49.297",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.790",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21668.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21668.json
index 9b1cfcb7e2c..528db42f55b 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21668.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21668.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21668",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-16T14:15:08.610",
- "lastModified": "2021-06-22T14:08:54.317",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.867",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21669.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21669.json
index 7786e63f4a9..12731151b21 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21669.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21669.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21669",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-18T10:15:08.557",
- "lastModified": "2021-06-22T17:33:15.843",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.927",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21670.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21670.json
index bf5ef47adeb..fa2dda4aec5 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21670.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21670.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21670",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-30T17:15:08.900",
- "lastModified": "2021-07-06T14:02:57.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:50.993",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21671.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21671.json
index decf4b36644..ad86e03bdff 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21671.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21671.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21671",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-30T17:15:08.987",
- "lastModified": "2021-07-06T14:01:01.810",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.073",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-384"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21672.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21672.json
index 5b327184c44..771570c9bf3 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21672.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21672.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21672",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-30T17:15:09.067",
- "lastModified": "2022-06-01T20:43:02.050",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.140",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21673.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21673.json
index da77050fc1d..83abdc19ec6 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21673.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21673.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21673",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-30T17:15:09.160",
- "lastModified": "2021-07-06T17:07:47.470",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.203",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-601"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21674.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21674.json
index 376370a55f0..3909916d25d 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21674.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21674.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21674",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-30T17:15:09.240",
- "lastModified": "2021-07-07T10:59:38.760",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21675.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21675.json
index 989404ed89e..cda0c5f97ee 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21675.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21675.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21675",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-30T17:15:09.317",
- "lastModified": "2021-07-06T17:25:11.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.337",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -103,11 +91,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2136%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2136%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21676.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21676.json
index 1bbf400b910..1d0753822b7 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21676.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21676.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21676",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-30T17:15:09.400",
- "lastModified": "2021-07-07T11:00:49.187",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.423",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2136%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2136%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21677.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21677.json
index a21da1a47c9..27514f11a06 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21677.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21677.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21677",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-08-31T14:15:25.447",
- "lastModified": "2021-09-08T15:30:19.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.493",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21678.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21678.json
index 01b601eb6f0..8244e067aa4 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21678.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21678.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21678",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-08-31T14:15:25.500",
- "lastModified": "2022-10-25T18:01:24.780",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.577",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21679.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21679.json
index c825b379e49..40261d9612d 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21679.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21679.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21679",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-08-31T14:15:25.553",
- "lastModified": "2022-10-25T18:02:47.170",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.640",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21680.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21680.json
index 21c77e9de3f..36b84969bc5 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21680.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21680.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21680",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-08-31T14:15:25.607",
- "lastModified": "2021-09-07T19:00:40.467",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.703",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21681.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21681.json
index ba0b69bafcb..d29dfad9b82 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21681.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21681.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21681",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-08-31T14:15:25.663",
- "lastModified": "2022-04-25T17:25:37.380",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.773",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21682.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21682.json
index ad16e410661..3b6914c3d6d 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21682.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21682.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21682",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-10-06T23:15:06.860",
- "lastModified": "2021-10-19T18:52:31.907",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.837",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-42"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21683.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21683.json
index 2aeae4b4762..cbdf1bf6f1a 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21683.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21683.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21683",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-10-06T23:15:06.927",
- "lastModified": "2021-10-19T18:58:12.973",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.927",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
- }
- ],
"configurations": [
{
"operator": "AND",
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21684.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21684.json
index 721fcf2b1de..fba53a8255b 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21684.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21684.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21684",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-10-06T23:15:06.977",
- "lastModified": "2022-10-25T15:26:57.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:51.997",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-116"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21685.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21685.json
index 7f333381ecb..d791642979b 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21685.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21685.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21685",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:07.710",
- "lastModified": "2021-11-08T13:59:09.327",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.083",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21686.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21686.json
index a431fdbb22c..12cf153cc60 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21686.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21686.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21686",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.277",
- "lastModified": "2021-11-08T14:38:53.720",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.177",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-59"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21687.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21687.json
index b488b77a16f..4a9d7fc7747 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21687.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21687.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21687",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.390",
- "lastModified": "2021-11-08T16:47:05.250",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.253",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21688.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21688.json
index 7b0596530b3..c589dad4cfc 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21688.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21688.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21688",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.447",
- "lastModified": "2021-11-05T19:20:09.340",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.333",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21689.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21689.json
index 56e2233c4fc..0ab428b89aa 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21689.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21689.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21689",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.500",
- "lastModified": "2022-10-24T16:06:45.763",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.407",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21690.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21690.json
index 4db9679009c..b8ae3d88338 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21690.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21690.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21690",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.553",
- "lastModified": "2021-11-09T15:20:43.307",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.477",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21691.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21691.json
index a4f1ab4f445..0e1091ce7ae 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21691.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21691.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21691",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.607",
- "lastModified": "2021-11-09T19:35:13.020",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.560",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21692.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21692.json
index 379ba2d9c78..c04dc7e47c8 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21692.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21692.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21692",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.660",
- "lastModified": "2021-11-09T19:30:50.273",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.623",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21693.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21693.json
index 65e8f4db952..d78985ea4f6 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21693.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21693.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21693",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.717",
- "lastModified": "2022-12-07T17:08:55.930",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21694.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21694.json
index 6b5e612fd36..a451defc593 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21694.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21694.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21694",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.767",
- "lastModified": "2021-11-09T19:08:43.403",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.783",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21695.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21695.json
index 24b48603e4d..1ebc9555183 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21695.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21695.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21695",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.820",
- "lastModified": "2022-10-24T16:07:08.163",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.867",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-59"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21696.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21696.json
index 6c7206a201f..beb8b2efd1b 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21696.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21696.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21696",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.873",
- "lastModified": "2021-11-08T17:33:05.410",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:52.933",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21697.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21697.json
index 410d2b6e2bd..78ca24adb75 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21697.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21697.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21697",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.927",
- "lastModified": "2021-11-08T17:36:20.117",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.007",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-184"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21698.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21698.json
index c8ce443fdd3..ae0928dad4f 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21698.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21698.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21698",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.987",
- "lastModified": "2021-11-08T17:44:26.197",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.110",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21699.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21699.json
index 694fbaef56a..479031a8a01 100644
--- a/CVE-2021/CVE-2021-216xx/CVE-2021-21699.json
+++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21699.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21699",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-12T11:15:08.007",
- "lastModified": "2021-11-17T01:25:52.817",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.193",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-217xx/CVE-2021-21700.json b/CVE-2021/CVE-2021-217xx/CVE-2021-21700.json
index 7f3633269ad..a2a3b7e8151 100644
--- a/CVE-2021/CVE-2021-217xx/CVE-2021-21700.json
+++ b/CVE-2021/CVE-2021-217xx/CVE-2021-21700.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21700",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-12T11:15:08.113",
- "lastModified": "2021-11-17T01:25:25.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.287",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-217xx/CVE-2021-21701.json b/CVE-2021/CVE-2021-217xx/CVE-2021-21701.json
index 40d45ae49b1..0e087d8e6ee 100644
--- a/CVE-2021/CVE-2021-217xx/CVE-2021-21701.json
+++ b/CVE-2021/CVE-2021-217xx/CVE-2021-21701.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-21701",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-12T11:15:08.167",
- "lastModified": "2021-11-17T01:18:10.560",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.360",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-23xx/CVE-2021-2351.json b/CVE-2021/CVE-2021-23xx/CVE-2021-2351.json
index 327370f9909..edca7c95a18 100644
--- a/CVE-2021/CVE-2021-23xx/CVE-2021-2351.json
+++ b/CVE-2021/CVE-2021-23xx/CVE-2021-2351.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-2351",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2021-07-21T15:15:21.827",
- "lastModified": "2022-10-06T18:22:41.560",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:10.477",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -90,7 +90,11 @@
"description": [
{
"lang": "en",
- "value": "NVD-CWE-noinfo"
+ "value": "CWE-327"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-384"
}
]
}
@@ -1472,6 +1476,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://www.oracle.com/security-alerts/cpujan2023.html",
+ "source": "secalert_us@oracle.com"
+ },
{
"url": "https://www.oracle.com/security-alerts/cpujul2021.html",
"source": "secalert_us@oracle.com",
diff --git a/CVE-2021/CVE-2021-243xx/CVE-2021-24370.json b/CVE-2021/CVE-2021-243xx/CVE-2021-24370.json
index 1b5f2297751..acf4f448667 100644
--- a/CVE-2021/CVE-2021-243xx/CVE-2021-24370.json
+++ b/CVE-2021/CVE-2021-243xx/CVE-2021-24370.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-24370",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-06-21T20:15:08.727",
- "lastModified": "2021-09-20T17:10:10.107",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T01:15:25.467",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -65,7 +65,7 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
@@ -75,7 +75,7 @@
]
},
{
- "source": "contact@wpscan.com",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@@ -130,6 +130,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.secpod.com/blog/critical-zero-day-flaw-actively-exploited-in-wordpress-fancy-product-designer-plugin/",
+ "source": "contact@wpscan.com"
+ },
{
"url": "https://www.wordfence.com/blog/2021/06/critical-0-day-in-fancy-product-designer-under-active-attack/",
"source": "contact@wpscan.com",
diff --git a/CVE-2021/CVE-2021-267xx/CVE-2021-26734.json b/CVE-2021/CVE-2021-267xx/CVE-2021-26734.json
new file mode 100644
index 00000000000..a9707f939d9
--- /dev/null
+++ b/CVE-2021/CVE-2021-267xx/CVE-2021-26734.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2021-26734",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:08.927",
+ "lastModified": "2023-10-27T00:30:43.053",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El instalador de Zscaler Client Connector en Windows anterior a la versi\u00f3n 3.4.0.124 manejaba incorrectamente las uniones de directorios durante la desinstalaci\u00f3n. Un adversario local puede eliminar carpetas en un contexto elevado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "3.4.0.124",
+ "matchCriteriaId": "8318DD99-D4B2-4917-AAB3-56D65DE97B57"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-267xx/CVE-2021-26735.json b/CVE-2021/CVE-2021-267xx/CVE-2021-26735.json
new file mode 100644
index 00000000000..fe4c5fb445b
--- /dev/null
+++ b/CVE-2021/CVE-2021-267xx/CVE-2021-26735.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2021-26735",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.000",
+ "lastModified": "2023-10-27T00:30:49.677",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Zscaler Client Connector Installer and Unsintallers for Windows prior to 3.6 had an unquoted search path vulnerability. A local adversary may be able to execute code with SYSTEM privileges.\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Zscaler Client Connector Installer and Unsintallers para Windows anteriores a 3.6 ten\u00edan una vulnerabilidad de ruta de b\u00fasqueda sin comillas. Un adversario local puede ejecutar c\u00f3digo con privilegios de SYSTEM."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-428"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-346"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "3.6",
+ "matchCriteriaId": "B3A7E628-F74C-46BC-A5E5-25402F2B90D8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-267xx/CVE-2021-26736.json b/CVE-2021/CVE-2021-267xx/CVE-2021-26736.json
new file mode 100644
index 00000000000..fa502a3de63
--- /dev/null
+++ b/CVE-2021/CVE-2021-267xx/CVE-2021-26736.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2021-26736",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.063",
+ "lastModified": "2023-10-27T00:33:29.907",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows prior to 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "M\u00faltiples vulnerabilidades en Zscaler Client Connector Installer and Uninstaller para Windows anteriores a 3.6 permit\u00edan la ejecuci\u00f3n de archivos binarios desde una ruta con pocos privilegios. Un adversario local puede ejecutar c\u00f3digo con privilegios de SYSTEM."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "3.6",
+ "matchCriteriaId": "B3A7E628-F74C-46BC-A5E5-25402F2B90D8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-267xx/CVE-2021-26737.json b/CVE-2021/CVE-2021-267xx/CVE-2021-26737.json
new file mode 100644
index 00000000000..ae2937b6ee2
--- /dev/null
+++ b/CVE-2021/CVE-2021-267xx/CVE-2021-26737.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2021-26737",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.127",
+ "lastModified": "2023-10-27T00:33:45.490",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Zscaler Client Connector para macOS anterior a 3.6 no validaba suficientemente los clientes RPC. Un adversario local sin privilegios suficientes podr\u00eda cerrar el t\u00fanel Zscaler aprovechando una condici\u00f3n de ejecuci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 3.6
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-346"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-346"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*",
+ "versionEndExcluding": "3.6",
+ "matchCriteriaId": "87D5E96F-6D38-4787-8E26-589C0EABDFFF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS&applicable_version=3.6&deployment_date=2022-01-07&id=1388686",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-267xx/CVE-2021-26738.json b/CVE-2021/CVE-2021-267xx/CVE-2021-26738.json
new file mode 100644
index 00000000000..13bef829f6a
--- /dev/null
+++ b/CVE-2021/CVE-2021-267xx/CVE-2021-26738.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2021-26738",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.187",
+ "lastModified": "2023-10-27T00:33:51.687",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Zscaler Client Connector for macOS prior to 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Zscaler Client Connector para macOS anterior a 3.7 ten\u00eda una vulnerabilidad de ruta de b\u00fasqueda sin comillas a trav\u00e9s de la variable PATH. Un adversario local puede ejecutar c\u00f3digo con privilegios de root."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-426"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-426"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*",
+ "versionEndExcluding": "3.7",
+ "matchCriteriaId": "42F3A99E-0E82-49F1-88D5-9397220A0A1A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS&applicable_version=3.7&deployment_date=2022-08-19&id=1414851",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-284xx/CVE-2021-28485.json b/CVE-2021/CVE-2021-284xx/CVE-2021-28485.json
index 9c5521c4601..eaffa3cece7 100644
--- a/CVE-2021/CVE-2021-284xx/CVE-2021-28485.json
+++ b/CVE-2021/CVE-2021-284xx/CVE-2021-28485.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-28485",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-14T15:15:07.827",
- "lastModified": "2023-09-21T12:51:08.870",
+ "lastModified": "2023-10-25T20:13:17.420",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -21,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
- "confidentialityImpact": "HIGH",
+ "confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
- "baseScore": 6.5,
+ "baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
- "impactScore": 3.6
+ "impactScore": 1.4
}
]
},
diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28651.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28651.json
index bed5d870bda..daf2620c265 100644
--- a/CVE-2021/CVE-2021-286xx/CVE-2021-28651.json
+++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28651.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-28651",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T12:15:08.197",
- "lastModified": "2023-10-17T05:15:49.187",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-24T14:43:32.560",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -159,11 +159,19 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bugs.squid-cache.org/show_bug.cgi?id=5104",
diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28652.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28652.json
index 58201445aa8..4d130c07f56 100644
--- a/CVE-2021/CVE-2021-286xx/CVE-2021-28652.json
+++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28652.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-28652",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T12:15:08.230",
- "lastModified": "2023-10-17T05:15:49.470",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-24T14:46:43.467",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -144,11 +144,19 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bugs.squid-cache.org/show_bug.cgi?id=5106",
diff --git a/CVE-2021/CVE-2021-286xx/CVE-2021-28662.json b/CVE-2021/CVE-2021-286xx/CVE-2021-28662.json
index 9ff979013d3..db8ec278842 100644
--- a/CVE-2021/CVE-2021-286xx/CVE-2021-28662.json
+++ b/CVE-2021/CVE-2021-286xx/CVE-2021-28662.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-28662",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T12:15:08.263",
- "lastModified": "2023-10-17T05:15:49.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-24T14:34:35.160",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -139,11 +139,19 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.squid-cache.org/Versions/v6/changesets/squid-6-051824924c709bd6162a378f746fb859454c674e.patch",
diff --git a/CVE-2021/CVE-2021-299xx/CVE-2021-29913.json b/CVE-2021/CVE-2021-299xx/CVE-2021-29913.json
index 6bf2118021a..82952da5f0b 100644
--- a/CVE-2021/CVE-2021-299xx/CVE-2021-29913.json
+++ b/CVE-2021/CVE-2021-299xx/CVE-2021-29913.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-29913",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T02:15:09.910",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T17:59:20.763",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 4.2
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/207898",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-301xx/CVE-2021-30116.json b/CVE-2021/CVE-2021-301xx/CVE-2021-30116.json
index 027f9ed2fbb..9500fef90ea 100644
--- a/CVE-2021/CVE-2021-301xx/CVE-2021-30116.json
+++ b/CVE-2021/CVE-2021-301xx/CVE-2021-30116.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-30116",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-07-09T14:15:07.770",
- "lastModified": "2022-07-12T17:42:04.277",
+ "lastModified": "2023-10-23T14:15:09.250",
"vulnStatus": "Modified",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2021-11-17",
"cisaRequiredAction": "Apply updates per vendor instructions.",
- "cisaVulnerabilityName": "Kaseya VSA Remote Code Execution Vulnerability",
+ "cisaVulnerabilityName": "Kaseya Virtual System/Server Administrator (VSA) Information Disclosure Vulnerability",
"descriptions": [
{
"lang": "en",
@@ -94,7 +94,7 @@
"description": [
{
"lang": "en",
- "value": "NVD-CWE-noinfo"
+ "value": "CWE-522"
}
]
}
@@ -144,6 +144,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://www.secpod.com/blog/kaseya-vsa-zero-day-by-revil/",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-318xx/CVE-2021-31806.json b/CVE-2021/CVE-2021-318xx/CVE-2021-31806.json
index aca99dd8240..0e2c4418d84 100644
--- a/CVE-2021/CVE-2021-318xx/CVE-2021-31806.json
+++ b/CVE-2021/CVE-2021-318xx/CVE-2021-31806.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-31806",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T13:15:08.270",
- "lastModified": "2023-10-17T05:15:49.683",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-24T14:36:29.477",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -158,11 +158,19 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
diff --git a/CVE-2021/CVE-2021-318xx/CVE-2021-31807.json b/CVE-2021/CVE-2021-318xx/CVE-2021-31807.json
index 7a20498133b..b43f9f2ab3f 100644
--- a/CVE-2021/CVE-2021-318xx/CVE-2021-31807.json
+++ b/CVE-2021/CVE-2021-318xx/CVE-2021-31807.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-31807",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-08T20:15:09.057",
- "lastModified": "2023-10-17T05:15:49.790",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-24T15:00:49.823",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -254,11 +254,19 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
diff --git a/CVE-2021/CVE-2021-318xx/CVE-2021-31808.json b/CVE-2021/CVE-2021-318xx/CVE-2021-31808.json
index 4148543047d..3f8a8e7da7c 100644
--- a/CVE-2021/CVE-2021-318xx/CVE-2021-31808.json
+++ b/CVE-2021/CVE-2021-318xx/CVE-2021-31808.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-31808",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-27T14:15:07.500",
- "lastModified": "2023-10-17T05:15:49.943",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-24T14:39:44.803",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -158,11 +158,19 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-e7cf864f938f24eea8af0692c04d16790983c823.patch",
diff --git a/CVE-2021/CVE-2021-327xx/CVE-2021-32749.json b/CVE-2021/CVE-2021-327xx/CVE-2021-32749.json
index ad418e2e726..113d9dca956 100644
--- a/CVE-2021/CVE-2021-327xx/CVE-2021-32749.json
+++ b/CVE-2021/CVE-2021-327xx/CVE-2021-32749.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-32749",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-07-16T18:15:08.270",
- "lastModified": "2021-11-28T23:18:14.820",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-19T08:15:07.893",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -85,22 +85,22 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "CWE-78"
+ "value": "CWE-94"
}
]
},
{
- "source": "nvd@nist.gov",
+ "source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-94"
+ "value": "CWE-78"
}
]
}
@@ -198,6 +198,10 @@
"Mailing List",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://security.gentoo.org/glsa/202310-13",
+ "source": "security-advisories@github.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-336xx/CVE-2021-33620.json b/CVE-2021/CVE-2021-336xx/CVE-2021-33620.json
index c4ea72ca0d9..cd8c6a7f4dd 100644
--- a/CVE-2021/CVE-2021-336xx/CVE-2021-33620.json
+++ b/CVE-2021/CVE-2021-336xx/CVE-2021-33620.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-33620",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-28T12:15:07.697",
- "lastModified": "2023-10-17T05:15:50.050",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-24T14:52:13.753",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -158,11 +158,19 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/14",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/3",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.squid-cache.org/Versions/v4/changesets/squid-4-1e05a85bd28c22c9ca5d3ac9f5e86d6269ec0a8c.patch",
diff --git a/CVE-2021/CVE-2021-336xx/CVE-2021-33634.json b/CVE-2021/CVE-2021-336xx/CVE-2021-33634.json
new file mode 100644
index 00000000000..d1021ba3f25
--- /dev/null
+++ b/CVE-2021/CVE-2021-336xx/CVE-2021-33634.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2021-33634",
+ "sourceIdentifier": "securities@openeuler.org",
+ "published": "2023-10-29T08:15:20.567",
+ "lastModified": "2023-10-29T08:15:20.567",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "iSulad uses the lcr+lxc runtime (default) to run malicious images, which can cause DOS.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "securities@openeuler.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "securities@openeuler.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-665"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://gitee.com/src-openeuler/lcr/pulls/251/files",
+ "source": "securities@openeuler.org"
+ },
+ {
+ "url": "https://gitee.com/src-openeuler/lcr/pulls/257/files",
+ "source": "securities@openeuler.org"
+ },
+ {
+ "url": "https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1692",
+ "source": "securities@openeuler.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-336xx/CVE-2021-33635.json b/CVE-2021/CVE-2021-336xx/CVE-2021-33635.json
new file mode 100644
index 00000000000..9b7f96b8e44
--- /dev/null
+++ b/CVE-2021/CVE-2021-336xx/CVE-2021-33635.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2021-33635",
+ "sourceIdentifier": "securities@openeuler.org",
+ "published": "2023-10-29T08:15:20.647",
+ "lastModified": "2023-10-29T08:15:20.647",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "When malicious images are pulled by isula pull, attackers can execute arbitrary code."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "securities@openeuler.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "securities@openeuler.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-665"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://gitee.com/src-openeuler/iSulad/pulls/600/files",
+ "source": "securities@openeuler.org"
+ },
+ {
+ "url": "https://gitee.com/src-openeuler/iSulad/pulls/627/files",
+ "source": "securities@openeuler.org"
+ },
+ {
+ "url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1686",
+ "source": "securities@openeuler.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-336xx/CVE-2021-33636.json b/CVE-2021/CVE-2021-336xx/CVE-2021-33636.json
new file mode 100644
index 00000000000..26fc8bc2f04
--- /dev/null
+++ b/CVE-2021/CVE-2021-336xx/CVE-2021-33636.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2021-33636",
+ "sourceIdentifier": "securities@openeuler.org",
+ "published": "2023-10-29T08:15:20.707",
+ "lastModified": "2023-10-29T08:15:20.707",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nWhen the isula load command is used to load malicious images, attackers can execute arbitrary code.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "securities@openeuler.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "securities@openeuler.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-665"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://gitee.com/src-openeuler/iSulad/pulls/600/files",
+ "source": "securities@openeuler.org"
+ },
+ {
+ "url": "https://gitee.com/src-openeuler/iSulad/pulls/627/files",
+ "source": "securities@openeuler.org"
+ },
+ {
+ "url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1686",
+ "source": "securities@openeuler.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-336xx/CVE-2021-33637.json b/CVE-2021/CVE-2021-336xx/CVE-2021-33637.json
new file mode 100644
index 00000000000..a8305964cf2
--- /dev/null
+++ b/CVE-2021/CVE-2021-336xx/CVE-2021-33637.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2021-33637",
+ "sourceIdentifier": "securities@openeuler.org",
+ "published": "2023-10-29T08:15:20.763",
+ "lastModified": "2023-10-29T08:15:20.763",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nWhen the isula export command is used to export a container to an image and the container is controlled by an attacker, the attacker can escape the container.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "securities@openeuler.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "securities@openeuler.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-665"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://gitee.com/src-openeuler/iSulad/pulls/600/files",
+ "source": "securities@openeuler.org"
+ },
+ {
+ "url": "https://gitee.com/src-openeuler/iSulad/pulls/627/files",
+ "source": "securities@openeuler.org"
+ },
+ {
+ "url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1686",
+ "source": "securities@openeuler.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-336xx/CVE-2021-33638.json b/CVE-2021/CVE-2021-336xx/CVE-2021-33638.json
new file mode 100644
index 00000000000..f33740e3826
--- /dev/null
+++ b/CVE-2021/CVE-2021-336xx/CVE-2021-33638.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2021-33638",
+ "sourceIdentifier": "securities@openeuler.org",
+ "published": "2023-10-29T08:15:20.823",
+ "lastModified": "2023-10-29T08:15:20.823",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nWhen the isula cp command is used to copy files from a container to a host machine and the container is controlled by an attacker, the attacker can escape the container.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "securities@openeuler.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "securities@openeuler.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-665"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://gitee.com/src-openeuler/iSulad/pulls/600/files",
+ "source": "securities@openeuler.org"
+ },
+ {
+ "url": "https://gitee.com/src-openeuler/iSulad/pulls/627/files",
+ "source": "securities@openeuler.org"
+ },
+ {
+ "url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2023-1686",
+ "source": "securities@openeuler.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-359xx/CVE-2021-35991.json b/CVE-2021/CVE-2021-359xx/CVE-2021-35991.json
index 94c2a91ac5f..c0b312fb38a 100644
--- a/CVE-2021/CVE-2021-359xx/CVE-2021-35991.json
+++ b/CVE-2021/CVE-2021-359xx/CVE-2021-35991.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-35991",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-08-20T19:15:10.263",
- "lastModified": "2023-07-07T19:25:15.007",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.437",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Adobe Bridge version 11.0.2 (and earlier) is affected by an uninitialized variable vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ "value": "Adobe Bridge version 11.0.2 (and earlier) is affected by an Access of Uninitialized Pointer vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
@@ -65,22 +65,22 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "CWE-908"
+ "value": "CWE-824"
}
]
},
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "CWE-908"
}
]
}
diff --git a/CVE-2021/CVE-2021-35xx/CVE-2021-3524.json b/CVE-2021/CVE-2021-35xx/CVE-2021-3524.json
index 20f8198df24..6d28c7237e1 100644
--- a/CVE-2021/CVE-2021-35xx/CVE-2021-3524.json
+++ b/CVE-2021/CVE-2021-35xx/CVE-2021-3524.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-3524",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-05-17T17:15:08.773",
- "lastModified": "2022-10-27T12:38:51.343",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:10.660",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -166,6 +166,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX5ZHI5L7FOHXOSEV3TYBAL66DMLJ7V5/",
"source": "secalert@redhat.com",
diff --git a/CVE-2021/CVE-2021-35xx/CVE-2021-3531.json b/CVE-2021/CVE-2021-35xx/CVE-2021-3531.json
index 1c64246675b..8ad3291b603 100644
--- a/CVE-2021/CVE-2021-35xx/CVE-2021-3531.json
+++ b/CVE-2021/CVE-2021-35xx/CVE-2021-3531.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-3531",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-05-18T12:15:08.080",
- "lastModified": "2022-10-27T12:38:40.087",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:10.757",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -161,6 +161,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX5ZHI5L7FOHXOSEV3TYBAL66DMLJ7V5/",
"source": "secalert@redhat.com",
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36045.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36045.json
index 5f8e5cae562..b1a808c8a0b 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36045.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36045.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36045",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:10.417",
- "lastModified": "2023-09-26T01:15:46.750",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:50:15.037",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.3,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 1.4
}
],
"cvssMetricV2": [
@@ -91,6 +111,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -104,7 +139,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36046.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36046.json
index f5b8672829f..5662e9ed143 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36046.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36046.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36046",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:10.473",
- "lastModified": "2023-09-26T01:15:46.870",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:46:52.567",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -65,22 +85,22 @@
},
"weaknesses": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "CWE-788"
+ "value": "CWE-787"
}
]
},
{
- "source": "nvd@nist.gov",
+ "source": "psirt@adobe.com",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-787"
+ "value": "CWE-788"
}
]
}
@@ -101,6 +121,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -114,7 +149,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36047.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36047.json
index 1f56f1f6705..41e069a8e42 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36047.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36047.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36047",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:10.530",
- "lastModified": "2023-09-26T01:15:46.973",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:47:48.550",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -91,6 +111,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -104,7 +139,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36048.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36048.json
index 3f81275ea1b..47dca1761e9 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36048.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36048.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36048",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:10.590",
- "lastModified": "2023-09-26T01:15:47.067",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:48:27.930",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -91,6 +111,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -104,7 +139,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36050.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36050.json
index e4ecec4e665..1f3b18016c0 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36050.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36050.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36050",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:10.707",
- "lastModified": "2023-09-26T01:15:47.833",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:51:01.250",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -65,8 +85,18 @@
},
"weaknesses": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -91,6 +121,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -104,7 +149,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36051.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36051.json
index 7cf55894e6b..4c71ab27e69 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36051.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36051.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36051",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-10-04T14:15:07.333",
- "lastModified": "2023-09-26T01:15:48.450",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:40:14.177",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -115,8 +115,23 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*",
- "versionEndExcluding": "2021.07",
- "matchCriteriaId": "DAADC477-7FFD-4620-84A0-1816F918132F"
+ "versionEndIncluding": "2020.1",
+ "matchCriteriaId": "021E6279-3B11-4D53-B76E-C302A18724E6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@@ -128,12 +143,17 @@
"url": "https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html",
"source": "psirt@adobe.com",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36052.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36052.json
index 27c27622339..b4fdd926c5b 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36052.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36052.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36052",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:10.767",
- "lastModified": "2023-09-26T01:15:48.997",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:51:16.713",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -121,6 +121,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -134,7 +149,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36053.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36053.json
index 0274f65b046..3e69b3acd4d 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36053.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36053.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36053",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:10.827",
- "lastModified": "2023-09-26T01:15:49.500",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:51:47.677",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.3,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 1.4
}
],
"cvssMetricV2": [
@@ -101,6 +121,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -114,7 +149,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36054.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36054.json
index 58c8266b9b5..8d393a82853 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36054.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36054.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36054",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:10.883",
- "lastModified": "2023-09-26T01:15:49.633",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:52:08.853",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -85,8 +85,18 @@
},
"weaknesses": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -111,6 +121,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -124,7 +149,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36055.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36055.json
index 29e2f60843e..4d401dec7d7 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36055.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36055.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36055",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:10.940",
- "lastModified": "2023-09-26T01:15:49.727",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:52:29.037",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -91,6 +111,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -104,7 +139,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36058.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36058.json
index ca7b56f339d..e488c6a9471 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36058.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36058.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36058",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:11.120",
- "lastModified": "2023-09-26T01:15:49.987",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:30:33.967",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
}
],
"cvssMetricV2": [
@@ -91,6 +111,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -104,7 +139,10 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-360xx/CVE-2021-36064.json b/CVE-2021/CVE-2021-360xx/CVE-2021-36064.json
index 6095eec0b12..a60145ec3c0 100644
--- a/CVE-2021/CVE-2021-360xx/CVE-2021-36064.json
+++ b/CVE-2021/CVE-2021-360xx/CVE-2021-36064.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-36064",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:11.430",
- "lastModified": "2023-09-26T01:15:50.077",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:37:52.817",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -91,6 +111,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -104,7 +139,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-388xx/CVE-2021-38859.json b/CVE-2021/CVE-2021-388xx/CVE-2021-38859.json
index f8066eba450..ff6f8c838f0 100644
--- a/CVE-2021/CVE-2021-388xx/CVE-2021-38859.json
+++ b/CVE-2021/CVE-2021-388xx/CVE-2021-38859.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-38859",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T02:15:10.000",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T17:59:31.703",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/207899",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-390xx/CVE-2021-39077.json b/CVE-2021/CVE-2021-390xx/CVE-2021-39077.json
index c41f99e2a2d..6111b653973 100644
--- a/CVE-2021/CVE-2021-390xx/CVE-2021-39077.json
+++ b/CVE-2021/CVE-2021-390xx/CVE-2021-39077.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-39077",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2022-11-03T20:15:24.037",
- "lastModified": "2022-12-08T21:48:33.330",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T18:15:09.520",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "IBM Security Guardium 10.5, 10.6, 11.0, 11.1, 11.2, 11.3, and 11.4 stores user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 215587."
+ "value": "\nIBM Security Guardium 10.5, 10.6, 11.0, 11.1, 11.2, 11.3, and 11.4 stores user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 215587.\n\n?"
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-398xx/CVE-2021-39847.json b/CVE-2021/CVE-2021-398xx/CVE-2021-39847.json
index 40d8c99ca0c..2c6b4296d56 100644
--- a/CVE-2021/CVE-2021-398xx/CVE-2021-39847.json
+++ b/CVE-2021/CVE-2021-398xx/CVE-2021-39847.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-39847",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-01T15:15:12.827",
- "lastModified": "2023-09-26T01:15:50.173",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:33:12.167",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -91,6 +111,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -104,7 +139,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-39xx/CVE-2021-3979.json b/CVE-2021/CVE-2021-39xx/CVE-2021-3979.json
index 0909444c38b..e3efb2a6ff7 100644
--- a/CVE-2021/CVE-2021-39xx/CVE-2021-3979.json
+++ b/CVE-2021/CVE-2021-39xx/CVE-2021-3979.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-3979",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-08-25T20:15:09.473",
- "lastModified": "2023-07-11T20:21:32.900",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:10.850",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -62,7 +62,6 @@
],
"configurations": [
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -182,7 +181,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -235,6 +233,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPOK44BESMIFW6BIOGCN452AKKOIIT6Q/",
"source": "secalert@redhat.com",
diff --git a/CVE-2021/CVE-2021-407xx/CVE-2021-40716.json b/CVE-2021/CVE-2021-407xx/CVE-2021-40716.json
index 8a66a7afc75..e73a05239b2 100644
--- a/CVE-2021/CVE-2021-407xx/CVE-2021-40716.json
+++ b/CVE-2021/CVE-2021-407xx/CVE-2021-40716.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-40716",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-09-29T16:15:11.600",
- "lastModified": "2023-09-26T01:15:50.270",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:39:09.420",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -115,8 +115,23 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*",
- "versionEndExcluding": "2021.08",
- "matchCriteriaId": "C005B9A2-8AD8-45A2-B3F0-97478CEBF478"
+ "versionEndIncluding": "2021.07",
+ "matchCriteriaId": "A3EDDBF7-CFE9-4D16-86F6-ABC565470620"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@@ -133,7 +148,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-407xx/CVE-2021-40732.json b/CVE-2021/CVE-2021-407xx/CVE-2021-40732.json
index 891718d7b27..f5004b83a06 100644
--- a/CVE-2021/CVE-2021-407xx/CVE-2021-40732.json
+++ b/CVE-2021/CVE-2021-407xx/CVE-2021-40732.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-40732",
"sourceIdentifier": "psirt@adobe.com",
"published": "2021-10-13T17:15:07.603",
- "lastModified": "2023-09-26T01:15:50.393",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:41:04.883",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,6 +93,16 @@
"value": "CWE-476"
}
]
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
}
],
"configurations": [
@@ -105,8 +115,23 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "2021.07",
- "matchCriteriaId": "A3EDDBF7-CFE9-4D16-86F6-ABC565470620"
+ "versionEndIncluding": "2020.1",
+ "matchCriteriaId": "021E6279-3B11-4D53-B76E-C302A18724E6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@@ -124,7 +149,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-40xx/CVE-2021-4034.json b/CVE-2021/CVE-2021-40xx/CVE-2021-4034.json
index 39bc3e73d35..ecab8919f08 100644
--- a/CVE-2021/CVE-2021-40xx/CVE-2021-4034.json
+++ b/CVE-2021/CVE-2021-40xx/CVE-2021-4034.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4034",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-01-28T20:15:12.193",
- "lastModified": "2023-09-11T19:45:38.343",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T01:15:25.660",
+ "vulnStatus": "Modified",
"cisaExploitAdd": "2022-06-27",
"cisaActionDue": "2022-07-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@@ -15,7 +15,7 @@
},
{
"lang": "es",
- "value": "Se ha encontrado una vulnerabilidad de escalada de privilegios local en la utilidad pkexec de polkit. La aplicaci\u00f3n pkexec es una herramienta setuid dise\u00f1ada para permitir a usuarios no privilegiados ejecutar comandos como usuarios con privilegios seg\u00fan pol\u00edticas predefinidas. La versi\u00f3n actual de pkexec no maneja correctamente el recuento de par\u00e1metros de llamada y termina intentando ejecutar variables de entorno como comandos. Un atacante puede aprovechar esto al dise\u00f1ar variables de entorno de tal manera que induzcan a pkexec a ejecutar c\u00f3digo arbitrario. Cuando es ejecutado con \u00e9xito, el ataque puede causar una escalada de privilegios local, dando a usuarios no privilegiados derechos administrativos en la m\u00e1quina de destino"
+ "value": "Se encontr\u00f3 una vulnerabilidad de escalada de privilegios local en la utilidad pkexec de polkit. La aplicaci\u00f3n pkexec es una herramienta setuid dise\u00f1ada para permitir a usuarios sin privilegios ejecutar comandos como usuarios privilegiados de acuerdo con pol\u00edticas predefinidas. La versi\u00f3n actual de pkexec no maneja correctamente el recuento de par\u00e1metros de llamada y termina intentando ejecutar variables de entorno como comandos. Un atacante puede aprovechar esto creando variables de entorno de tal manera que induzcan a pkexec a ejecutar c\u00f3digo arbitrario. Cuando se ejecuta con \u00e9xito, el ataque puede provocar una escalada de privilegios locales otorgando a los usuarios sin privilegios derechos administrativos en la m\u00e1quina de destino."
}
],
"metrics": {
@@ -535,6 +535,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://www.starwindsoftware.com/security/sw-20220818-0001/",
"source": "secalert@redhat.com",
diff --git a/CVE-2021/CVE-2021-411xx/CVE-2021-41116.json b/CVE-2021/CVE-2021-411xx/CVE-2021-41116.json
index 495a71a4374..13e4da24907 100644
--- a/CVE-2021/CVE-2021-411xx/CVE-2021-41116.json
+++ b/CVE-2021/CVE-2021-411xx/CVE-2021-41116.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-41116",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-10-05T18:15:08.407",
- "lastModified": "2022-09-10T02:38:23.860",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.573",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -163,13 +163,8 @@
]
},
{
- "url": "https://www.tenable.com/security/tns-2022-09",
- "source": "security-advisories@github.com",
- "tags": [
- "Patch",
- "Release Notes",
- "Third Party Advisory"
- ]
+ "url": "https://www.sonarsource.com/blog/securing-developer-tools-package-managers/",
+ "source": "security-advisories@github.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-41xx/CVE-2021-4104.json b/CVE-2021/CVE-2021-41xx/CVE-2021-4104.json
index 4391757c6cc..9ad419ff50f 100644
--- a/CVE-2021/CVE-2021-41xx/CVE-2021-4104.json
+++ b/CVE-2021/CVE-2021-41xx/CVE-2021-4104.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4104",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-12-14T12:15:12.200",
- "lastModified": "2022-10-05T17:53:48.013",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T07:15:37.017",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -530,6 +530,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://security.gentoo.org/glsa/202310-16",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20211223-0007/",
"source": "secalert@redhat.com",
diff --git a/CVE-2021/CVE-2021-425xx/CVE-2021-42528.json b/CVE-2021/CVE-2021-425xx/CVE-2021-42528.json
index 05925e4c315..78a6012c1ce 100644
--- a/CVE-2021/CVE-2021-425xx/CVE-2021-42528.json
+++ b/CVE-2021/CVE-2021-425xx/CVE-2021-42528.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-42528",
"sourceIdentifier": "psirt@adobe.com",
"published": "2022-05-02T23:15:07.730",
- "lastModified": "2023-09-26T01:15:50.517",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:00:45.217",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
}
],
"cvssMetricV2": [
@@ -91,6 +111,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -103,7 +138,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-425xx/CVE-2021-42529.json b/CVE-2021/CVE-2021-425xx/CVE-2021-42529.json
index 8c81e308b05..1e153ae36ff 100644
--- a/CVE-2021/CVE-2021-425xx/CVE-2021-42529.json
+++ b/CVE-2021/CVE-2021-425xx/CVE-2021-42529.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-42529",
"sourceIdentifier": "psirt@adobe.com",
"published": "2022-05-02T23:15:07.803",
- "lastModified": "2023-09-26T01:15:52.687",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:43:57.760",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -101,6 +121,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -113,7 +148,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-425xx/CVE-2021-42530.json b/CVE-2021/CVE-2021-425xx/CVE-2021-42530.json
index 8d15a9209e5..4a4e3b53ddd 100644
--- a/CVE-2021/CVE-2021-425xx/CVE-2021-42530.json
+++ b/CVE-2021/CVE-2021-425xx/CVE-2021-42530.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-42530",
"sourceIdentifier": "psirt@adobe.com",
"published": "2022-05-02T23:15:07.867",
- "lastModified": "2023-09-26T01:15:54.537",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:47:01.727",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -121,6 +121,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -133,7 +148,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-425xx/CVE-2021-42531.json b/CVE-2021/CVE-2021-425xx/CVE-2021-42531.json
index ea0ef8ae2eb..bc2993e7836 100644
--- a/CVE-2021/CVE-2021-425xx/CVE-2021-42531.json
+++ b/CVE-2021/CVE-2021-425xx/CVE-2021-42531.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-42531",
"sourceIdentifier": "psirt@adobe.com",
"published": "2022-05-02T23:15:07.927",
- "lastModified": "2023-09-26T01:15:56.087",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:49:46.497",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -101,6 +121,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -113,7 +148,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-425xx/CVE-2021-42532.json b/CVE-2021/CVE-2021-425xx/CVE-2021-42532.json
index 0b1973ff6fa..1f8151bad5c 100644
--- a/CVE-2021/CVE-2021-425xx/CVE-2021-42532.json
+++ b/CVE-2021/CVE-2021-425xx/CVE-2021-42532.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-42532",
"sourceIdentifier": "psirt@adobe.com",
"published": "2022-05-02T23:15:07.990",
- "lastModified": "2023-09-26T01:15:56.980",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:52:28.547",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -35,6 +35,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
+ },
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -91,6 +111,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -103,7 +138,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html",
- "source": "psirt@adobe.com"
+ "source": "psirt@adobe.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4263.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4263.json
index cc21d029bbe..113ef790f50 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4263.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4263.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4263",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-21T19:15:12.350",
- "lastModified": "2023-03-03T20:15:09.083",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T14:15:10.207",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in leanote 2.6.1. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 0f9733c890077942150696dcc6d2b1482b7a0a19. It is recommended to apply a patch to fix this issue. The identifier VDB-216461 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in leanote 2.6.1. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is 0f9733c890077942150696dcc6d2b1482b7a0a19. It is recommended to apply a patch to fix this issue. The identifier VDB-216461 was assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,7 +93,7 @@
]
},
{
- "source": "nvd@nist.gov",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4297.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4297.json
index 2d19eb48ba2..f6bb1be98af 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4297.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4297.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4297",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T19:15:10.453",
- "lastModified": "2023-01-09T18:21:08.977",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:10.287",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in trampgeek jobe up to 1.6.4 and classified as problematic. This vulnerability affects the function runs_post of the file application/controllers/Restapi.php. The manipulation of the argument sourcefilename leads to an unknown weakness. Upgrading to version 1.6.5 is able to address this issue. The name of the patch is 694da5013dbecc8d30dd83e2a83e78faadf93771. It is recommended to upgrade the affected component. VDB-217174 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in trampgeek jobe up to 1.6.4 and classified as problematic. This vulnerability affects the function runs_post of the file application/controllers/Restapi.php. The manipulation of the argument sourcefilename leads to an unknown weakness. Upgrading to version 1.6.5 is able to address this issue. The patch is identified as 694da5013dbecc8d30dd83e2a83e78faadf93771. It is recommended to upgrade the affected component. VDB-217174 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4298.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4298.json
index 3d6ccb588d8..be361e83037 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4298.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4298.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4298",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:10.197",
- "lastModified": "2023-01-09T17:47:56.407",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:10.353",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in Hesburgh Libraries of Notre Dame Sipity. This affects the function SearchCriteriaForWorksParameter of the file app/parameters/sipity/parameters/search_criteria_for_works_parameter.rb. The manipulation leads to sql injection. Upgrading to version 2021.8 is able to address this issue. The name of the patch is d1704c7363b899ffce65be03a796a0ee5fdbfbdc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217179."
+ "value": "A vulnerability classified as critical has been found in Hesburgh Libraries of Notre Dame Sipity. This affects the function SearchCriteriaForWorksParameter of the file app/parameters/sipity/parameters/search_criteria_for_works_parameter.rb. The manipulation leads to sql injection. Upgrading to version 2021.8 is able to address this issue. The patch is named d1704c7363b899ffce65be03a796a0ee5fdbfbdc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217179."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-435xx/CVE-2021-43576.json b/CVE-2021/CVE-2021-435xx/CVE-2021-43576.json
index fa26cd08669..bcc9cf16dbd 100644
--- a/CVE-2021/CVE-2021-435xx/CVE-2021-43576.json
+++ b/CVE-2021/CVE-2021-435xx/CVE-2021-43576.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-43576",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-12T11:15:08.237",
- "lastModified": "2021-11-17T01:17:29.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.680",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-435xx/CVE-2021-43577.json b/CVE-2021/CVE-2021-435xx/CVE-2021-43577.json
index 95ed443c314..a81f7b77d6e 100644
--- a/CVE-2021/CVE-2021-435xx/CVE-2021-43577.json
+++ b/CVE-2021/CVE-2021-435xx/CVE-2021-43577.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-43577",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-12T11:15:08.287",
- "lastModified": "2021-11-17T01:10:20.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.743",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-435xx/CVE-2021-43578.json b/CVE-2021/CVE-2021-435xx/CVE-2021-43578.json
index eaf81a81d55..1a8abe19d6b 100644
--- a/CVE-2021/CVE-2021-435xx/CVE-2021-43578.json
+++ b/CVE-2021/CVE-2021-435xx/CVE-2021-43578.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-43578",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-12T11:15:08.340",
- "lastModified": "2021-11-17T00:43:15.027",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.800",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2021/CVE-2021-438xx/CVE-2021-43809.json b/CVE-2021/CVE-2021-438xx/CVE-2021-43809.json
index 730ac42e63f..1237cdb0417 100644
--- a/CVE-2021/CVE-2021-438xx/CVE-2021-43809.json
+++ b/CVE-2021/CVE-2021-438xx/CVE-2021-43809.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-43809",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-12-08T19:15:10.067",
- "lastModified": "2021-12-13T18:50:31.237",
+ "lastModified": "2023-10-27T12:57:25.907",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "`Bundler` is a package for managing application dependencies in Ruby. In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash. To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL will be used to construct a Git clone command but will be interpreted as the upload-pack argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside. This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, the exploitability is very low, because it requires a lot of user interaction. Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code."
+ "value": "`Bundler` is a package for managing application dependencies in Ruby. In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash.\n\nTo exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL will be used to construct a Git clone command but will be interpreted as the upload-pack argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside.\n\nThis vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, the exploitability is very low, because it requires a lot of user interaction. Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code."
},
{
"lang": "es",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,6 +93,16 @@
"value": "CWE-88"
}
]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-88"
+ }
+ ]
}
],
"configurations": [
@@ -145,6 +155,15 @@
"Exploit",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.sonarsource.com/blog/securing-developer-tools-package-managers/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Mitigation",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4300.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4300.json
index 831255f1db6..dc475206ca5 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4300.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4300.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4300",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T22:15:08.903",
- "lastModified": "2023-01-11T01:40:32.733",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:10.433",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in ghostlander Halcyon and classified as critical. Affected by this vulnerability is the function CBlock::AddToBlockIndex of the file src/main.cpp of the component Block Verification. The manipulation leads to improper access controls. The attack can be launched remotely. Upgrading to version 1.1.1.0-hal is able to address this issue. The name of the patch is 0675b25ae9cc10b5fdc8ea3a32c642979762d45e. It is recommended to upgrade the affected component. The identifier VDB-217417 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in ghostlander Halcyon and classified as critical. Affected by this vulnerability is the function CBlock::AddToBlockIndex of the file src/main.cpp of the component Block Verification. The manipulation leads to improper access controls. The attack can be launched remotely. Upgrading to version 1.1.1.0-hal is able to address this issue. The identifier of the patch is 0675b25ae9cc10b5fdc8ea3a32c642979762d45e. It is recommended to upgrade the affected component. The identifier VDB-217417 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4301.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4301.json
index 71b1c51f493..c3991718994 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4301.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4301.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4301",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T22:15:08.800",
- "lastModified": "2023-01-12T20:05:49.253",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:10.517",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in slackero phpwcms up to 1.9.26 and classified as critical. Affected by this issue is some unknown functionality. The manipulation of the argument $phpwcms['db_prepend'] leads to sql injection. The attack may be launched remotely. Upgrading to version 1.9.27 is able to address this issue. The name of the patch is 77dafb6a8cc1015f0777daeb5792f43beef77a9d. It is recommended to upgrade the affected component. VDB-217418 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in slackero phpwcms up to 1.9.26 and classified as critical. Affected by this issue is some unknown functionality. The manipulation of the argument $phpwcms['db_prepend'] leads to sql injection. The attack may be launched remotely. Upgrading to version 1.9.27 is able to address this issue. The patch is identified as 77dafb6a8cc1015f0777daeb5792f43beef77a9d. It is recommended to upgrade the affected component. VDB-217418 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4302.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4302.json
index 67f39f610b6..6c81a4e6148 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4302.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4302.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4302",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T22:15:09.000",
- "lastModified": "2023-01-11T01:46:15.570",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:10.597",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in slackero phpwcms up to 1.9.26. It has been classified as problematic. This affects an unknown part of the component SVG File Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.9.27 is able to address this issue. The name of the patch is b39db9c7ad3800f319195ff0e26a0981395b1c54. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217419."
+ "value": "A vulnerability was found in slackero phpwcms up to 1.9.26. It has been classified as problematic. This affects an unknown part of the component SVG File Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.9.27 is able to address this issue. The patch is named b39db9c7ad3800f319195ff0e26a0981395b1c54. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217419."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4303.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4303.json
index af933fccff6..7346cd2bbab 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4303.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4303.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4303",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T09:15:08.647",
- "lastModified": "2023-01-11T17:06:39.900",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:10.673",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in shannah Xataface up to 2.x. Affected by this issue is the function testftp of the file install/install_form.js.php of the component Installer. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 94143a4299e386f33bf582139cd4702571d93bde. It is recommended to upgrade the affected component. VDB-217442 is the identifier assigned to this vulnerability. NOTE: Installer is disabled by default."
+ "value": "A vulnerability, which was classified as problematic, has been found in shannah Xataface up to 2.x. Affected by this issue is the function testftp of the file install/install_form.js.php of the component Installer. The manipulation leads to cross site scripting. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 3.0.0 is able to address this issue. The patch is identified as 94143a4299e386f33bf582139cd4702571d93bde. It is recommended to upgrade the affected component. VDB-217442 is the identifier assigned to this vulnerability. NOTE: Installer is disabled by default."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4304.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4304.json
index 2e205f80e7a..f67a9c2956b 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4304.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4304.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4304",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T10:15:09.887",
- "lastModified": "2023-01-11T19:05:12.987",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:10.757",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in eprintsug ulcc-core. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file cgi/toolbox/toolbox. The manipulation of the argument password leads to command injection. The attack can be launched remotely. The name of the patch is 811edaae81eb044891594f00062a828f51b22cb1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217447."
+ "value": "A vulnerability was found in eprintsug ulcc-core. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file cgi/toolbox/toolbox. The manipulation of the argument password leads to command injection. The attack can be launched remotely. The patch is named 811edaae81eb044891594f00062a828f51b22cb1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217447."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4307.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4307.json
index c84df4cdc98..db06e6f6a0b 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4307.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4307.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4307",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.623",
- "lastModified": "2023-01-12T20:34:50.617",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:10.870",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Yomguithereal Baobab up to 2.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be launched remotely. Upgrading to version 2.6.1 is able to address this issue. The name of the patch is c56639532a923d9a1600fb863ec7551b188b5d19. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217627."
+ "value": "A vulnerability was found in Yomguithereal Baobab up to 2.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be launched remotely. Upgrading to version 2.6.1 is able to address this issue. The patch is named c56639532a923d9a1600fb863ec7551b188b5d19. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217627."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4308.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4308.json
index 4520bdb7304..b296a63fdc1 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4308.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4308.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4308",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:11.903",
- "lastModified": "2023-01-12T16:16:14.183",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:11.017",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in WebPA up to 3.1.1. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. Upgrading to version 3.1.2 is able to address this issue. The name of the patch is 8836c4f549181e885a68e0e7ca561fdbcbd04bf0. It is recommended to upgrade the affected component. The identifier VDB-217637 was assigned to this vulnerability."
+ "value": "A vulnerability was found in WebPA up to 3.1.1. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. Upgrading to version 3.1.2 is able to address this issue. The identifier of the patch is 8836c4f549181e885a68e0e7ca561fdbcbd04bf0. It is recommended to upgrade the affected component. The identifier VDB-217637 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4309.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4309.json
index a34a1c9ab1b..fbb67f8c311 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4309.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4309.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4309",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T17:15:17.947",
- "lastModified": "2023-01-12T22:25:20.557",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:11.100",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in 01-Scripts 01ACP. This issue affects some unknown processing. The manipulation of the argument $_SERVER['SCRIPT_NAME'] leads to cross site scripting. The attack may be initiated remotely. The name of the patch is a16eb7da46ed22bc61067c212635394f2571d3c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217649 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in 01-Scripts 01ACP. This issue affects some unknown processing. The manipulation of the argument $_SERVER['SCRIPT_NAME'] leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is a16eb7da46ed22bc61067c212635394f2571d3c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217649 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4310.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4310.json
index b16876f3316..2867c8643f4 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4310.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4310.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4310",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T09:15:09.940",
- "lastModified": "2023-01-13T12:56:45.903",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:11.193",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in 01-Scripts 01-Artikelsystem. It has been classified as problematic. Affected is an unknown function of the file 01article.php. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is ae849b347a58c2cb1be38d04bbe56fc883d5d84a. It is recommended to apply a patch to fix this issue. VDB-217662 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in 01-Scripts 01-Artikelsystem. It has been classified as problematic. Affected is an unknown function of the file 01article.php. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. It is possible to launch the attack remotely. The patch is identified as ae849b347a58c2cb1be38d04bbe56fc883d5d84a. It is recommended to apply a patch to fix this issue. VDB-217662 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4311.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4311.json
index 595bde4eb40..1a44422598b 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4311.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4311.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4311",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T12:15:15.587",
- "lastModified": "2023-01-12T21:50:46.213",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:11.277",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in Talend Open Studio for MDM. This vulnerability affects unknown code of the component XML Handler. The manipulation leads to xml external entity reference. The name of the patch is 31d442b9fb1d518128fd18f6e4d54e06c3d67793. It is recommended to apply a patch to fix this issue. VDB-217666 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic was found in Talend Open Studio for MDM. This vulnerability affects unknown code of the component XML Handler. The manipulation leads to xml external entity reference. The patch is identified as 31d442b9fb1d518128fd18f6e4d54e06c3d67793. It is recommended to apply a patch to fix this issue. VDB-217666 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4312.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4312.json
index 26b975a481b..e17c5609c36 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4312.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4312.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4312",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T18:15:10.833",
- "lastModified": "2023-01-23T17:54:03.727",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:11.370",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in Th3-822 Rapidleech. This affects the function zip_go of the file classes/options/zip.php. The manipulation of the argument archive leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 885a87ea4ee5e14fa95801eca255604fb2e138c6. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218295. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4313.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4313.json
index 2869b6ee916..779f1bd791d 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4313.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4313.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4313",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T12:15:16.480",
- "lastModified": "2023-01-24T16:15:44.047",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:11.467",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in NethServer phonenehome. It has been rated as critical. This issue affects the function get_info/get_country_coor of the file server/index.php. The manipulation leads to sql injection. The name of the patch is 759c30b0ddd7d493836bbdf695cf71624b377391. It is recommended to apply a patch to fix this issue. The identifier VDB-218393 was assigned to this vulnerability."
+ "value": "A vulnerability was found in NethServer phonenehome. It has been rated as critical. This issue affects the function get_info/get_country_coor of the file server/index.php. The manipulation leads to sql injection. The identifier of the patch is 759c30b0ddd7d493836bbdf695cf71624b377391. It is recommended to apply a patch to fix this issue. The identifier VDB-218393 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4325.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4325.json
index ffe4f4d5199..9dc2f7bc949 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4325.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4325.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4325",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-22T00:15:11.113",
- "lastModified": "2023-03-03T14:20:01.380",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:11.560",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in NHN TOAST UI Chart 4.1.4. This issue affects some unknown processing of the component Legend Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 4.2.0 is able to address this issue. The name of the patch is 1a3f455d17df379e11b501bb5ba1dd1bcc41d63e. It is recommended to upgrade the affected component. The identifier VDB-221501 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in NHN TOAST UI Chart 4.1.4. This issue affects some unknown processing of the component Legend Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 4.2.0 is able to address this issue. The identifier of the patch is 1a3f455d17df379e11b501bb5ba1dd1bcc41d63e. It is recommended to upgrade the affected component. The identifier VDB-221501 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4327.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4327.json
index 1671c5ed17c..01a8dfcdadc 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4327.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4327.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4327",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-01T11:15:12.817",
- "lastModified": "2023-03-13T14:10:35.113",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:11.650",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in SerenityOS. It has been rated as critical. Affected by this issue is the function initialize_typed_array_from_array_buffer in the library Userland/Libraries/LibJS/Runtime/TypedArray.cpp. The manipulation leads to integer overflow. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is f6c6047e49f1517778f5565681fb64750b14bf60. It is recommended to apply a patch to fix this issue. VDB-222074 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in SerenityOS. It has been rated as critical. Affected by this issue is the function initialize_typed_array_from_array_buffer in the library Userland/Libraries/LibJS/Runtime/TypedArray.cpp. The manipulation leads to integer overflow. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as f6c6047e49f1517778f5565681fb64750b14bf60. It is recommended to apply a patch to fix this issue. VDB-222074 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4328.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4328.json
index 15c3f730434..38e56e583f8 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4328.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4328.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4328",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-02T19:15:10.193",
- "lastModified": "2023-03-09T19:24:16.953",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:11.757",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4329.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4329.json
index 816379f69c3..ded464d365c 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4329.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4329.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-4329",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T19:15:10.260",
- "lastModified": "2023-03-13T16:53:41.907",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T14:15:11.930",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0. Affected by this issue is some unknown functionality of the file logic.js. The manipulation leads to command injection. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is c1dd82f5b15d8a553bb7a0cfa841ab8a11a9c227. It is recommended to upgrade the affected component. VDB-222266 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0. Affected by this issue is some unknown functionality of the file logic.js. The manipulation leads to command injection. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as c1dd82f5b15d8a553bb7a0cfa841ab8a11a9c227. It is recommended to upgrade the affected component. VDB-222266 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4334.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4334.json
new file mode 100644
index 00000000000..104757e1460
--- /dev/null
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4334.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2021-4334",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.560",
+ "lastModified": "2023-10-26T17:18:21.413",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Fancy Product Designer plugin for WordPress is vulnerable to unauthorized modification of site options due to a missing capability check on the fpd_update_options function in versions up to, and including, 4.6.9. This makes it possible for authenticated attackers with subscriber-level permissions to modify site options, including setting the default role to administrator which can allow privilege escalation."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Fancy Product Designer para WordPress es vulnerable a modificaciones no autorizadas de las opciones del sitio debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n fpd_update_options en versiones hasta la 4.6.9 incluida. Esto hace posible que los atacantes autenticados con permisos a nivel de suscriptor modifiquen las opciones del sitio, incluida la configuraci\u00f3n del rol predeterminado de administrador, lo que puede permitir la escalada de privilegios."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-285"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:radykal:fancy_product_designer:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.7.0",
+ "matchCriteriaId": "71A93E72-A3FE-4AFC-96EB-88362E89A093"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.fancyproductdesigner.com/support/discussions/topics/13000029981",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea097cb7-85f4-4b6d-9f29-bc2636993f21?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4335.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4335.json
new file mode 100644
index 00000000000..4d78bb1882e
--- /dev/null
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4335.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2021-4335",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:14.757",
+ "lastModified": "2023-10-26T17:32:09.367",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Fancy Product Designer plugin for WordPress is vulnerable to unauthorized access to data and modification of plugin settings due to a missing capability check on multiple AJAX functions in versions up to, and including, 4.6.9. This makes it possible for authenticated attackers with subscriber-level permissions to modify plugin settings, including retrieving arbitrary order information or creating/updating/deleting products, orders, or other sensitive information not associated with their own account."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Fancy Product Designer para WordPress es vulnerable al acceso no autorizado a los datos y a la modificaci\u00f3n de la configuraci\u00f3n del complemento debido a una falta de verificaci\u00f3n de capacidad en m\u00faltiples funciones AJAX en versiones hasta la 4.6.9 incluida. Esto hace posible que atacantes autenticados con permisos a nivel de suscriptor modifiquen la configuraci\u00f3n del complemento, incluida la recuperaci\u00f3n de informaci\u00f3n de pedidos arbitraria o la creaci\u00f3n/actualizaci\u00f3n/eliminaci\u00f3n de productos, pedidos u otra informaci\u00f3n confidencial no asociada con su propia cuenta."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-285"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:radykal:fancy_product_designer:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.7.0",
+ "matchCriteriaId": "71A93E72-A3FE-4AFC-96EB-88362E89A093"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.fancyproductdesigner.com/support/discussions/topics/13000029981",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/644624d8-c193-4ee6-bc82-7ccda5d7f2ac?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4353.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4353.json
new file mode 100644
index 00000000000..de5d0cf58d7
--- /dev/null
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4353.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2021-4353",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:14.870",
+ "lastModified": "2023-10-26T17:30:20.947",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The WooCommerce Dynamic Pricing and Discounts plugin for WordPress is vulnerable to unauthenticated settings export in versions up to, and including, 2.4.1. This is due to missing authorization on the export() function which makes makes it possible for unauthenticated attackers to export the plugin's settings."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WooCommerce Dynamic Pricing and Discounts para WordPress es vulnerable a la exportaci\u00f3n de configuraciones no autenticadas en versiones hasta la 2.4.1 incluida. Esto se debe a la falta de autorizaci\u00f3n en la funci\u00f3n export(), que hace posible que atacantes no autenticados exporten la configuraci\u00f3n del complemento."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-288"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:rightpress:woocommerce_dynamic_pricing_\\&_discounts:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.4.2",
+ "matchCriteriaId": "DEDE041A-2EFD-4F76-AF14-4F200C02568D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/woocommerce-dynamic-pricing-and-discounts-plugin-fixed-multiple-vulnerabilities/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c1e6685-44a7-452e-89ab-b9fffb65a12b?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-446xx/CVE-2021-44653.json b/CVE-2021/CVE-2021-446xx/CVE-2021-44653.json
index d5791670473..c2e3b19265e 100644
--- a/CVE-2021/CVE-2021-446xx/CVE-2021-44653.json
+++ b/CVE-2021/CVE-2021-446xx/CVE-2021-44653.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-44653",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-15T16:15:07.697",
- "lastModified": "2022-03-29T16:28:30.477",
+ "lastModified": "2023-10-18T15:56:29.907",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:online_magazine_management_system_project:online_magazine_management_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "6D3359CE-07F1-4A93-8144-17034D6B0A2C"
+ "criteria": "cpe:2.3:a:oretnom23:online_magazine_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F1653463-AB6F-41F6-9B90-045C9FBFFBF5"
}
]
}
diff --git a/CVE-2021/CVE-2021-448xx/CVE-2021-44862.json b/CVE-2021/CVE-2021-448xx/CVE-2021-44862.json
index 3ef804cebe7..bff1cab1c32 100644
--- a/CVE-2021/CVE-2021-448xx/CVE-2021-44862.json
+++ b/CVE-2021/CVE-2021-448xx/CVE-2021-44862.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-44862",
"sourceIdentifier": "psirt@netskope.com",
"published": "2022-11-03T20:15:24.700",
- "lastModified": "2022-11-04T13:28:51.627",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:53.973",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Netskope client is impacted by a vulnerability where an authenticated, local attacker can view sensitive information stored in NSClient logs which should be restricted. The vulnerability exists because the sensitive information is not masked/scrubbed before writing in the logs. A malicious user can use the sensitive information to download data and impersonate another user."
+ "value": "Netskope client is impacted by a vulnerability where an authenticated, local attacker can view sensitive information stored in NSClient logs which should be restricted. The vulnerability exists because the sensitive information is not masked/scrubbed before writing in the logs. A malicious user can use the sensitive information to download data and impersonate another user.\n"
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4418.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4418.json
new file mode 100644
index 00000000000..97353b123a9
--- /dev/null
+++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4418.json
@@ -0,0 +1,167 @@
+{
+ "id": "CVE-2021-4418",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.627",
+ "lastModified": "2023-10-27T18:54:08.300",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Custom CSS, JS & PHP plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.7. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to save code snippets via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Custom CSS, JS & PHP para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 2.0.7 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n save(). Esto hace posible que atacantes no autenticados guarden fragmentos de c\u00f3digo a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpfactory:custom_css\\,_js_\\&_php:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.0.7",
+ "matchCriteriaId": "D6B61669-B3B4-4E37-91C3-34A30CE74030"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/custom-css-js-php/trunk/modules/code/model.code.php#L85",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d21dc02f-789c-497e-9d01-02fa49bf9e30?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json b/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json
index 3bfa906a9fd..111c6ceaa33 100644
--- a/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json
+++ b/CVE-2021/CVE-2021-450xx/CVE-2021-45046.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-45046",
"sourceIdentifier": "security@apache.org",
"published": "2021-12-14T19:15:07.733",
- "lastModified": "2023-06-27T14:15:09.800",
+ "lastModified": "2023-10-26T07:15:36.677",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-05-01",
"cisaActionDue": "2023-05-22",
@@ -91,7 +91,6 @@
],
"configurations": [
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -136,7 +135,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -219,7 +217,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -563,7 +560,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -584,7 +580,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -601,7 +596,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -840,6 +834,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://security.gentoo.org/glsa/202310-16",
+ "source": "security@apache.org"
+ },
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd",
"source": "security@apache.org",
diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45222.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45222.json
index 99e9689621b..a6c9a757d81 100644
--- a/CVE-2021/CVE-2021-452xx/CVE-2021-45222.json
+++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45222.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-45222",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-24T20:15:08.283",
- "lastModified": "2022-01-28T16:23:54.587",
+ "lastModified": "2023-10-18T17:26:54.167",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:coins-global:construction_cloud:11.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "E05A0CD6-41AE-4F41-820A-D079D74A03C2"
+ "criteria": "cpe:2.3:a:coins-global:coins_construction_cloud:11.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E220D9E-3B07-46DA-A9B6-534B47ACA65F"
}
]
}
@@ -97,7 +97,9 @@
"url": "https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview",
"source": "cve@mitre.org",
"tags": [
- "Product"
+ "Patch",
+ "Product",
+ "Vendor Advisory"
]
},
{
diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45223.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45223.json
index c68907a7fa6..1a983083b21 100644
--- a/CVE-2021/CVE-2021-452xx/CVE-2021-45223.json
+++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45223.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-45223",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-24T20:15:08.327",
- "lastModified": "2022-01-28T16:26:59.947",
+ "lastModified": "2023-10-18T17:25:35.517",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:coins-global:construction_cloud:11.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "E05A0CD6-41AE-4F41-820A-D079D74A03C2"
+ "criteria": "cpe:2.3:a:coins-global:coins_construction_cloud:11.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E220D9E-3B07-46DA-A9B6-534B47ACA65F"
}
]
}
@@ -97,7 +97,9 @@
"url": "https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview",
"source": "cve@mitre.org",
"tags": [
- "Product"
+ "Patch",
+ "Product",
+ "Vendor Advisory"
]
},
{
diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45224.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45224.json
index 1710a6ae293..2fad69767d7 100644
--- a/CVE-2021/CVE-2021-452xx/CVE-2021-45224.json
+++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45224.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-45224",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-24T20:15:08.370",
- "lastModified": "2022-01-28T16:27:42.867",
+ "lastModified": "2023-10-18T17:24:52.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:coins-global:construction_cloud:11.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "E05A0CD6-41AE-4F41-820A-D079D74A03C2"
+ "criteria": "cpe:2.3:a:coins-global:coins_construction_cloud:11.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E220D9E-3B07-46DA-A9B6-534B47ACA65F"
}
]
}
@@ -97,7 +97,9 @@
"url": "https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview",
"source": "cve@mitre.org",
"tags": [
- "Product"
+ "Patch",
+ "Product",
+ "Vendor Advisory"
]
},
{
diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45225.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45225.json
index f90e4bb9332..42f48666782 100644
--- a/CVE-2021/CVE-2021-452xx/CVE-2021-45225.json
+++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45225.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-45225",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-24T20:15:08.413",
- "lastModified": "2022-01-28T16:29:02.253",
+ "lastModified": "2023-10-18T17:24:42.737",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:coins-global:construction_cloud:11.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "E05A0CD6-41AE-4F41-820A-D079D74A03C2"
+ "criteria": "cpe:2.3:a:coins-global:coins_construction_cloud:11.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E220D9E-3B07-46DA-A9B6-534B47ACA65F"
}
]
}
@@ -97,7 +97,9 @@
"url": "https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview",
"source": "cve@mitre.org",
"tags": [
- "Product"
+ "Patch",
+ "Product",
+ "Vendor Advisory"
]
},
{
diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45226.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45226.json
index fbcdaa237da..46e2d18e05f 100644
--- a/CVE-2021/CVE-2021-452xx/CVE-2021-45226.json
+++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45226.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-45226",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-24T20:15:08.457",
- "lastModified": "2022-07-12T17:42:04.277",
+ "lastModified": "2023-10-18T17:24:25.160",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:coins-global:construction_cloud:11.12:*:*:*:*:*:*:*",
- "matchCriteriaId": "E05A0CD6-41AE-4F41-820A-D079D74A03C2"
+ "criteria": "cpe:2.3:a:coins-global:coins_construction_cloud:11.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E220D9E-3B07-46DA-A9B6-534B47ACA65F"
}
]
}
@@ -97,7 +97,9 @@
"url": "https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview",
"source": "cve@mitre.org",
"tags": [
- "Product"
+ "Patch",
+ "Product",
+ "Vendor Advisory"
]
},
{
diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45252.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45252.json
index 11b0f23eddf..0056f987ac7 100644
--- a/CVE-2021/CVE-2021-452xx/CVE-2021-45252.json
+++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45252.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-45252",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-21T12:15:07.457",
- "lastModified": "2021-12-27T16:26:17.977",
+ "lastModified": "2023-10-18T16:00:42.673",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:simple_forum\\/discussion_system_project:simple_forum\\/discussion_system:1.0:*:*:*:*:wordpress:*:*",
- "matchCriteriaId": "58066796-23EC-49F1-A6DF-E25854A5FAC4"
+ "criteria": "cpe:2.3:a:oretnom23:simple_forum\\/discussion_system:1.0:*:*:*:*:wordpress:*:*",
+ "matchCriteriaId": "D9279E5E-ED04-49A0-9C7B-9F19139F180E"
}
]
}
diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46784.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46784.json
index 3942605d7a3..667c642235b 100644
--- a/CVE-2021/CVE-2021-467xx/CVE-2021-46784.json
+++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46784.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-46784",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-17T22:15:08.737",
- "lastModified": "2023-10-13T21:15:51.373",
+ "lastModified": "2023-10-22T00:15:08.640",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -117,6 +117,10 @@
"url": "http://www.openwall.com/lists/oss-security/2023/10/13/10",
"source": "cve@mitre.org"
},
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/21/1",
+ "source": "cve@mitre.org"
+ },
{
"url": "http://www.squid-cache.org/Versions/v4/changesets/SQUID-2021_7.patch",
"source": "cve@mitre.org",
diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46897.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46897.json
new file mode 100644
index 00000000000..2fd8bd2b891
--- /dev/null
+++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46897.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2021-46897",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-22T19:15:08.240",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "views.py in Wagtail CRX CodeRed Extensions (formerly CodeRed CMS or coderedcms) before 0.22.3 allows upward protected/..%2f..%2f path traversal when serving protected media."
+ },
+ {
+ "lang": "es",
+ "value": "views.py en Wagtail CRX CodeRed Extensions (anteriormente CodeRed CMS o coderedcms) anterior a 0.22.3 permite el path traversal hacia arriba protected/..%2f..%2f al servir medios protegidos."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/coderedcorp/coderedcms/compare/v0.22.2...v0.22.3",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/coderedcorp/coderedcms/issues/448",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/coderedcorp/coderedcms/pull/450",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46898.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46898.json
new file mode 100644
index 00000000000..70fcede7464
--- /dev/null
+++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46898.json
@@ -0,0 +1,36 @@
+{
+ "id": "CVE-2021-46898",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-22T19:15:08.297",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "views/switch.py in django-grappelli (aka Django Grappelli) before 2.15.2 attempts to prevent external redirection with startswith(\"/\") but this does not consider a protocol-relative URL (e.g., //example.com) attack."
+ },
+ {
+ "lang": "es",
+ "value": "views/switch.py en django-grappelli (tambi\u00e9n conocido como Django Grappelli) anterior a 2.15.2 intenta evitar la redirecci\u00f3n externa con startwith(\"/\") pero esto no considera un ataque de URL relativo al protocolo (por ejemplo, //example.com) ."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sehmaschine/django-grappelli/commit/4ca94bcda0fa2720594506853d85e00c8212968f",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/sehmaschine/django-grappelli/compare/2.15.1...2.15.2",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/sehmaschine/django-grappelli/issues/975",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/sehmaschine/django-grappelli/pull/976",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-03xx/CVE-2022-0353.json b/CVE-2022/CVE-2022-03xx/CVE-2022-0353.json
new file mode 100644
index 00000000000..554bc5d5196
--- /dev/null
+++ b/CVE-2022/CVE-2022-03xx/CVE-2022-0353.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2022-0353",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-25T18:16:54.057",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nA denial of service vulnerability was reported in the Lenovo HardwareScanPlugin versions prior to \n\n1.3.1.2\n\n and\u00a0\n\nLenovo Diagnostics versions prior to 4.45\n\n that could allow a local user with administrative access to trigger a system crash.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se inform\u00f3 una vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en las versiones Lenovo HardwareScanPlugin anteriores a 1.3.1.2 y Lenovo Diagnostics anteriores a 4.45 que podr\u00eda permitir que un usuario local con acceso administrativo desencadene un bloqueo del sistema."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-102365",
+ "source": "psirt@lenovo.com"
+ },
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-94532",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-05xx/CVE-2022-0538.json b/CVE-2022/CVE-2022-05xx/CVE-2022-0538.json
index 25a904f9594..1ccb4db2c96 100644
--- a/CVE-2022/CVE-2022-05xx/CVE-2022-0538.json
+++ b/CVE-2022/CVE-2022-05xx/CVE-2022-0538.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-0538",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-09T14:15:07.893",
- "lastModified": "2022-02-11T20:44:37.420",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.167",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-502"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-07xx/CVE-2022-0750.json b/CVE-2022/CVE-2022-07xx/CVE-2022-0750.json
index 5d673aa583a..6d279608e95 100644
--- a/CVE-2022/CVE-2022-07xx/CVE-2022-0750.json
+++ b/CVE-2022/CVE-2022-07xx/CVE-2022-0750.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-0750",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-03-23T20:15:10.297",
- "lastModified": "2022-03-29T00:43:19.970",
+ "lastModified": "2023-10-24T20:08:11.517",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "The Photoswipe Masonry Gallery WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the thumbnail_width, thumbnail_height, max_image_width, and max_image_height parameters found in the ~/photoswipe-masonry.php file which allows authenticated attackers to inject arbitrary web scripts into galleries created by the plugin and on the PhotoSwipe Options page. This affects versions up to and including 1.2.14."
+ "value": "The Photoswipe Masonry Gallery WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the thumbnail_width, thumbnail_height, max_image_width, and max_image_height parameters found in the ~/photoswipe-masonry.php file which allows authenticated attackers to inject arbitrary web scripts into galleries created by the plugin and on the PhotoSwipe Options page. This affects versions up to and including 1.2.14."
},
{
"lang": "es",
@@ -115,8 +115,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thriveweb:photoswipe_masonry_gallery:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "1.2.14",
- "matchCriteriaId": "A3B86A90-DAB4-4FC1-82FC-6F1EAEAB252E"
+ "versionEndExcluding": "1.2.15",
+ "matchCriteriaId": "769DA9F2-35D7-49B1-8CD4-27B549CEF223"
}
]
}
@@ -124,6 +124,13 @@
}
],
"references": [
+ {
+ "url": "https://wordpress.org/plugins/photoswipe-masonry/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
{
"url": "https://www.wordfence.com/blog/2022/02/stored-cross-site-scripting-vulnerability-patched-in-a-wordpress-photo-gallery-plugin/",
"source": "security@wordfence.com",
@@ -131,6 +138,13 @@
"Exploit",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/64624d4c-3ffb-4516-a938-0accde24c79f?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-08xx/CVE-2022-0856.json b/CVE-2022/CVE-2022-08xx/CVE-2022-0856.json
index 176d8cee2e2..ed7e11bb111 100644
--- a/CVE-2022/CVE-2022-08xx/CVE-2022-0856.json
+++ b/CVE-2022/CVE-2022-08xx/CVE-2022-0856.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-0856",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2022-03-10T17:44:57.487",
- "lastModified": "2023-10-11T03:15:09.657",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:57:40.437",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -100,6 +100,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -114,11 +134,19 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3E5GF2LSX2ZEY5JZNM7HXJMLHMY436X/",
- "source": "patrick@puiterwijk.org"
+ "source": "patrick@puiterwijk.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTDRPVX3HCYLQCLMQ6NNSRC3B7L6WGUM/",
- "source": "patrick@puiterwijk.org"
+ "source": "patrick@puiterwijk.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-09xx/CVE-2022-0992.json b/CVE-2022/CVE-2022-09xx/CVE-2022-0992.json
index 58ba0cc86c8..0ac9647ec59 100644
--- a/CVE-2022/CVE-2022-09xx/CVE-2022-0992.json
+++ b/CVE-2022/CVE-2022-09xx/CVE-2022-0992.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-0992",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-04-19T21:15:13.623",
- "lastModified": "2023-07-21T17:12:43.403",
+ "lastModified": "2023-10-24T20:10:10.967",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -114,9 +114,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:siteground:siteground_security:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "1.2.5",
- "matchCriteriaId": "E3218CA5-B148-4D5D-B7F2-6DD790463954"
+ "criteria": "cpe:2.3:a:siteground:security_optimizer:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.2.6",
+ "matchCriteriaId": "0D87B7F9-C93A-408F-A5B1-BDB0E24D96DB"
}
]
}
@@ -139,6 +139,13 @@
"Exploit",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e5c6bf7-a653-4571-9566-574d2bb35c4f?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-11xx/CVE-2022-1186.json b/CVE-2022/CVE-2022-11xx/CVE-2022-1186.json
index 2d2a58050fc..d20ab587d31 100644
--- a/CVE-2022/CVE-2022-11xx/CVE-2022-1186.json
+++ b/CVE-2022/CVE-2022-11xx/CVE-2022-1186.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1186",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-04-19T21:15:13.870",
- "lastModified": "2022-04-27T16:50:49.737",
+ "lastModified": "2023-10-24T19:50:46.020",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-200"
+ "value": "NVD-CWE-noinfo"
}
]
},
@@ -114,9 +114,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:web-x.co:be_popia_compliant:*:*:*:*:*:wordpress:*:*",
+ "criteria": "cpe:2.3:a:web-x:be_popia_compliant:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.5",
- "matchCriteriaId": "2DD64335-DC25-46BF-B1F9-678D8DAD5C00"
+ "matchCriteriaId": "77344548-F443-45DF-8334-A3F73D11DDA1"
}
]
}
@@ -128,13 +128,11 @@
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2701343%40be-popia-compliant&new=2701343%40be-popia-compliant&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
- "Release Notes",
- "Third Party Advisory"
+ "Patch"
]
},
{
- "url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1186",
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0fcdd6b5-a273-4916-a894-a753be0a7921?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
diff --git a/CVE-2022/CVE-2022-11xx/CVE-2022-1187.json b/CVE-2022/CVE-2022-11xx/CVE-2022-1187.json
index 9dc6c8bd737..99288c7571b 100644
--- a/CVE-2022/CVE-2022-11xx/CVE-2022-1187.json
+++ b/CVE-2022/CVE-2022-11xx/CVE-2022-1187.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1187",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-04-19T21:15:13.927",
- "lastModified": "2022-04-27T17:06:03.457",
+ "lastModified": "2023-10-24T20:01:35.083",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -114,9 +114,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:wp_youtube_live_project:wp_youtube_live:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "1.7.21",
- "matchCriteriaId": "652CE62D-BB9C-42B2-9BDC-67A84079B63A"
+ "criteria": "cpe:2.3:a:andrewrminion:wp_youtube_live:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.7.22",
+ "matchCriteriaId": "703F4895-D58D-4037-849F-49AFC45C755D"
}
]
}
@@ -125,19 +125,23 @@
],
"references": [
{
- "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2702715%40wp-youtube-live&new=2702715%40wp-youtube-live&sfp_email=&sfph_mail=",
+ "url": "https://github.com/macbookandrew/wp-youtube-live/commit/2d8ccb7b12742bf16b5a6068f9fdeeac69bc11b1",
"source": "security@wordfence.com",
"tags": [
- "Patch",
- "Release Notes",
- "Vendor Advisory"
+ "Patch"
]
},
{
- "url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1187",
+ "url": "https://plugins.trac.wordpress.org/browser/wp-youtube-live/trunk/inc/admin.php#L355",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d540b53-5c39-43d5-a055-cc5eccfa65b8?source=cve",
"source": "security@wordfence.com",
"tags": [
- "Exploit",
"Third Party Advisory"
]
}
diff --git a/CVE-2022/CVE-2022-12xx/CVE-2022-1215.json b/CVE-2022/CVE-2022-12xx/CVE-2022-1215.json
index b37755ac68f..9155fe3a697 100644
--- a/CVE-2022/CVE-2022-12xx/CVE-2022-1215.json
+++ b/CVE-2022/CVE-2022-12xx/CVE-2022-1215.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-1215",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-06-02T14:15:32.187",
- "lastModified": "2022-06-09T19:11:31.000",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T07:15:37.177",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -124,6 +124,10 @@
"Mailing List",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://security.gentoo.org/glsa/202310-14",
+ "source": "secalert@redhat.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-13xx/CVE-2022-1388.json b/CVE-2022/CVE-2022-13xx/CVE-2022-1388.json
index 6b1092289c7..445800ef8af 100644
--- a/CVE-2022/CVE-2022-13xx/CVE-2022-1388.json
+++ b/CVE-2022/CVE-2022-13xx/CVE-2022-1388.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-1388",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2022-05-05T17:15:10.570",
- "lastModified": "2023-01-24T16:08:33.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T01:15:25.983",
+ "vulnStatus": "Undergoing Analysis",
"cisaExploitAdd": "2022-05-10",
"cisaActionDue": "2022-05-31",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@@ -21,7 +21,7 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "nvd@nist.gov",
+ "source": "f5sirt@f5.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -41,7 +41,7 @@
"impactScore": 5.9
},
{
- "source": "f5sirt@f5.com",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -618,6 +618,10 @@
"Mitigation",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://www.secpod.com/blog/critical-f5-big-ip-remote-code-execution-vulnerability-patch-now/",
+ "source": "f5sirt@f5.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-14xx/CVE-2022-1442.json b/CVE-2022/CVE-2022-14xx/CVE-2022-1442.json
index 2b0c9af9ce2..f6c066016ac 100644
--- a/CVE-2022/CVE-2022-14xx/CVE-2022-1442.json
+++ b/CVE-2022/CVE-2022-14xx/CVE-2022-1442.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1442",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-05-10T20:15:08.473",
- "lastModified": "2022-05-18T14:44:17.440",
+ "lastModified": "2023-10-24T20:02:03.637",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,6 +93,16 @@
"value": "CWE-862"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
}
],
"configurations": [
@@ -105,8 +115,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "2.1.3",
- "matchCriteriaId": "EBEC8339-CC44-4AFC-8AA1-6B02DECF9EB9"
+ "versionEndExcluding": "2.1.4",
+ "matchCriteriaId": "E11424B5-31BB-4901-B91C-AB4FDF13023E"
}
]
}
@@ -131,7 +141,7 @@
]
},
{
- "url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1442",
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/04a46249-b5b2-4082-b520-cdc4a1370bb1?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
diff --git a/CVE-2022/CVE-2022-14xx/CVE-2022-1453.json b/CVE-2022/CVE-2022-14xx/CVE-2022-1453.json
index 37707ed309b..20b29953866 100644
--- a/CVE-2022/CVE-2022-14xx/CVE-2022-1453.json
+++ b/CVE-2022/CVE-2022-14xx/CVE-2022-1453.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1453",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-05-10T20:15:08.533",
- "lastModified": "2023-09-30T03:05:11.980",
+ "lastModified": "2023-10-24T20:05:30.950",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,6 +93,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -105,8 +115,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:carrcommunications:rsvpmaker:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "9.2.5",
- "matchCriteriaId": "1BB6D30A-5310-4656-B504-BA9B5335DB23"
+ "versionEndExcluding": "9.2.6",
+ "matchCriteriaId": "93579873-A457-4D80-A586-EC6AD3D9623C"
}
]
}
@@ -118,15 +128,20 @@
"url": "https://github.com/davidfcarr/rsvpmaker/commit/bfb189f49af7ab0d34499a2da772e3266f72167d",
"source": "security@wordfence.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2714389%40rsvpmaker&new=2714389%40rsvpmaker&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6031edec-4274-4e42-9e3a-ce0c94958b17?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1505.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1505.json
index eb896983c61..df0a002f82a 100644
--- a/CVE-2022/CVE-2022-15xx/CVE-2022-1505.json
+++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1505.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1505",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-05-10T20:15:08.713",
- "lastModified": "2023-09-30T03:05:11.980",
+ "lastModified": "2023-10-24T19:30:53.070",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,6 +93,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -105,8 +115,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:carrcommunications:rsvpmaker:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "9.2.6",
- "matchCriteriaId": "063C8BE0-1838-4F27-8D37-92E8A9647E75"
+ "versionEndExcluding": "9.2.7",
+ "matchCriteriaId": "AACA4F53-36CE-42FD-8188-80387BEB0F34"
}
]
}
@@ -118,7 +128,13 @@
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2715095%40rsvpmaker&new=2715095%40rsvpmaker&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6837b91d-b3ba-435a-965b-fa18d9b9b9c8?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1565.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1565.json
index d4028e85fb3..fc8a8ecfcef 100644
--- a/CVE-2022/CVE-2022-15xx/CVE-2022-1565.json
+++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1565.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-1565",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-07-18T17:15:08.537",
- "lastModified": "2023-03-30T20:15:06.603",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T20:37:55.853",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -60,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -68,6 +68,16 @@
"value": "CWE-434"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
}
],
"configurations": [
@@ -80,8 +90,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpallimport:wp_all_import:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "3.6.7",
- "matchCriteriaId": "B3134105-D9B8-4C4A-9977-C97CBDBE3153"
+ "versionEndExcluding": "3.6.8",
+ "matchCriteriaId": "BF8F1680-CC1F-4DBA-B3BD-79EA067F7F3B"
}
]
}
@@ -89,15 +99,17 @@
}
],
"references": [
- {
- "url": "http://packetstormsecurity.com/files/171578/WordPress-WP-All-Import-3.6.7-Remote-Code-Execution.html",
- "source": "security@wordfence.com"
- },
{
"url": "https://plugins.trac.wordpress.org/changeset/2749264/wp-all-import/trunk?contextall=1&old=2737093&old_path=%2Fwp-all-import%2Ftrunk",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5d281333-d9af-4eb7-bc5c-ea7ceeddac03?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1567.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1567.json
index 8bd252240bb..6d1c0770fee 100644
--- a/CVE-2022/CVE-2022-15xx/CVE-2022-1567.json
+++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1567.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1567",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-05-10T20:15:08.787",
- "lastModified": "2022-05-17T19:33:04.357",
+ "lastModified": "2023-10-24T20:05:41.763",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,6 +93,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -118,7 +128,13 @@
"url": "https://plugins.trac.wordpress.org/browser/wp-js/trunk/wp-js.php?rev=100281#L140",
"source": "security@wordfence.com",
"tags": [
- "Exploit",
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0ab82117-73dd-4257-8dfc-01dadcc3a83f?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-17xx/CVE-2022-1707.json b/CVE-2022/CVE-2022-17xx/CVE-2022-1707.json
index efadd021045..32f62bcfaaf 100644
--- a/CVE-2022/CVE-2022-17xx/CVE-2022-1707.json
+++ b/CVE-2022/CVE-2022-17xx/CVE-2022-1707.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1707",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-06-13T13:15:11.793",
- "lastModified": "2022-06-17T23:23:32.557",
+ "lastModified": "2023-10-24T19:35:00.693",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -115,8 +115,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gtm4wp:google_tag_manager:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "1.15",
- "matchCriteriaId": "6DAFF0B4-D9B7-40AC-B0C6-94A82491F119"
+ "versionEndExcluding": "1.15.1",
+ "matchCriteriaId": "7B6A08FD-7BA1-4026-92F3-03406F0FFDE5"
}
]
}
@@ -128,23 +128,27 @@
"url": "https://github.com/duracelltomi/gtm4wp/blob/1.15/public/frontend.php#L298",
"source": "security@wordfence.com",
"tags": [
- "Exploit",
- "Third Party Advisory"
+ "Product"
]
},
{
"url": "https://github.com/duracelltomi/gtm4wp/blob/1.15/public/frontend.php#L782",
"source": "security@wordfence.com",
"tags": [
- "Exploit",
- "Third Party Advisory"
+ "Product"
]
},
{
"url": "https://github.com/duracelltomi/gtm4wp/issues/224",
"source": "security@wordfence.com",
"tags": [
- "Issue Tracking",
+ "Issue Tracking"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0435ae14-c1fd-4611-acbe-5f3bafd4bb6a?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-17xx/CVE-2022-1749.json b/CVE-2022/CVE-2022-17xx/CVE-2022-1749.json
index c9312eec072..c7165563e15 100644
--- a/CVE-2022/CVE-2022-17xx/CVE-2022-1749.json
+++ b/CVE-2022/CVE-2022-17xx/CVE-2022-1749.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-1749",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-06-13T14:15:08.577",
- "lastModified": "2022-06-21T20:49:58.123",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T16:15:16.453",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "The WPMK Ajax Finder WordPress plugin is vulnerable to Cross-Site Request Forgery via the createplugin_atf_admin_setting_page() function found in the ~/inc/config/create-plugin-config.php file due to a missing nonce check which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.1."
+ "value": "The WPMK Ajax Finder WordPress plugin is vulnerable to Cross-Site Request Forgery via the\u00a0createplugin_atf_admin_setting_page()\u00a0function found in the ~/inc/config/create-plugin-config.php file due to a missing nonce check which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.1."
},
{
"lang": "es",
@@ -122,6 +122,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d063d01-5f67-4c7f-ab71-01708456e82b?source=cve",
+ "source": "security@wordfence.com"
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1749",
"source": "security@wordfence.com",
diff --git a/CVE-2022/CVE-2022-17xx/CVE-2022-1750.json b/CVE-2022/CVE-2022-17xx/CVE-2022-1750.json
index 1394aea8bba..66e605cdfc6 100644
--- a/CVE-2022/CVE-2022-17xx/CVE-2022-1750.json
+++ b/CVE-2022/CVE-2022-17xx/CVE-2022-1750.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-1750",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-06-13T14:15:08.637",
- "lastModified": "2022-06-21T20:51:17.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T16:15:16.560",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "The Sticky Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018 popup_title' parameter in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admin level capabilities and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue mostly affects sites where unfiltered_html has been disabled for administrators and on multi-site installations where unfiltered_html is disabled for administrators."
+ "value": "The Sticky Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018 popup_title' parameter in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admin level capabilities and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\u00a0This issue mostly affects sites where unfiltered_html has been disabled for administrators and on multi-site installations where unfiltered_html is disabled for administrators."
},
{
"lang": "es",
@@ -114,6 +114,10 @@
}
],
"references": [
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4a5262d8-d9cd-4bd9-a95e-f60782095173?source=cve",
+ "source": "security@wordfence.com"
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1750",
"source": "security@wordfence.com",
diff --git a/CVE-2022/CVE-2022-18xx/CVE-2022-1822.json b/CVE-2022/CVE-2022-18xx/CVE-2022-1822.json
index 8a9b7fc4025..4abc2589850 100644
--- a/CVE-2022/CVE-2022-18xx/CVE-2022-1822.json
+++ b/CVE-2022/CVE-2022-18xx/CVE-2022-1822.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1822",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-06-13T13:15:13.223",
- "lastModified": "2023-09-27T21:06:35.427",
+ "lastModified": "2023-10-24T19:35:16.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,6 +93,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -118,7 +128,21 @@
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2727947%40zephyr-project-manager&new=2727947%40zephyr-project-manager&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://wordpress.org/plugins/zephyr-project-manager/#developers",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product",
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22d50526-e21f-412d-9eed-b9b1f48c3358?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-19xx/CVE-2022-1900.json b/CVE-2022/CVE-2022-19xx/CVE-2022-1900.json
index c5b2e5be13c..4a80924597f 100644
--- a/CVE-2022/CVE-2022-19xx/CVE-2022-1900.json
+++ b/CVE-2022/CVE-2022-19xx/CVE-2022-1900.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1900",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-06-13T13:15:13.287",
- "lastModified": "2022-06-21T18:17:42.470",
+ "lastModified": "2023-10-24T19:35:32.850",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,6 +93,16 @@
"value": "CWE-352"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
}
],
"configurations": [
@@ -114,6 +124,13 @@
}
],
"references": [
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e92c6374-d11d-458c-b089-0ee79c33e4a6?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1900",
"source": "security@wordfence.com",
diff --git a/CVE-2022/CVE-2022-19xx/CVE-2022-1912.json b/CVE-2022/CVE-2022-19xx/CVE-2022-1912.json
index c4766652884..aea849cf26a 100644
--- a/CVE-2022/CVE-2022-19xx/CVE-2022-1912.json
+++ b/CVE-2022/CVE-2022-19xx/CVE-2022-1912.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1912",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-07-18T17:15:08.603",
- "lastModified": "2022-07-25T03:21:32.157",
+ "lastModified": "2023-10-24T20:38:21.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -102,7 +102,13 @@
"url": "https://plugins.trac.wordpress.org/browser/smartsoftbutton-widget-de-botones-de-chat/trunk/admin/pages/settings.php#L60",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/53757567-5024-46cc-b2ae-04b5fc55a35c?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-19xx/CVE-2022-1961.json b/CVE-2022/CVE-2022-19xx/CVE-2022-1961.json
index 56964d82a04..ba15074fb66 100644
--- a/CVE-2022/CVE-2022-19xx/CVE-2022-1961.json
+++ b/CVE-2022/CVE-2022-19xx/CVE-2022-1961.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1961",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-06-13T14:15:08.843",
- "lastModified": "2022-08-06T03:57:36.347",
+ "lastModified": "2023-10-24T20:32:09.927",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,6 +93,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -126,7 +136,21 @@
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2732977%40duracelltomi-google-tag-manager&new=2732977%40duracelltomi-google-tag-manager&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://wordpress.org/plugins/duracelltomi-google-tag-manager/#developers",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product",
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/202c14d0-9207-47cb-9410-ca4c70d7b6d2?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-19xx/CVE-2022-1969.json b/CVE-2022/CVE-2022-19xx/CVE-2022-1969.json
index 971459f03a2..2c5ea53e5c7 100644
--- a/CVE-2022/CVE-2022-19xx/CVE-2022-1969.json
+++ b/CVE-2022/CVE-2022-19xx/CVE-2022-1969.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1969",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-06-13T14:15:08.907",
- "lastModified": "2022-06-21T20:37:09.320",
+ "lastModified": "2023-10-24T20:33:17.757",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,6 +93,16 @@
"value": "CWE-352"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
}
],
"configurations": [
@@ -118,7 +128,13 @@
"url": "https://plugins.trac.wordpress.org/browser/mobile-browser-color-select/trunk/mobile-browser-color-select.php#L62",
"source": "security@wordfence.com",
"tags": [
- "Exploit",
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/687cd0ac-5f78-4429-b6b5-dd1113143a4d?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20612.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20612.json
index 779b004cf22..6481c1c7e1d 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20612.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20612.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-20612",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:08.653",
- "lastModified": "2022-07-29T16:20:21.887",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.247",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20613.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20613.json
index e8c0ed47813..e50a623d6d7 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20613.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20613.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-20613",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:08.713",
- "lastModified": "2022-07-29T16:20:41.853",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.327",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20614.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20614.json
index eb8f135e6cb..54afa1c064b 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20614.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20614.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-20614",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:08.763",
- "lastModified": "2022-10-17T19:24:16.707",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.413",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20615.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20615.json
index 5a91ba12ef8..0de5c43895c 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20615.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20615.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-20615",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:08.810",
- "lastModified": "2022-07-29T16:21:19.453",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.477",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20616.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20616.json
index df2dbdd1727..755b01b4ddc 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20616.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20616.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-20616",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:08.857",
- "lastModified": "2022-10-17T19:23:47.163",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.540",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20617.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20617.json
index c25c3a30b98..e4e52e6954b 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20617.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20617.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-20617",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:08.907",
- "lastModified": "2022-01-18T15:09:43.497",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.620",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-78"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-78"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20618.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20618.json
index cce7aac7153..b4e1c9bb278 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20618.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20618.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-20618",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:08.957",
- "lastModified": "2022-10-17T19:23:23.903",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.703",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20619.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20619.json
index 43bbc9202b0..6c5395553d7 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20619.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20619.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-20619",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.007",
- "lastModified": "2022-01-20T13:37:25.213",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.783",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20620.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20620.json
index 48ef7aa11cd..0d74dedf657 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20620.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20620.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-20620",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.057",
- "lastModified": "2022-10-17T19:22:56.057",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.850",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20621.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20621.json
index 4141517c64a..7dc2dada846 100644
--- a/CVE-2022/CVE-2022-206xx/CVE-2022-20621.json
+++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20621.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-20621",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.107",
- "lastModified": "2022-01-18T19:27:34.253",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.903",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-20xx/CVE-2022-2001.json b/CVE-2022/CVE-2022-20xx/CVE-2022-2001.json
index b54a7ec69de..4d30ca3d913 100644
--- a/CVE-2022/CVE-2022-20xx/CVE-2022-2001.json
+++ b/CVE-2022/CVE-2022-20xx/CVE-2022-2001.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2001",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-07-18T17:15:08.770",
- "lastModified": "2022-07-25T17:04:36.783",
+ "lastModified": "2023-10-24T20:39:09.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -60,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -68,6 +68,16 @@
"value": "CWE-352"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
}
],
"configurations": [
@@ -80,8 +90,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:devrix:dx_share_selection:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "1.4",
- "matchCriteriaId": "B7778B8C-3184-4821-B11F-A539771B5F2A"
+ "versionEndExcluding": "1.5",
+ "matchCriteriaId": "CE71BABF-E442-4362-9E94-EB9D85A789A0"
}
]
}
@@ -89,11 +99,31 @@
}
],
"references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/dx-share-selection/trunk/dx-share-selection.php#L284",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
{
"url": "https://plugins.trac.wordpress.org/changeset/2747572/dx-share-selection/trunk?contextall=1&old=2384535&old_path=%2Fdx-share-selection%2Ftrunk",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://wordpress.org/plugins/dx-share-selection/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6a85fe7f-2d28-4509-99f2-875cb63c6500?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-21xx/CVE-2022-2108.json b/CVE-2022/CVE-2022-21xx/CVE-2022-2108.json
index 431b299f33f..762db4aabfc 100644
--- a/CVE-2022/CVE-2022-21xx/CVE-2022-2108.json
+++ b/CVE-2022/CVE-2022-21xx/CVE-2022-2108.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2108",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-07-18T17:15:08.947",
- "lastModified": "2023-07-24T13:08:38.660",
+ "lastModified": "2023-10-24T20:40:09.470",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "LOW",
+ "privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
- "availabilityImpact": "LOW",
- "baseScore": 6.3,
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
- "exploitabilityScore": 2.8,
- "impactScore": 3.4
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
}
]
},
@@ -75,7 +75,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-863"
+ "value": "CWE-862"
}
]
}
@@ -99,9 +99,23 @@
}
],
"references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/review-buddypress-groups/trunk/includes/bgr-ajax.php#L359",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
{
"url": "https://plugins.trac.wordpress.org/changeset/2742109",
"source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/397dabc3-5dcf-4d1f-9e24-28af889cb76f?source=cve",
+ "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
diff --git a/CVE-2022/CVE-2022-223xx/CVE-2022-22375.json b/CVE-2022/CVE-2022-223xx/CVE-2022-22375.json
index bfb99d0b5a3..76a3b4f317e 100644
--- a/CVE-2022/CVE-2022-223xx/CVE-2022-22375.json
+++ b/CVE-2022/CVE-2022-223xx/CVE-2022-22375.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-22375",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T02:15:10.090",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T17:59:45.190",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/221681",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-223xx/CVE-2022-22377.json b/CVE-2022/CVE-2022-223xx/CVE-2022-22377.json
index c6319f7d6ea..5ed2902fbfd 100644
--- a/CVE-2022/CVE-2022-223xx/CVE-2022-22377.json
+++ b/CVE-2022/CVE-2022-223xx/CVE-2022-22377.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-22377",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T01:15:09.687",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T17:57:47.170",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-311"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/221827",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-223xx/CVE-2022-22380.json b/CVE-2022/CVE-2022-223xx/CVE-2022-22380.json
index 87ef97bcad7..f2836efb66e 100644
--- a/CVE-2022/CVE-2022-223xx/CVE-2022-22380.json
+++ b/CVE-2022/CVE-2022-223xx/CVE-2022-22380.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-22380",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T02:15:10.177",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T18:00:02.107",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-295"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/221957",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-223xx/CVE-2022-22384.json b/CVE-2022/CVE-2022-223xx/CVE-2022-22384.json
index 0aeac244204..c3385a087b4 100644
--- a/CVE-2022/CVE-2022-223xx/CVE-2022-22384.json
+++ b/CVE-2022/CVE-2022-223xx/CVE-2022-22384.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-22384",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T01:15:09.773",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T17:58:36.670",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/221961",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-223xx/CVE-2022-22385.json b/CVE-2022/CVE-2022-223xx/CVE-2022-22385.json
index 2d9302f052c..fed6def7ecd 100644
--- a/CVE-2022/CVE-2022-223xx/CVE-2022-22385.json
+++ b/CVE-2022/CVE-2022-223xx/CVE-2022-22385.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-22385",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T02:15:10.257",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T18:00:15.817",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,56 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/221962",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-223xx/CVE-2022-22386.json b/CVE-2022/CVE-2022-223xx/CVE-2022-22386.json
index 8df09a63705..2e82a68e2f1 100644
--- a/CVE-2022/CVE-2022-223xx/CVE-2022-22386.json
+++ b/CVE-2022/CVE-2022-223xx/CVE-2022-22386.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-22386",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T02:15:10.340",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T18:07:50.837",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-311"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/221963",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-224xx/CVE-2022-22466.json b/CVE-2022/CVE-2022-224xx/CVE-2022-22466.json
new file mode 100644
index 00000000000..fa28f9faef7
--- /dev/null
+++ b/CVE-2022/CVE-2022-224xx/CVE-2022-22466.json
@@ -0,0 +1,119 @@
+{
+ "id": "CVE-2022-22466",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-23T20:15:08.603",
+ "lastModified": "2023-10-28T03:24:44.390",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Security Verify Governance 10.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 225222."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Verify Governance 10.0 contiene credenciales codificadas, como una contrase\u00f1a o clave criptogr\u00e1fica, que utiliza para su propia autenticaci\u00f3n entrante, comunicaci\u00f3n saliente con componentes externos o cifrado de datos internos. ID de IBM X-Force: 225222."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_governance:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0",
+ "versionEndExcluding": "10.0.2",
+ "matchCriteriaId": "2F71600E-74AE-4A57-B9F6-2773CBD8761D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/225222",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7057377",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-22xx/CVE-2022-2223.json b/CVE-2022/CVE-2022-22xx/CVE-2022-2223.json
index 25856b3fdd6..05f8d95c556 100644
--- a/CVE-2022/CVE-2022-22xx/CVE-2022-2223.json
+++ b/CVE-2022/CVE-2022-22xx/CVE-2022-2223.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2223",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-07-18T17:15:09.067",
- "lastModified": "2022-07-25T15:47:20.257",
+ "lastModified": "2023-10-24T20:42:27.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -41,26 +41,26 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "availabilityImpact": "HIGH",
- "baseScore": 8.8,
- "baseSeverity": "HIGH"
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
- "impactScore": 5.9
+ "impactScore": 2.5
}
]
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -68,6 +68,16 @@
"value": "CWE-352"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
}
],
"configurations": [
@@ -93,7 +103,13 @@
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2749352%40image-slider-widget&new=2749352%40image-slider-widget&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6356e226-a449-4cd0-be60-2a1c9c70aa59?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-22xx/CVE-2022-2233.json b/CVE-2022/CVE-2022-22xx/CVE-2022-2233.json
index a363e65beeb..e5683b4600f 100644
--- a/CVE-2022/CVE-2022-22xx/CVE-2022-2233.json
+++ b/CVE-2022/CVE-2022-22xx/CVE-2022-2233.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-2233",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:13.223",
- "lastModified": "2022-09-09T02:26:46.740",
+ "lastModified": "2023-10-24T20:43:15.693",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "The Banner Cycler plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.4. This is due to missing nonce protection on the pabc_admin_slides_postback() function found in the ~/admin/admin.php file. This makes it possible for unauthenticated attackers to inject malicious web scripts into the page, granted they can trick a site\u2019s administrator into performing an action such as clicking on a link."
+ "value": "The Banner Cycler plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.4. This is due to missing nonce protection on the pabc_admin_slides_postback() function found in the ~/admin/admin.php file. This makes it possible for unauthenticated attackers to inject malicious web scripts into the page, granted they can trick a site\u2019s administrator into performing an action such as clicking on a link"
},
{
"lang": "es",
@@ -103,7 +103,13 @@
"url": "https://plugins.trac.wordpress.org/browser/banner-cycler/trunk/admin/admin.php#L131",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc1d7f2-053d-42d4-afb7-6fb69fd71b91?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23105.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23105.json
index 1350dbc0075..a9b160a367d 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23105.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23105.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23105",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.157",
- "lastModified": "2022-01-18T19:31:28.580",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:54.963",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-319"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23106.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23106.json
index 2a324d5de88..886e479ecea 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23106.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23106.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23106",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.207",
- "lastModified": "2022-01-18T19:34:52.043",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.023",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-203"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-208"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23107.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23107.json
index 82ee48170ac..dd0bf310851 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23107.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23107.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23107",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.257",
- "lastModified": "2022-03-23T17:19:42.867",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.083",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23108.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23108.json
index ace90900696..9b561716f9b 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23108.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23108.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23108",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.303",
- "lastModified": "2022-01-18T19:39:27.053",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.153",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23109.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23109.json
index fae80c76870..d10c70cc127 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23109.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23109.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23109",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.347",
- "lastModified": "2022-01-18T19:43:37.590",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.213",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-668"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23110.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23110.json
index a03d9a27a39..3939d29eb4c 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23110.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23110.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23110",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.397",
- "lastModified": "2022-01-18T19:44:52.813",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.267",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23111.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23111.json
index f24513a4558..92150191a58 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23111.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23111.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23111",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.450",
- "lastModified": "2022-01-18T19:46:52.207",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.330",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23112.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23112.json
index 0fd82130ca8..c9ea0945f7e 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23112.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23112.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23112",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.507",
- "lastModified": "2022-01-18T19:48:06.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.397",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23113.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23113.json
index 9d3f1d51ff5..9eb7a6c6159 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23113.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23113.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23113",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.557",
- "lastModified": "2022-01-19T20:18:15.133",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.453",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23114.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23114.json
index 2143b7e9f69..176e38eb58b 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23114.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23114.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23114",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.607",
- "lastModified": "2022-01-18T19:49:23.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.510",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23115.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23115.json
index a63a6366d4d..17938d0152d 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23115.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23115.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23115",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.657",
- "lastModified": "2022-01-18T19:51:16.577",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.573",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23116.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23116.json
index 40259389725..4be14d1029c 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23116.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23116.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23116",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.707",
- "lastModified": "2022-01-18T20:40:55.290",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.630",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-311"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2522%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2522%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23117.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23117.json
index b897d1bac79..e90117cfeb6 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23117.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23117.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23117",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.757",
- "lastModified": "2022-01-19T20:21:34.433",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-269"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2522%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2522%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23118.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23118.json
index 9ec155ef644..738df0e1945 100644
--- a/CVE-2022/CVE-2022-231xx/CVE-2022-23118.json
+++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23118.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23118",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-01-12T20:15:09.807",
- "lastModified": "2023-06-27T19:03:24.207",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.757",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-668"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23220.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23220.json
index cfe639a6e2e..7f7e3108fa9 100644
--- a/CVE-2022/CVE-2022-232xx/CVE-2022-23220.json
+++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23220.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23220",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-21T16:15:08.193",
- "lastModified": "2022-01-27T18:10:43.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T07:15:37.307",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-287"
+ "value": "CWE-306"
}
]
}
@@ -132,6 +132,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://security.gentoo.org/glsa/202310-15",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://www.debian.org/security/2022/dsa-5052",
"source": "cve@mitre.org",
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23468.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23468.json
index 886f0392be4..360cdd1d41a 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23468.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23468.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23468",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-09T18:15:13.047",
- "lastModified": "2023-09-19T05:16:07.477",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:29:09.967",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -56,7 +56,7 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -64,6 +64,16 @@
"value": "CWE-120"
}
]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
}
],
"configurations": [
@@ -82,6 +92,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,7 +119,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23477.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23477.json
index 42964dcc673..3287e6a8df7 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23477.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23477.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23477",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-09T18:15:13.787",
- "lastModified": "2023-09-19T05:16:53.837",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:07:09.197",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,7 +109,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23478.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23478.json
index 5e772e4e1ef..2918761fb57 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23478.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23478.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23478",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-09T18:15:14.207",
- "lastModified": "2023-09-19T05:16:55.783",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:29:20.227",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,7 +109,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23479.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23479.json
index 4fa31a9f9b0..814e9b3bbf0 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23479.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23479.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23479",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-09T18:15:14.817",
- "lastModified": "2023-09-19T05:16:57.237",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:29:49.307",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,7 +109,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23480.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23480.json
index 7cf0618e3a9..b0e63a8ef95 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23480.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23480.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23480",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-09T18:15:15.530",
- "lastModified": "2023-09-19T05:17:02.960",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:27:17.610",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -104,7 +119,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23481.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23481.json
index d3ce6cacd32..6e412c8f4c3 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23481.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23481.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23481",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-09T18:15:16.153",
- "lastModified": "2023-09-19T05:17:04.317",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:27:49.360",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,7 +109,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23482.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23482.json
index 67c1c44a692..9b348a885b4 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23482.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23482.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23482",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-09T18:15:16.557",
- "lastModified": "2023-09-19T05:17:05.350",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:28:01.137",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,7 +109,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23483.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23483.json
index 859f1317db1..3898e8b4362 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23483.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23483.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23483",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-09T18:15:16.877",
- "lastModified": "2023-09-19T05:17:06.230",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:22:04.263",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,7 +109,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23484.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23484.json
index f93781ef81f..f316269c1a7 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23484.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23484.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23484",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-09T18:15:17.207",
- "lastModified": "2023-09-19T05:17:07.450",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:22:19.020",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,7 +109,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23493.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23493.json
index af2adc4b871..50a9f0b71c6 100644
--- a/CVE-2022/CVE-2022-234xx/CVE-2022-23493.json
+++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23493.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-23493",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-09T18:15:17.643",
- "lastModified": "2023-09-19T05:17:08.953",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:22:23.907",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,7 +109,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5502",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24400.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24400.json
new file mode 100644
index 00000000000..4bb55c9cfba
--- /dev/null
+++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24400.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2022-24400",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:08.930",
+ "lastModified": "2023-10-25T18:45:06.947",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A flaw in the TETRA authentication procecure allows a MITM adversary that can predict the MS challenge RAND2 to set session key DCK to zero."
+ },
+ {
+ "lang": "es",
+ "value": "Una falla en el procedimiento de autenticaci\u00f3n TETRA permite que un adversario MITM que puede predecir el desaf\u00edo MS RAND2 establezca la clave de sesi\u00f3n DCK en cero."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 4.2
+ },
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-639"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24401.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24401.json
new file mode 100644
index 00000000000..3469374ddd2
--- /dev/null
+++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24401.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2022-24401",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:09.510",
+ "lastModified": "2023-10-25T19:24:09.957",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Adversary-induced keystream re-use on TETRA air-interface encrypted traffic using any TEA keystream generator. IV generation is based upon several TDMA frame counters, which are frequently broadcast by the infrastructure in an unauthenticated manner. An active adversary can manipulate the view of these counters in a mobile station, provoking keystream re-use. By sending crafted messages to the MS and analyzing MS responses, keystream for arbitrary frames can be recovered."
+ },
+ {
+ "lang": "es",
+ "value": "Reutilizaci\u00f3n del flujo de claves inducida por el adversario en el tr\u00e1fico cifrado de interfaz a\u00e9rea TETRA utilizando cualquier generador de flujo de claves TEA. La generaci\u00f3n IV se basa en varios contadores de frame TDMA, que frecuentemente la infraestructura transmite sin autenticaci\u00f3n. Un adversario activo puede manipular la vista de estos contadores en una estaci\u00f3n m\u00f3vil, provocando la reutilizaci\u00f3n del flujo de claves. Al enviar mensajes manipulados al MS y analizar las respuestas del MS, se puede recuperar el flujo de claves de frames arbitrarios."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ },
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-639"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24402.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24402.json
new file mode 100644
index 00000000000..bb0d20c7c1f
--- /dev/null
+++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24402.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2022-24402",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:09.573",
+ "lastModified": "2023-10-25T16:16:34.507",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The TETRA TEA1 keystream generator implements a key register initialization function that compresses the 80-bit key to only 32 bits for usage during the keystream generation phase, which is insufficient to safeguard against exhaustive search attacks."
+ },
+ {
+ "lang": "es",
+ "value": "El generador de flujo de claves TETRA TEA1 implementa una funci\u00f3n de inicializaci\u00f3n de registro de claves que comprime la clave de 80 bits a solo 32 bits para su uso durante la fase de generaci\u00f3n del flujo de claves, lo cual es insuficiente para protegerse contra ataques de b\u00fasqueda exhaustiva."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-307"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24404.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24404.json
new file mode 100644
index 00000000000..9603a60b0a4
--- /dev/null
+++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24404.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2022-24404",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:09.627",
+ "lastModified": "2023-10-25T16:15:53.220",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Lack of cryptographic integrity check on TETRA air-interface encrypted traffic. Since a stream cipher is employed, this allows an active adversary to manipulate cleartext data in a bit-by-bit fashion."
+ },
+ {
+ "lang": "es",
+ "value": "Falta de verificaci\u00f3n de integridad criptogr\u00e1fica en el tr\u00e1fico cifrado de interfaz a\u00e9rea TETRA. Dado que se emplea un cifrado de flujo, esto permite que un adversario activo manipule datos de texto plano bit a bit."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-354"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:midnightblue:tetra\\:burst:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E47ED5D3-E6C3-419A-9A3B-9F20863B9FDA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2433.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2433.json
index b09eacb24e7..74cd61fc7cb 100644
--- a/CVE-2022/CVE-2022-24xx/CVE-2022-2433.json
+++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2433.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2433",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:13.590",
- "lastModified": "2022-09-09T19:48:56.207",
+ "lastModified": "2023-10-24T20:43:23.787",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -41,19 +41,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "HIGH",
- "userInteraction": "NONE",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
- "baseScore": 7.2,
+ "baseScore": 8.8,
"baseSeverity": "HIGH"
},
- "exploitabilityScore": 1.2,
+ "exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
@@ -90,8 +90,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:connekthq:ajax_load_more:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "5.5.3",
- "matchCriteriaId": "F53D9CB5-1960-4C57-903D-9AA1027862D8"
+ "versionEndExcluding": "5.5.4",
+ "matchCriteriaId": "506CF2A6-A4C6-4243-A655-96694C37296D"
}
]
}
@@ -103,7 +103,13 @@
"url": "https://plugins.trac.wordpress.org/changeset/2772627/ajax-load-more/trunk/admin/admin.php",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/040ae20d-93e3-4c65-ba74-4ff0b5c1afc7?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2434.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2434.json
index a698bc64ce6..918a7d79584 100644
--- a/CVE-2022/CVE-2022-24xx/CVE-2022-2434.json
+++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2434.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2434",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:13.650",
- "lastModified": "2022-09-09T19:52:29.983",
+ "lastModified": "2023-10-24T20:43:32.877",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -73,10 +73,6 @@
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
- {
- "lang": "en",
- "value": "CWE-352"
- },
{
"lang": "en",
"value": "CWE-502"
@@ -107,14 +103,20 @@
"url": "https://plugins.trac.wordpress.org/browser/string-locator/trunk/editor.php#L59",
"source": "security@wordfence.com",
"tags": [
- "Third Party Advisory"
+ "Broken Link"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2759486%40string-locator&new=2759486%40string-locator&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/10a36e37-4188-403f-9b17-d7e79b8b8a6d?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2435.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2435.json
index 3afb22760e5..98f4cbc52a8 100644
--- a/CVE-2022/CVE-2022-24xx/CVE-2022-2435.json
+++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2435.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2435",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-07-18T17:15:09.187",
- "lastModified": "2022-07-25T15:18:56.713",
+ "lastModified": "2023-10-24T20:42:34.137",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -60,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -68,6 +68,16 @@
"value": "CWE-352"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
}
],
"configurations": [
@@ -96,6 +106,13 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/174eae70-15d7-4772-8fcd-dc4c0fca5b7d?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2435",
"source": "security@wordfence.com",
diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2436.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2436.json
index 556dbbff4ea..3e4a958d8dd 100644
--- a/CVE-2022/CVE-2022-24xx/CVE-2022-2436.json
+++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2436.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2436",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:13.710",
- "lastModified": "2022-09-12T13:18:41.737",
+ "lastModified": "2023-10-24T20:43:39.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -90,8 +90,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "3.2.49",
- "matchCriteriaId": "42A9F9BB-E489-4F99-A986-E7FE20CEF35A"
+ "versionEndExcluding": "3.2.50",
+ "matchCriteriaId": "19251DD9-53AE-4A48-96FA-30E1C07B265A"
}
]
}
@@ -103,15 +103,20 @@
"url": "https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/Admin/Menu/Packages.php#L68",
"source": "security@wordfence.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2761422%40download-manager%2Ftrunk%2Fsrc%2FAdmin%2FMenu%2FPackages.php&new=2761422%40download-manager%2Ftrunk%2Fsrc%2FAdmin%2FMenu%2FPackages.php",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/471957f6-54c1-4268-b2e1-8efa391dcaec?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2437.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2437.json
index 10dca6591f9..ed66a54e512 100644
--- a/CVE-2022/CVE-2022-24xx/CVE-2022-2437.json
+++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2437.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2437",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-07-18T17:15:09.243",
- "lastModified": "2022-07-25T15:41:32.180",
+ "lastModified": "2023-10-24T20:42:41.337",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -60,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -68,6 +68,16 @@
"value": "CWE-502"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
}
],
"configurations": [
@@ -93,7 +103,13 @@
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2754749%40feed-them-social&new=2754749%40feed-them-social&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/50bcea94-b12a-4b31-b0c1-bba834ea9bd0?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2438.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2438.json
index c7ec9f95584..7a1e5ac438c 100644
--- a/CVE-2022/CVE-2022-24xx/CVE-2022-2438.json
+++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2438.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2438",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:13.770",
- "lastModified": "2022-09-10T02:00:19.460",
+ "lastModified": "2023-10-24T20:27:56.007",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -90,8 +90,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:managewp:broken_link_checker:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "1.11.16",
- "matchCriteriaId": "054F4826-66D3-418F-BE3D-F97015E90702"
+ "versionEndExcluding": "1.11.17",
+ "matchCriteriaId": "BA5D6B69-41F4-41A1-B594-8E11A3E7500E"
}
]
}
@@ -103,7 +103,13 @@
"url": "https://plugins.trac.wordpress.org/changeset/2757773/broken-link-checker/trunk/core/core.php?old=2605914&old_path=broken-link-checker%2Ftrunk%2Fcore%2Fcore.php",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/62fd472e-208b-48db-8f98-3d935c7a678c?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2441.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2441.json
new file mode 100644
index 00000000000..e9e0ce22e97
--- /dev/null
+++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2441.json
@@ -0,0 +1,147 @@
+{
+ "id": "CVE-2022-2441",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.707",
+ "lastModified": "2023-10-27T18:53:39.887",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The ImageMagick Engine plugin for WordPress is vulnerable to remote code execution via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to run arbitrary commands leading to remote command execution, granted they can trick a site administrator into performing an action such as clicking on a link. This makes it possible for an attacker to create and or modify files hosted on the server which can easily grant attackers backdoor access to the affected server."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento ImageMagick Engine para WordPress es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s del par\u00e1metro 'cli_path' en versiones hasta la 1.7.5 incluida. Esto hace posible que usuarios no autenticados ejecuten comandos arbitrarios que conduzcan a la ejecuci\u00f3n remota de comandos, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. Esto hace posible que un atacante cree o modifique archivos alojados en el servidor, lo que puede otorgar f\u00e1cilmente a los atacantes acceso por puerta trasera al servidor afectado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:orangelab:imagemagick_engine:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.7.5",
+ "matchCriteriaId": "7B349E22-AA9C-4310-BCB9-D207A15CD10D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/orangelabweb/imagemagick-engine/blob/1.7.4/imagemagick-engine.php#L529",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/orangelabweb/imagemagick-engine/blob/v.1.7.2/imagemagick-engine.php#L529",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2801283%40imagemagick-engine%2Ftrunk&old=2732430%40imagemagick-engine%2Ftrunk&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.exploit-db.com/exploits/51025",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1f17a83-1df0-44fe-bd86-243cff6ec91b?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2441",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2444.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2444.json
index c3240241611..d37b5515947 100644
--- a/CVE-2022/CVE-2022-24xx/CVE-2022-2444.json
+++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2444.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2444",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-07-18T17:15:09.363",
- "lastModified": "2022-07-25T15:21:30.033",
+ "lastModified": "2023-10-24T20:42:47.390",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -103,31 +103,34 @@
"url": "https://github.com/Codeinwp/visualizer/blob/master/classes/Visualizer/Module/Chart.php#L1115",
"source": "security@wordfence.com",
"tags": [
- "Exploit",
- "Third Party Advisory"
+ "Product"
]
},
{
"url": "https://github.com/Codeinwp/visualizer/blob/master/classes/Visualizer/Source/Csv.php",
"source": "security@wordfence.com",
"tags": [
- "Exploit",
- "Third Party Advisory"
+ "Product"
]
},
{
"url": "https://github.com/Codeinwp/visualizer/compare/v3.7.9...v3.7.10",
"source": "security@wordfence.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2752058%40visualizer&new=2752058%40visualizer&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9606d92-8061-4dfc-a6e2-509b54613277?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2461.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2461.json
index 89909edbf3c..2e3efcffb1c 100644
--- a/CVE-2022/CVE-2022-24xx/CVE-2022-2461.json
+++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2461.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-2461",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:13.890",
- "lastModified": "2022-09-09T17:16:54.787",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T21:15:07.527",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -60,7 +60,7 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "security@wordfence.com",
"type": "Primary",
"description": [
{
@@ -70,7 +70,7 @@
]
},
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@@ -132,6 +132,13 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/223373fc-9d78-47f0-b283-109f8e00b802?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2461",
"source": "security@wordfence.com",
diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2473.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2473.json
index 8808eba0979..7644a1a3fe1 100644
--- a/CVE-2022/CVE-2022-24xx/CVE-2022-2473.json
+++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2473.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2473",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:14.013",
- "lastModified": "2022-09-10T03:21:29.977",
+ "lastModified": "2023-10-24T20:28:46.317",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -112,8 +112,15 @@
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2758412%40wp-useronline&new=2758412%40wp-useronline&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.exploit-db.com/exploits/50988",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
]
},
{
@@ -124,12 +131,34 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.exploitalert.com/view-details.html?id=38912",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6a44a55e-a96a-4698-9948-6ef33138a834?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2473",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://youtu.be/Q3zInrUnAV0",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25173.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25173.json
index d4a1eee578e..0025c603581 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25173.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25173.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25173",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:08.477",
- "lastModified": "2022-02-23T19:57:54.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.830",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-78"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-78"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25174.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25174.json
index 9aa0eac98a3..61d896d65d5 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25174.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25174.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25174",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:08.560",
- "lastModified": "2022-02-23T20:00:35.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.910",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-78"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-78"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25175.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25175.json
index 33d436677b6..6f5d961abb4 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25175.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25175.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25175",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:08.627",
- "lastModified": "2022-10-28T16:13:44.167",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:55.973",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-78"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-78"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25176.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25176.json
index ef8e8fc83b7..4404102d6cd 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25176.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25176.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25176",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:08.697",
- "lastModified": "2022-02-24T01:47:56.463",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.037",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-59"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-59"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25177.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25177.json
index 15f57579a3d..585ddae4a4e 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25177.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25177.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25177",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:08.767",
- "lastModified": "2022-02-24T01:54:29.653",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.097",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-59"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-59"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25178.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25178.json
index c7f77b5afe0..636d2d4a19c 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25178.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25178.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25178",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:08.837",
- "lastModified": "2022-02-24T01:58:58.740",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.153",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25179.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25179.json
index 087d6807a02..53e53f35f8d 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25179.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25179.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25179",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:08.907",
- "lastModified": "2022-02-24T02:05:52.953",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.210",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-59"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-59"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25180.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25180.json
index 8ef59c151ab..2124bf4e30f 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25180.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25180.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25180",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:08.977",
- "lastModified": "2023-07-10T19:34:39.193",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.267",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-319"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-522"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25181.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25181.json
index a7fcf7e0e14..34af19200b3 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25181.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25181.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25181",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:09.047",
- "lastModified": "2022-02-23T21:24:01.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.330",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25182.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25182.json
index 3a73561153c..2d6f8e1795f 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25182.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25182.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25182",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:09.120",
- "lastModified": "2022-02-23T21:24:46.827",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.397",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25183.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25183.json
index c899e4df3e8..c53376676aa 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25183.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25183.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25183",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:09.197",
- "lastModified": "2022-02-23T21:34:26.990",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.450",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25184.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25184.json
index dfa94bfb0ae..33fe3d5c7d6 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25184.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25184.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25184",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:09.270",
- "lastModified": "2022-02-23T21:10:42.487",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.513",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-200"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25185.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25185.json
index 0f0dd3ed5b8..809ab71b4ad 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25185.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25185.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25185",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:09.340",
- "lastModified": "2022-02-23T21:11:04.293",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.583",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25186.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25186.json
index cf0bcd4e192..5c881d67304 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25186.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25186.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25186",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:09.410",
- "lastModified": "2022-02-23T21:14:25.667",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.640",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25187.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25187.json
index af46b5ccf8f..d3e3f085173 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25187.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25187.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-25187",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:09.477",
- "lastModified": "2023-10-10T22:15:10.237",
+ "lastModified": "2023-10-25T18:16:56.697",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-212"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25188.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25188.json
index 80a7b4828a9..112ff58c0dd 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25188.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25188.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25188",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:09.547",
- "lastModified": "2022-02-23T20:26:57.347",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.763",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25189.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25189.json
index cbdf71d5233..41f6efa4654 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25189.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25189.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25189",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:09.880",
- "lastModified": "2022-02-23T19:43:20.780",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.823",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25190.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25190.json
index 07765faa1fb..6aa97178c1e 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25190.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25190.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25190",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.147",
- "lastModified": "2022-02-23T20:20:31.230",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.887",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25191.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25191.json
index e1a341dd9c0..ab72a57a568 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25191.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25191.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25191",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.213",
- "lastModified": "2022-02-23T20:14:17.450",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:56.947",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25192.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25192.json
index 095a7a752c5..3c6daa520d6 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25192.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25192.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25192",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.283",
- "lastModified": "2022-10-28T14:24:09.563",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.000",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25193.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25193.json
index 3e740b83190..5c23b89edee 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25193.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25193.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25193",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.350",
- "lastModified": "2022-10-28T16:18:37.020",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.060",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25194.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25194.json
index 086093d2f7d..54935f05cdf 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25194.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25194.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25194",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.413",
- "lastModified": "2022-02-23T19:19:12.890",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.120",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25195.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25195.json
index 8a2efadd8c8..dece18e5fb8 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25195.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25195.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25195",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.470",
- "lastModified": "2022-02-23T19:22:38.607",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.173",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25196.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25196.json
index dc41fd4156f..aaaaa7f0d4e 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25196.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25196.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25196",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.537",
- "lastModified": "2022-02-23T19:57:44.403",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.233",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-601"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-601"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25197.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25197.json
index 514bd642f9d..ddbe13d12f1 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25197.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25197.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25197",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.600",
- "lastModified": "2022-02-23T19:28:51.987",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.287",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25198.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25198.json
index 78ff6eebefa..80d25a6109b 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25198.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25198.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25198",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.657",
- "lastModified": "2022-02-23T19:59:06.767",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.353",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-251xx/CVE-2022-25199.json b/CVE-2022/CVE-2022-251xx/CVE-2022-25199.json
index 10522d39aae..a05e5d79279 100644
--- a/CVE-2022/CVE-2022-251xx/CVE-2022-25199.json
+++ b/CVE-2022/CVE-2022-251xx/CVE-2022-25199.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25199",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.720",
- "lastModified": "2022-02-23T20:02:05.097",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.417",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25200.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25200.json
index a0ada1d6827..4039e033643 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25200.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25200.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25200",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.783",
- "lastModified": "2022-02-23T19:43:02.630",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.477",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25201.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25201.json
index 66b3113f229..36f3297c80d 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25201.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25201.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25201",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.850",
- "lastModified": "2022-02-23T19:45:42.780",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.537",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25202.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25202.json
index 546758eeb5e..02b152912a0 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25202.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25202.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25202",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.913",
- "lastModified": "2022-02-23T20:05:33.413",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.597",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25203.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25203.json
index 984eb9f470f..35f57b9eec3 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25203.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25203.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25203",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:10.977",
- "lastModified": "2022-02-23T20:07:00.607",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.657",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25204.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25204.json
index 846f4696326..c9323cf566c 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25204.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25204.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25204",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:11.047",
- "lastModified": "2022-02-23T20:12:12.100",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.717",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25205.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25205.json
index 7d066357e36..f09cb0ab408 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25205.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25205.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25205",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:11.107",
- "lastModified": "2022-02-23T19:53:06.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.773",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25206.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25206.json
index 643cb4f7df2..53db0074b7b 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25206.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25206.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25206",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:11.167",
- "lastModified": "2022-02-23T20:13:34.333",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.827",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25207.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25207.json
index ca0b4c92b27..50ec5292ef6 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25207.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25207.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25207",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:11.227",
- "lastModified": "2022-02-23T20:14:20.187",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.887",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25208.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25208.json
index 8b708bab92e..999df0586b9 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25208.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25208.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25208",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:11.287",
- "lastModified": "2022-02-23T20:15:28.747",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:57.940",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25209.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25209.json
index c5715fb8142..4147cd8169d 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25209.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25209.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25209",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:11.343",
- "lastModified": "2022-02-23T20:16:22.917",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.000",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25210.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25210.json
index 8d20eddf73d..54ddcc714fc 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25210.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25210.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25210",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:11.397",
- "lastModified": "2022-02-23T20:17:29.670",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.053",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-662"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-820"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25211.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25211.json
index d4dbdbc171f..44cbb7b91b3 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25211.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25211.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25211",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:11.457",
- "lastModified": "2022-02-23T20:18:25.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.110",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-252xx/CVE-2022-25212.json b/CVE-2022/CVE-2022-252xx/CVE-2022-25212.json
index 2b13e4b2dde..7871639fef1 100644
--- a/CVE-2022/CVE-2022-252xx/CVE-2022-25212.json
+++ b/CVE-2022/CVE-2022-252xx/CVE-2022-25212.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25212",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-02-15T17:15:11.573",
- "lastModified": "2022-02-23T20:18:50.580",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.167",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-253xx/CVE-2022-25319.json b/CVE-2022/CVE-2022-253xx/CVE-2022-25319.json
index f877eb1eb85..3f1223f0184 100644
--- a/CVE-2022/CVE-2022-253xx/CVE-2022-25319.json
+++ b/CVE-2022/CVE-2022-253xx/CVE-2022-25319.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25319",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-02-18T06:15:10.507",
- "lastModified": "2023-10-10T22:15:10.363",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T21:03:02.690",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -104,7 +104,11 @@
},
{
"url": "https://zigrin.com/cakephp-application-cybersecurity-research-forgotten-endpoint-authentication-bypass-with-open-prefix/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-253xx/CVE-2022-25321.json b/CVE-2022/CVE-2022-253xx/CVE-2022-25321.json
index f77de0d3b4a..a0b395460f8 100644
--- a/CVE-2022/CVE-2022-253xx/CVE-2022-25321.json
+++ b/CVE-2022/CVE-2022-253xx/CVE-2022-25321.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-25321",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-02-18T06:15:10.587",
- "lastModified": "2023-10-10T22:15:10.443",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T21:02:59.300",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -112,7 +112,11 @@
},
{
"url": "https://zigrin.com/cakephp-application-cybersecurity-research-be-careful-with-reflections-for-your-web-application-security/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-253xx/CVE-2022-25332.json b/CVE-2022/CVE-2022-253xx/CVE-2022-25332.json
new file mode 100644
index 00000000000..b3c7ea91961
--- /dev/null
+++ b/CVE-2022/CVE-2022-253xx/CVE-2022-25332.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2022-25332",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:09.683",
+ "lastModified": "2023-10-19T12:59:29.480",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The AES implementation in the Texas Instruments OMAP L138 (secure variants), present in mask ROM, suffers from a timing side channel which can be exploited by an adversary with non-secure supervisor privileges by managing cache contents and collecting timing information for different ciphertext inputs. Using this side channel, the SK_LOAD secure kernel routine can be used to recover the Customer Encryption Key (CEK)."
+ },
+ {
+ "lang": "es",
+ "value": "La implementaci\u00f3n de AES en Texas Instruments OMAP L138 (variantes seguras), presente en la m\u00e1scara ROM, sufre de un canal lateral de temporizaci\u00f3n que puede ser explotado por un adversario con privilegios de supervisor no seguros al administrar el contenido de la cach\u00e9 y recopilar informaci\u00f3n de temporizaci\u00f3n para diferentes entradas de texto cifrado. Usando este canal lateral, la rutina de kernel segura SK_LOAD se puede usar para recuperar el Customer Encryption Key (CEK)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-253xx/CVE-2022-25333.json b/CVE-2022/CVE-2022-253xx/CVE-2022-25333.json
new file mode 100644
index 00000000000..5ad1857f48d
--- /dev/null
+++ b/CVE-2022/CVE-2022-253xx/CVE-2022-25333.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2022-25333",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:09.747",
+ "lastModified": "2023-10-19T12:59:29.480",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Texas Instruments OMAP L138 (secure variants) trusted execution environment (TEE) performs an RSA check implemented in mask ROM when loading a module through the SK_LOAD routine. However, only the module header authenticity is validated. An adversary can re-use any correctly signed header and append a forged payload, to be encrypted using the CEK (obtainable through CVE-2022-25332) in order to obtain arbitrary code execution in secure context. This constitutes a full break of the TEE security architecture."
+ },
+ {
+ "lang": "es",
+ "value": "Texas Instruments OMAP L138 (variantes seguras) Trusted Execution Environment (TEE) realiza una verificaci\u00f3n RSA implementada en la m\u00e1scara ROM al cargar un m\u00f3dulo a trav\u00e9s de la rutina SK_LOAD. Sin embargo, s\u00f3lo se valida la autenticidad del encabezado del m\u00f3dulo. Un adversario puede reutilizar cualquier encabezado firmado correctamente y agregar un payload falsificado, que se cifrar\u00e1 mediante CEK (que se puede obtener a trav\u00e9s de CVE-2022-25332) para obtener la ejecuci\u00f3n de c\u00f3digo arbitrario en un contexto seguro. Esto constituye una ruptura total de la arquitectura de seguridad de TEE."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-253xx/CVE-2022-25334.json b/CVE-2022/CVE-2022-253xx/CVE-2022-25334.json
new file mode 100644
index 00000000000..a555f98e6fd
--- /dev/null
+++ b/CVE-2022/CVE-2022-253xx/CVE-2022-25334.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2022-25334",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:09.803",
+ "lastModified": "2023-10-19T12:59:29.480",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Texas Instruments OMAP L138 (secure variants) trusted execution environment (TEE) lacks a bounds check on the signature size field in the SK_LOAD module loading routine, present in mask ROM. A module with a sufficiently large signature field causes a stack overflow, affecting secure kernel data pages. This can be leveraged to obtain arbitrary code execution in secure supervisor context by overwriting a SHA256 function pointer in the secure kernel data area when loading a forged, unsigned SK_LOAD module encrypted with the CEK (obtainable through CVE-2022-25332). This constitutes a full break of the TEE security architecture."
+ },
+ {
+ "lang": "es",
+ "value": "Texas Instruments OMAP L138 (variantes seguras) Trusted Execution Environment (TEE) carece de una verificaci\u00f3n de l\u00edmites en el campo de tama\u00f1o de firma en la rutina de carga del m\u00f3dulo SK_LOAD, presente en la m\u00e1scara ROM. Un m\u00f3dulo con un campo de firma suficientemente grande provoca un desbordamiento de la pila, lo que afecta las p\u00e1ginas seguras de datos del kernel. Esto se puede aprovechar para obtener la ejecuci\u00f3n de c\u00f3digo arbitrario en un contexto de supervisor seguro sobrescribiendo un puntero de funci\u00f3n SHA256 en el \u00e1rea segura de datos del kernel al cargar un m\u00f3dulo SK_LOAD falsificado y sin firmar cifrado con CEK (obtenible a trav\u00e9s de CVE-2022-25332). Esto constituye una ruptura total de la arquitectura de seguridad de TEE."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2515.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2515.json
index 45d7ed84782..50915514179 100644
--- a/CVE-2022/CVE-2022-25xx/CVE-2022-2515.json
+++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2515.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2515",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:14.077",
- "lastModified": "2022-09-10T03:20:54.893",
+ "lastModified": "2023-10-24T20:29:16.180",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -90,8 +90,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_banner_project:simple_banner:*:*:*:*:*:wordpress:*:*",
- "versionEndIncluding": "2.11.0",
- "matchCriteriaId": "6BF6B653-A47E-498D-8BD0-180E226DA0AC"
+ "versionEndExcluding": "2.12.0",
+ "matchCriteriaId": "D3ABAB26-E082-4B33-ACA9-710D8987D6DF"
}
]
}
@@ -111,7 +111,13 @@
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2758766%40simple-banner&new=2758766%40simple-banner&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
- "Patch",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb9520d-e679-4e8a-ae3c-8207f17d45a2?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
"Third Party Advisory"
]
},
diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2518.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2518.json
index 1a35537621c..076abd696a9 100644
--- a/CVE-2022/CVE-2022-25xx/CVE-2022-2518.json
+++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2518.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2518",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:14.260",
- "lastModified": "2022-09-09T19:22:54.837",
+ "lastModified": "2023-10-29T02:38:51.720",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -60,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -68,6 +68,16 @@
"value": "CWE-352"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
}
],
"configurations": [
@@ -96,6 +106,20 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://wordpress.org/plugins/stockists-manager/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b5e0204-4a05-45c1-833a-c2e4016d9830?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2518",
"source": "security@wordfence.com",
diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2541.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2541.json
index 441a5316bb2..ce791e83841 100644
--- a/CVE-2022/CVE-2022-25xx/CVE-2022-2541.json
+++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2541.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-2541",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:14.377",
- "lastModified": "2022-09-13T15:37:23.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T16:15:18.660",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -115,6 +115,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f7c43d4-cf21-4324-bc77-50bdc2c24661?source=cve",
+ "source": "security@wordfence.com"
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2541",
"source": "security@wordfence.com",
diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2542.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2542.json
index d75c8a87d07..0a13f66cbd8 100644
--- a/CVE-2022/CVE-2022-25xx/CVE-2022-2542.json
+++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2542.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-2542",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:14.437",
- "lastModified": "2022-09-13T15:48:21.553",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T16:15:18.763",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -115,6 +115,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4af83d4b-2eae-481f-b3fd-d5bcacc1d709?source=cve",
+ "source": "security@wordfence.com"
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2542",
"source": "security@wordfence.com",
diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26183.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26183.json
index ac28bbfaa20..99e87ab877c 100644
--- a/CVE-2022/CVE-2022-261xx/CVE-2022-26183.json
+++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26183.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-26183",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-21T22:15:07.987",
- "lastModified": "2022-03-29T14:30:07.633",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T23:15:09.150",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -121,6 +121,10 @@
"Release Notes",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.sonarsource.com/blog/securing-developer-tools-package-managers/",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26184.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26184.json
index 26908af092a..beae98b6167 100644
--- a/CVE-2022/CVE-2022-261xx/CVE-2022-26184.json
+++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26184.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-26184",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-21T22:15:08.030",
- "lastModified": "2022-03-29T14:56:10.997",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T22:15:08.933",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -121,6 +121,10 @@
"Release Notes",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.sonarsource.com/blog/securing-developer-tools-package-managers/",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26941.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26941.json
new file mode 100644
index 00000000000..978ce8bfc16
--- /dev/null
+++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26941.json
@@ -0,0 +1,138 @@
+{
+ "id": "CVE-2022-26941",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:09.860",
+ "lastModified": "2023-10-25T18:31:50.603",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A format string vulnerability exists in Motorola MTM5000 series firmware AT command handler for the AT+CTGL command. An attacker-controllable string is improperly handled, allowing for a write-anything-anywhere scenario. This can be leveraged to obtain arbitrary code execution inside the teds_app binary, which runs with root privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de cadena de formato en el controlador de comandos AT del firmware de la serie Motorola MTM5000 para el comando AT+CTGL. Una cadena controlable por un atacante se maneja incorrectamente, lo que permite un escenario en el que se puede escribir cualquier cosa en cualquier lugar. Esto se puede aprovechar para obtener la ejecuci\u00f3n de c\u00f3digo arbitrario dentro del binario teds_app, que se ejecuta con privilegios de root."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-134"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:motorola:mtm5500_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7C0C44-3660-4B47-A1ED-0BD19EFC5F03"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:motorola:mtm5500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1A0784B-AE84-4457-A884-5C26EEA8D181"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:motorola:mtm5400_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FF669A29-B983-40F6-BBA9-D9F67E653BEF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:motorola:mtm5400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03AA5A43-A1B5-4E1C-A844-691607765E30"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl",
+ "tags": [
+ "Technical Description"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26942.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26942.json
new file mode 100644
index 00000000000..1e14b0813cd
--- /dev/null
+++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26942.json
@@ -0,0 +1,138 @@
+{
+ "id": "CVE-2022-26942",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:09.913",
+ "lastModified": "2023-10-25T19:01:11.123",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives. "
+ },
+ {
+ "lang": "es",
+ "value": "Los firmwares de la serie Motorola MTM5000 carecen de validaci\u00f3n de puntero en los argumentos pasados a los m\u00f3dulos Trusted Execution Environment (TEE). Se utilizan dos m\u00f3dulos, uno responsable de la gesti\u00f3n de claves KVL y el otro de la funcionalidad criptogr\u00e1fica TETRA. En ambos m\u00f3dulos, un adversario con una ejecuci\u00f3n de c\u00f3digo de nivel de supervisor no segura puede aprovechar el problema para obtener una ejecuci\u00f3n segura de c\u00f3digo de supervisor dentro del TEE. Esto constituye una ruptura total del m\u00f3dulo TEE, exponiendo la clave del dispositivo, as\u00ed como cualquier clave criptogr\u00e1fica TETRA y las primitivas criptogr\u00e1ficas TETRA confidenciales."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 6.0
+ },
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-763"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:motorola:mtm5500_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7C0C44-3660-4B47-A1ED-0BD19EFC5F03"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:motorola:mtm5500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1A0784B-AE84-4457-A884-5C26EEA8D181"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:motorola:mtm5400_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FF669A29-B983-40F6-BBA9-D9F67E653BEF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:motorola:mtm5400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03AA5A43-A1B5-4E1C-A844-691607765E30"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl",
+ "tags": [
+ "Technical Description"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26943.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26943.json
new file mode 100644
index 00000000000..0b6a6067729
--- /dev/null
+++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26943.json
@@ -0,0 +1,138 @@
+{
+ "id": "CVE-2022-26943",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:09.963",
+ "lastModified": "2023-10-27T21:54:14.067",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the entropy pool to predict authentication challenges. As such, the unit is vulnerable to CVE-2022-24400."
+ },
+ {
+ "lang": "es",
+ "value": "Los firmwares de la serie Motorola MTM5000 generan desaf\u00edos de autenticaci\u00f3n TETRA utilizando un PRNG que utiliza un registro de conteo de ticks como \u00fanica fuente de entrop\u00eda. La baja entrop\u00eda del tiempo de arranque y la resiembra limitada del grupo hacen que el desaf\u00edo de autenticaci\u00f3n sea vulnerable a dos ataques. En primer lugar, debido a la entrop\u00eda limitada del grupo de tiempo de arranque, un adversario puede derivar el contenido del grupo de entrop\u00eda mediante una b\u00fasqueda exhaustiva de valores posibles, bas\u00e1ndose en un desaf\u00edo de autenticaci\u00f3n observado. En segundo lugar, un adversario puede utilizar el conocimiento del conjunto de entrop\u00eda para predecir los desaf\u00edos de autenticaci\u00f3n. Como tal, la unidad es vulnerable a CVE-2022-24400."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-338"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:motorola:mtm5500_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7C0C44-3660-4B47-A1ED-0BD19EFC5F03"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:motorola:mtm5500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1A0784B-AE84-4457-A884-5C26EEA8D181"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:motorola:mtm5400_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FF669A29-B983-40F6-BBA9-D9F67E653BEF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:motorola:mtm5400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03AA5A43-A1B5-4E1C-A844-691607765E30"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl",
+ "tags": [
+ "Technical Description"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-271xx/CVE-2022-27195.json b/CVE-2022/CVE-2022-271xx/CVE-2022-27195.json
index 42bdb74f8ff..36c9ad1a23c 100644
--- a/CVE-2022/CVE-2022-271xx/CVE-2022-27195.json
+++ b/CVE-2022/CVE-2022-271xx/CVE-2022-27195.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27195",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:09.540",
- "lastModified": "2023-01-30T19:18:33.800",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.227",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-538"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-271xx/CVE-2022-27196.json b/CVE-2022/CVE-2022-271xx/CVE-2022-27196.json
index a9e86af569d..ec5aecb773a 100644
--- a/CVE-2022/CVE-2022-271xx/CVE-2022-27196.json
+++ b/CVE-2022/CVE-2022-271xx/CVE-2022-27196.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27196",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:09.920",
- "lastModified": "2022-03-23T17:56:53.760",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.297",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-271xx/CVE-2022-27197.json b/CVE-2022/CVE-2022-271xx/CVE-2022-27197.json
index c76ab3bcc4d..e0657dead8d 100644
--- a/CVE-2022/CVE-2022-271xx/CVE-2022-27197.json
+++ b/CVE-2022/CVE-2022-271xx/CVE-2022-27197.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27197",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:10.077",
- "lastModified": "2022-03-23T17:55:15.230",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.363",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-271xx/CVE-2022-27198.json b/CVE-2022/CVE-2022-271xx/CVE-2022-27198.json
index 91d5ba94e82..cc228745318 100644
--- a/CVE-2022/CVE-2022-271xx/CVE-2022-27198.json
+++ b/CVE-2022/CVE-2022-271xx/CVE-2022-27198.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27198",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:10.190",
- "lastModified": "2022-03-23T18:04:57.887",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.427",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-271xx/CVE-2022-27199.json b/CVE-2022/CVE-2022-271xx/CVE-2022-27199.json
index 8009752c2bf..0340b539910 100644
--- a/CVE-2022/CVE-2022-271xx/CVE-2022-27199.json
+++ b/CVE-2022/CVE-2022-271xx/CVE-2022-27199.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27199",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:10.320",
- "lastModified": "2022-10-17T19:21:51.560",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.493",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27200.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27200.json
index f737b02865c..43db063f400 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27200.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27200.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27200",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:10.433",
- "lastModified": "2022-03-22T19:21:53.073",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.553",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27201.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27201.json
index bf617a45b10..60fbcad9c53 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27201.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27201.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27201",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:10.527",
- "lastModified": "2022-11-29T13:43:09.480",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.620",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27202.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27202.json
index 569bf770cf4..aa805af3a44 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27202.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27202.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27202",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:10.757",
- "lastModified": "2022-03-23T13:29:00.707",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.703",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27203.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27203.json
index 252d3edfa0f..6edae0e4b0c 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27203.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27203.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27203",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:10.877",
- "lastModified": "2022-03-23T13:36:54.147",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.807",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27204.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27204.json
index 7f3f21cb9fb..1a553e55b88 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27204.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27204.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27204",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:11.073",
- "lastModified": "2022-03-23T14:17:17.573",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27205.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27205.json
index 8b36a541014..8148a973de0 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27205.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27205.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27205",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:11.203",
- "lastModified": "2022-10-17T19:20:49.127",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.933",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27206.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27206.json
index ed3e0f78df3..3a4e430f15c 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27206.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27206.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27206",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:11.340",
- "lastModified": "2022-10-17T19:29:34.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:58.987",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27207.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27207.json
index f9ce55fefd2..4c517c05c8b 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27207.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27207.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27207",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:11.557",
- "lastModified": "2022-03-23T14:34:12.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.053",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27208.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27208.json
index a8eb9a4dfc3..cd6b5ef1580 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27208.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27208.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27208",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:11.653",
- "lastModified": "2022-03-22T19:32:01.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.113",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27209.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27209.json
index 852e872eba3..8810dff3729 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27209.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27209.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27209",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:11.753",
- "lastModified": "2022-03-24T20:31:19.123",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.167",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27210.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27210.json
index 00897ecc11f..5e84fe3158c 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27210.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27210.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27210",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:11.857",
- "lastModified": "2022-05-23T16:21:17.017",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.227",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27211.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27211.json
index cc4850383d6..9c1f39b5196 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27211.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27211.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27211",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:11.947",
- "lastModified": "2023-10-10T22:15:10.507",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T18:16:59.307",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27212.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27212.json
index a4884bbe36a..e0b87d65fa3 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27212.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27212.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27212",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:12.130",
- "lastModified": "2022-03-22T15:08:02.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.393",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27213.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27213.json
index 032caaa4dee..609b022ea07 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27213.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27213.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27213",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:12.263",
- "lastModified": "2022-03-25T12:07:51.960",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.463",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27214.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27214.json
index fe33702e09a..534eb13e563 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27214.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27214.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27214",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:12.433",
- "lastModified": "2022-03-22T17:31:18.780",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.523",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27215.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27215.json
index ced878fc80f..b0d6b0f2497 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27215.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27215.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27215",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:12.523",
- "lastModified": "2022-10-17T19:20:24.693",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.580",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27216.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27216.json
index a2e949fb64b..15e74c9c64a 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27216.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27216.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27216",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:12.637",
- "lastModified": "2022-03-25T13:21:37.870",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.640",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27217.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27217.json
index 13c36a06da7..0fbf2acfa08 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27217.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27217.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27217",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:12.777",
- "lastModified": "2022-03-25T13:45:23.187",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.703",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27218.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27218.json
index 324cad58379..353582e4213 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27218.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27218.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27218",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:12.877",
- "lastModified": "2023-07-18T13:53:44.023",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.763",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-272xx/CVE-2022-27261.json b/CVE-2022/CVE-2022-272xx/CVE-2022-27261.json
index da51644c4e3..22d04e1fb2c 100644
--- a/CVE-2022/CVE-2022-272xx/CVE-2022-27261.json
+++ b/CVE-2022/CVE-2022-272xx/CVE-2022-27261.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-27261",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-12T17:15:09.973",
- "lastModified": "2022-04-19T19:35:56.367",
+ "lastModified": "2023-10-18T16:03:27.460",
"vulnStatus": "Analyzed",
"descriptions": [
{
diff --git a/CVE-2022/CVE-2022-275xx/CVE-2022-27510.json b/CVE-2022/CVE-2022-275xx/CVE-2022-27510.json
index 6c98bafa250..c2e150a6d11 100644
--- a/CVE-2022/CVE-2022-275xx/CVE-2022-27510.json
+++ b/CVE-2022/CVE-2022-275xx/CVE-2022-27510.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-27510",
"sourceIdentifier": "secure@citrix.com",
"published": "2022-11-08T22:15:13.020",
- "lastModified": "2022-11-09T22:03:45.173",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T17:15:08.340",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Unauthorized access to Gateway user capabilities"
+ "value": "Unauthorized access to Gateway user capabilities \n"
+ },
+ {
+ "lang": "es",
+ "value": "Acceso no autorizado a las capacidades del usuario de Gateway"
}
],
"metrics": {
@@ -78,7 +82,6 @@
],
"configurations": [
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
diff --git a/CVE-2022/CVE-2022-275xx/CVE-2022-27513.json b/CVE-2022/CVE-2022-275xx/CVE-2022-27513.json
index 0f2f6a0d8dd..0116f432447 100644
--- a/CVE-2022/CVE-2022-275xx/CVE-2022-27513.json
+++ b/CVE-2022/CVE-2022-275xx/CVE-2022-27513.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-27513",
"sourceIdentifier": "secure@citrix.com",
"published": "2022-11-08T22:15:13.313",
- "lastModified": "2022-11-09T22:04:00.053",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T18:15:08.757",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Remote desktop takeover via phishing"
+ "value": "Remote desktop takeover via phishing \n"
+ },
+ {
+ "lang": "es",
+ "value": "Adquisici\u00f3n de escritorio remoto mediante phishing"
}
],
"metrics": {
@@ -78,7 +82,6 @@
],
"configurations": [
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
diff --git a/CVE-2022/CVE-2022-275xx/CVE-2022-27516.json b/CVE-2022/CVE-2022-275xx/CVE-2022-27516.json
index 0158706c144..2a8a1178d97 100644
--- a/CVE-2022/CVE-2022-275xx/CVE-2022-27516.json
+++ b/CVE-2022/CVE-2022-275xx/CVE-2022-27516.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-27516",
"sourceIdentifier": "secure@citrix.com",
"published": "2022-11-08T22:15:13.633",
- "lastModified": "2022-11-09T19:29:17.697",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T18:15:08.840",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "User login brute force protection functionality bypass"
+ "value": "User login brute force protection functionality bypass \n"
+ },
+ {
+ "lang": "es",
+ "value": "Omisi\u00f3n de la funcionalidad de protecci\u00f3n de fuerza bruta de inicio de sesi\u00f3n de usuario"
}
],
"metrics": {
@@ -78,7 +82,6 @@
],
"configurations": [
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
diff --git a/CVE-2022/CVE-2022-275xx/CVE-2022-27518.json b/CVE-2022/CVE-2022-275xx/CVE-2022-27518.json
index c8bc8cc9ad2..421aef63f27 100644
--- a/CVE-2022/CVE-2022-275xx/CVE-2022-27518.json
+++ b/CVE-2022/CVE-2022-275xx/CVE-2022-27518.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27518",
"sourceIdentifier": "secure@citrix.com",
"published": "2022-12-13T17:15:14.350",
- "lastModified": "2022-12-14T15:20:07.827",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T18:15:08.927",
+ "vulnStatus": "Modified",
"cisaExploitAdd": "2022-12-13",
"cisaActionDue": "2023-01-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
- "value": "Unauthenticated remote arbitrary code execution"
+ "value": "Unauthenticated remote arbitrary code execution\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-276xx/CVE-2022-27635.json b/CVE-2022/CVE-2022-276xx/CVE-2022-27635.json
index cab50ae31ab..6ba12868d44 100644
--- a/CVE-2022/CVE-2022-276xx/CVE-2022-27635.json
+++ b/CVE-2022/CVE-2022-276xx/CVE-2022-27635.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-27635",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:11.817",
- "lastModified": "2023-09-30T22:15:09.903",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:57:03.990",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -161,6 +161,46 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -174,19 +214,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-278xx/CVE-2022-27813.json b/CVE-2022/CVE-2022-278xx/CVE-2022-27813.json
new file mode 100644
index 00000000000..d11da7ef1c0
--- /dev/null
+++ b/CVE-2022/CVE-2022-278xx/CVE-2022-27813.json
@@ -0,0 +1,138 @@
+{
+ "id": "CVE-2022-27813",
+ "sourceIdentifier": "cert@ncsc.nl",
+ "published": "2023-10-19T10:15:10.013",
+ "lastModified": "2023-10-27T21:53:38.570",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Motorola MTM5000 series firmwares lack properly configured memory protection of pages shared between the OMAP-L138 ARM and DSP cores. The SoC provides two memory protection units, MPU1 and MPU2, to enforce the trust boundary between the two cores. Since both units are left unconfigured by the firmwares, an adversary with control over either core can trivially gain code execution on the other, by overwriting code located in shared RAM or DDR2 memory regions."
+ },
+ {
+ "lang": "es",
+ "value": "Los firmwares de la serie Motorola MTM5000 carecen de protecci\u00f3n de memoria configurada correctamente para las p\u00e1ginas compartidas entre los n\u00facleos OMAP-L138 ARM y DSP. El SoC proporciona dos unidades de protecci\u00f3n de memoria, MPU1 y MPU2, para reforzar el l\u00edmite de confianza entre los dos n\u00facleos. Dado que los firmwares dejan ambas unidades sin configurar, un adversario con control sobre cualquiera de los n\u00facleos puede obtener trivialmente la ejecuci\u00f3n de c\u00f3digo en el otro, sobrescribiendo el c\u00f3digo ubicado en la RAM compartida o en las regiones de memoria DDR2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 6.0
+ },
+ {
+ "source": "cert@ncsc.nl",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:motorola:mtm5500_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB7C0C44-3660-4B47-A1ED-0BD19EFC5F03"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:motorola:mtm5500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1A0784B-AE84-4457-A884-5C26EEA8D181"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:motorola:mtm5400_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FF669A29-B983-40F6-BBA9-D9F67E653BEF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:motorola:mtm5400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03AA5A43-A1B5-4E1C-A844-691607765E30"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://tetraburst.com/",
+ "source": "cert@ncsc.nl",
+ "tags": [
+ "Technical Description"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28133.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28133.json
index 0321c85e821..0d81eb3ad41 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28133.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28133.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28133",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.030",
- "lastModified": "2022-04-04T16:40:30.790",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.827",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28134.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28134.json
index ee3aa6c82db..1fac5380b24 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28134.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28134.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28134",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.090",
- "lastModified": "2022-04-04T16:42:25.197",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:16:59.927",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28135.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28135.json
index 643ac9138e9..6b9db8e8383 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28135.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28135.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28135",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.137",
- "lastModified": "2023-07-18T13:55:54.120",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.000",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28136.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28136.json
index 703036061ae..1e4922caa7b 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28136.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28136.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28136",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.187",
- "lastModified": "2022-04-04T19:20:13.503",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28137.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28137.json
index df7b169e8fa..3a0512c1fce 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28137.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28137.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28137",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.233",
- "lastModified": "2022-10-17T19:20:06.863",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.150",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28138.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28138.json
index 3fb95b9abd2..16b40a0dbfb 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28138.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28138.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28138",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.277",
- "lastModified": "2022-04-04T16:14:53.550",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.207",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28139.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28139.json
index e3f962095c5..4f91bf82ba3 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28139.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28139.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28139",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.327",
- "lastModified": "2022-04-04T16:27:54.137",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28140.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28140.json
index d1453a68465..19ebfbc5207 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28140.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28140.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28140",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.377",
- "lastModified": "2022-04-04T15:57:10.867",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.323",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28141.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28141.json
index ecee1d05ef2..adebd4459a0 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28141.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28141.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28141",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.430",
- "lastModified": "2022-04-04T19:57:22.250",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28142.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28142.json
index 57c2a889914..ee4dda61d49 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28142.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28142.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28142",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.483",
- "lastModified": "2022-04-04T16:04:14.467",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.463",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-295"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28143.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28143.json
index ef0a45e2226..141299208a2 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28143.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28143.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28143",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.533",
- "lastModified": "2022-04-04T20:17:51.170",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.523",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28144.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28144.json
index a97b8066072..2027e086f7c 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28144.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28144.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28144",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.577",
- "lastModified": "2022-04-04T20:18:23.477",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.587",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28145.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28145.json
index 9acda1475f4..91117601a2b 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28145.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28145.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28145",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.627",
- "lastModified": "2022-04-04T20:08:25.077",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.643",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28146.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28146.json
index 73185338384..458435eac78 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28146.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28146.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28146",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.673",
- "lastModified": "2022-04-04T20:09:39.317",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.707",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28147.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28147.json
index 65cb8ca0572..669817f9df6 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28147.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28147.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28147",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.720",
- "lastModified": "2022-10-17T19:19:55.783",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.763",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28148.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28148.json
index edaee9782b2..f5c52b260b9 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28148.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28148.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28148",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.770",
- "lastModified": "2022-04-04T20:26:22.700",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.817",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28149.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28149.json
index 33a5628ca08..e79de373e12 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28149.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28149.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28149",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:09.060",
- "lastModified": "2022-04-04T20:30:04.143",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.887",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28150.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28150.json
index f1da697e9fc..d6d9418439a 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28150.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28150.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28150",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:09.517",
- "lastModified": "2022-04-05T14:38:05.710",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:00.947",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28151.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28151.json
index c12fdf6efbc..a60b5a7d5ac 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28151.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28151.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28151",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:09.680",
- "lastModified": "2022-04-04T19:01:54.483",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.003",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28152.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28152.json
index 8490c488807..ee3ed928db6 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28152.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28152.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28152",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:09.743",
- "lastModified": "2022-04-04T19:01:27.010",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.063",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
@@ -113,11 +103,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28153.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28153.json
index 9a6b874fb9d..31b80978261 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28153.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28153.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28153",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:09.953",
- "lastModified": "2022-04-04T18:59:57.940",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.127",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28154.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28154.json
index fa784337d54..5c734a61006 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28154.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28154.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28154",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.180",
- "lastModified": "2022-04-04T18:59:18.700",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.187",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28155.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28155.json
index d94e37f8479..662020b3a07 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28155.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28155.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28155",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.320",
- "lastModified": "2022-04-04T18:57:55.403",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.253",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28156.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28156.json
index b0f7faee5d8..68b816c4a3c 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28156.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28156.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28156",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.383",
- "lastModified": "2022-04-04T18:55:50.480",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.317",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28157.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28157.json
index b78c7c1ae3a..592cac70130 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28157.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28157.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28157",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.440",
- "lastModified": "2022-04-04T18:55:04.543",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.377",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28158.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28158.json
index 8adbaf0c555..cb3ccff8c12 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28158.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28158.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28158",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.497",
- "lastModified": "2022-04-04T18:54:05.633",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.447",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28159.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28159.json
index 17b8bd4fd8c..5fd5730b402 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28159.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28159.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28159",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.550",
- "lastModified": "2022-04-04T18:53:08.623",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.513",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28160.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28160.json
index 537f886eaa5..fddd5a9f6db 100644
--- a/CVE-2022/CVE-2022-281xx/CVE-2022-28160.json
+++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28160.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-28160",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.617",
- "lastModified": "2022-04-04T18:52:08.443",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.603",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-668"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-668"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-288xx/CVE-2022-28890.json b/CVE-2022/CVE-2022-288xx/CVE-2022-28890.json
index c519dfc2f36..ed573cb98db 100644
--- a/CVE-2022/CVE-2022-288xx/CVE-2022-28890.json
+++ b/CVE-2022/CVE-2022-288xx/CVE-2022-28890.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-28890",
"sourceIdentifier": "security@apache.org",
"published": "2022-05-05T09:15:08.140",
- "lastModified": "2022-05-13T14:48:57.747",
+ "lastModified": "2023-10-25T17:01:16.697",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -82,12 +82,6 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:apache:jena:*:*:*:*:*:*:*:*",
- "versionEndExcluding": "4.2.0",
- "matchCriteriaId": "A59336DF-15F2-4610-932E-D53BD9869F2A"
- },
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:jena:4.4.0:*:*:*:*:*:*:*",
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29036.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29036.json
index 63285889aaa..3ff9be15b8b 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29036.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29036.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29036",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.080",
- "lastModified": "2022-04-20T18:15:11.647",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.687",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29037.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29037.json
index d5a5aa7b85b..73aece2ddb9 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29037.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29037.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29037",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.133",
- "lastModified": "2022-04-20T18:30:18.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.770",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29038.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29038.json
index d109c95e3f5..cfb3187704e 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29038.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29038.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29038",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.180",
- "lastModified": "2022-04-20T18:49:43.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.837",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29039.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29039.json
index 9f7978a46a0..919650bb399 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29039.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29039.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29039",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.227",
- "lastModified": "2022-04-20T18:30:48.883",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.900",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29040.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29040.json
index de3c7069df9..466fa5a890b 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29040.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29040.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29040",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.277",
- "lastModified": "2022-04-20T18:31:24.370",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:01.957",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29041.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29041.json
index 3c19931c225..7a145695b3d 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29041.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29041.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29041",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.327",
- "lastModified": "2022-04-20T18:33:13.677",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.017",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29042.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29042.json
index 6da4485c0e3..44017b29784 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29042.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29042.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29042",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.373",
- "lastModified": "2022-04-20T18:35:31.613",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.080",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29043.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29043.json
index 103b3bc160e..31ceef3f985 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29043.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29043.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29043",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.420",
- "lastModified": "2022-04-20T18:36:37.853",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.137",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29044.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29044.json
index fed2309bbfe..be9a9de8b47 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29044.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29044.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29044",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.470",
- "lastModified": "2022-04-20T18:37:48.383",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.203",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29045.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29045.json
index 35a89f40423..80237b36a91 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29045.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29045.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29045",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.520",
- "lastModified": "2022-04-20T18:51:46.377",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.290",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29046.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29046.json
index 8fb9da20927..903a77f72a3 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29046.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29046.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29046",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.567",
- "lastModified": "2022-10-27T16:56:14.080",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.350",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29047.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29047.json
index 658d2103cf1..47faec8525b 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29047.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29047.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29047",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.613",
- "lastModified": "2022-04-20T18:54:46.427",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.417",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29048.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29048.json
index 71860f52092..74ebae2ea63 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29048.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29048.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29048",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.663",
- "lastModified": "2022-10-27T16:56:21.503",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.493",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29049.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29049.json
index e13109cbff9..c3e18010380 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29049.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29049.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29049",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.713",
- "lastModified": "2023-07-21T16:44:35.767",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.553",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-20"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29050.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29050.json
index 0aaa7b85009..6e656a802d2 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29050.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29050.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29050",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.760",
- "lastModified": "2022-04-20T18:45:00.883",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.620",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29051.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29051.json
index 54162e105a6..bfb8ce3ec44 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29051.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29051.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29051",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.807",
- "lastModified": "2022-04-20T18:46:31.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.680",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29052.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29052.json
index f0946f2eb05..dd61715ed34 100644
--- a/CVE-2022/CVE-2022-290xx/CVE-2022-29052.json
+++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29052.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29052",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-04-12T20:15:09.850",
- "lastModified": "2022-04-20T18:48:19.420",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.743",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-294xx/CVE-2022-29464.json b/CVE-2022/CVE-2022-294xx/CVE-2022-29464.json
index 6a0a3bdaf2a..ac99a12ed1e 100644
--- a/CVE-2022/CVE-2022-294xx/CVE-2022-29464.json
+++ b/CVE-2022/CVE-2022-294xx/CVE-2022-29464.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29464",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-18T22:15:09.027",
- "lastModified": "2022-09-09T16:54:45.020",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T22:15:09.020",
+ "vulnStatus": "Modified",
"cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
- "value": "Certain WSO2 products allow unrestricted file upload with resultant remote code execution. The attacker must use a /fileupload endpoint with a Content-Disposition directory traversal sequence to reach a directory under the web root, such as a ../../../../repository/deployment/server/webapps directory. This affects WSO2 API Manager 2.2.0 and above through 4.0.0; WSO2 Identity Server 5.2.0 and above through 5.11.0; WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0, and 5.6.0; WSO2 Identity Server as Key Manager 5.3.0 and above through 5.10.0; and WSO2 Enterprise Integrator 6.2.0 and above through 6.6.0."
+ "value": "Certain WSO2 products allow unrestricted file upload with resultant remote code execution. The attacker must use a /fileupload endpoint with a Content-Disposition directory traversal sequence to reach a directory under the web root, such as a ../../../../repository/deployment/server/webapps directory. This affects WSO2 API Manager 2.2.0 up to 4.0.0, WSO2 Identity Server 5.2.0 up to 5.11.0, WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0 and 5.6.0, WSO2 Identity Server as Key Manager 5.3.0 up to 5.11.0, WSO2 Enterprise Integrator 6.2.0 up to 6.6.0, WSO2 Open Banking AM 1.4.0 up to 2.0.0 and WSO2 Open Banking KM 1.4.0, up to 2.0.0."
},
{
"lang": "es",
@@ -94,7 +94,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-434"
+ "value": "CWE-22"
}
]
}
@@ -177,14 +177,6 @@
"Third Party Advisory"
]
},
- {
- "url": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1738",
- "source": "cve@mitre.org",
- "tags": [
- "Mitigation",
- "Vendor Advisory"
- ]
- },
{
"url": "https://github.com/hakivvi/CVE-2022-29464",
"source": "cve@mitre.org",
@@ -192,6 +184,10 @@
"Exploit",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1738/",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-295xx/CVE-2022-29528.json b/CVE-2022/CVE-2022-295xx/CVE-2022-29528.json
index 6165a764227..a8559ad43a9 100644
--- a/CVE-2022/CVE-2022-295xx/CVE-2022-29528.json
+++ b/CVE-2022/CVE-2022-295xx/CVE-2022-29528.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29528",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-20T23:15:08.417",
- "lastModified": "2023-10-10T22:15:10.603",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T21:02:27.433",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -120,7 +120,11 @@
},
{
"url": "https://zigrin.com/cakephp-application-cybersecurity-research-exploring-the-phar-deserialization-php-vulnerability-a-white-box-testing-example/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-295xx/CVE-2022-29529.json b/CVE-2022/CVE-2022-295xx/CVE-2022-29529.json
index ca8f9bd158d..cd382cfa752 100644
--- a/CVE-2022/CVE-2022-295xx/CVE-2022-29529.json
+++ b/CVE-2022/CVE-2022-295xx/CVE-2022-29529.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29529",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-20T23:15:08.467",
- "lastModified": "2023-10-10T22:15:10.687",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:26:58.803",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -112,7 +112,11 @@
},
{
"url": "https://zigrin.com/cakephp-application-cybersecurity-research-protect-your-website-from-stored-xss-attacks-understanding-and-preventing-vulnerabilities-in-open-source-applications/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-295xx/CVE-2022-29530.json b/CVE-2022/CVE-2022-295xx/CVE-2022-29530.json
index 63e7b4dba25..b50cb36475a 100644
--- a/CVE-2022/CVE-2022-295xx/CVE-2022-29530.json
+++ b/CVE-2022/CVE-2022-295xx/CVE-2022-29530.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29530",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-20T23:15:08.513",
- "lastModified": "2023-10-10T22:15:10.753",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:27:03.147",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -112,7 +112,11 @@
},
{
"url": "https://zigrin.com/cakephp-application-cybersecurity-research-protect-your-website-from-stored-xss-attacks-understanding-and-preventing-vulnerabilities-in-open-source-applications/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-295xx/CVE-2022-29531.json b/CVE-2022/CVE-2022-295xx/CVE-2022-29531.json
index 099c1ae1fc8..34353d77c05 100644
--- a/CVE-2022/CVE-2022-295xx/CVE-2022-29531.json
+++ b/CVE-2022/CVE-2022-295xx/CVE-2022-29531.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29531",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-20T23:15:08.557",
- "lastModified": "2023-10-10T22:15:10.817",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T14:27:28.633",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -112,7 +112,11 @@
},
{
"url": "https://zigrin.com/cakephp-application-cybersecurity-research-protect-your-website-from-stored-xss-attacks-understanding-and-preventing-vulnerabilities-in-open-source-applications/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-299xx/CVE-2022-29900.json b/CVE-2022/CVE-2022-299xx/CVE-2022-29900.json
index 383ba7627ee..9c4ac167b65 100644
--- a/CVE-2022/CVE-2022-299xx/CVE-2022-29900.json
+++ b/CVE-2022/CVE-2022-299xx/CVE-2022-29900.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29900",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2022-07-12T19:15:08.383",
- "lastModified": "2023-07-21T16:55:37.847",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-17T18:15:10.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -77,7 +77,6 @@
],
"configurations": [
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -3459,6 +3458,10 @@
"tags": [
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/",
+ "source": "vulnerability@ncsc.ch"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-299xx/CVE-2022-29901.json b/CVE-2022/CVE-2022-299xx/CVE-2022-29901.json
index 72101471378..006c3a66ab6 100644
--- a/CVE-2022/CVE-2022-299xx/CVE-2022-29901.json
+++ b/CVE-2022/CVE-2022-299xx/CVE-2022-29901.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-29901",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2022-07-12T19:15:08.437",
- "lastModified": "2023-02-23T15:40:15.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-17T18:15:10.913",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -3725,7 +3725,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -3751,7 +3750,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -3837,7 +3835,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
@@ -3953,6 +3950,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/",
+ "source": "vulnerability@ncsc.ch"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-29xx/CVE-2022-2941.json b/CVE-2022/CVE-2022-29xx/CVE-2022-2941.json
index a33577b278f..ae0ebee2dec 100644
--- a/CVE-2022/CVE-2022-29xx/CVE-2022-2941.json
+++ b/CVE-2022/CVE-2022-29xx/CVE-2022-2941.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-2941",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:15.200",
- "lastModified": "2022-10-01T02:16:20.627",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T16:15:18.873",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -60,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -70,7 +70,7 @@
]
},
{
- "source": "nvd@nist.gov",
+ "source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
@@ -99,15 +99,6 @@
}
],
"references": [
- {
- "url": "http://packetstormsecurity.com/files/168479/WordPress-WP-UserOnline-2.88.0-Cross-Site-Scripting.html",
- "source": "security@wordfence.com",
- "tags": [
- "Exploit",
- "Third Party Advisory",
- "VDB Entry"
- ]
- },
{
"url": "https://github.com/lesterchan/wp-useronline/commit/59c76b20e4e27489f93dee4ef1254d6204e08b3c",
"source": "security@wordfence.com",
@@ -116,6 +107,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt",
+ "source": "security@wordfence.com"
+ },
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2770235%40wp-useronline&new=2770235%40wp-useronline&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
@@ -124,6 +119,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c4fb14c-de6d-4247-8f83-050f1350f6a2?source=cve",
+ "source": "security@wordfence.com"
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2941",
"source": "security@wordfence.com",
diff --git a/CVE-2022/CVE-2022-29xx/CVE-2022-2943.json b/CVE-2022/CVE-2022-29xx/CVE-2022-2943.json
index eb35b6a0e0c..a5bcf845c92 100644
--- a/CVE-2022/CVE-2022-29xx/CVE-2022-2943.json
+++ b/CVE-2022/CVE-2022-29xx/CVE-2022-2943.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-2943",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-09-06T18:15:15.267",
- "lastModified": "2023-07-20T18:06:23.550",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T21:15:07.633",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -60,7 +60,7 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "security@wordfence.com",
"type": "Primary",
"description": [
{
@@ -70,12 +70,12 @@
]
},
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-73"
+ "value": "CWE-22"
}
]
}
@@ -115,6 +115,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d643d07-7533-430b-a1d8-8e66a2a2c5e6?source=cve",
+ "source": "security@wordfence.com"
+ },
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2943",
"source": "security@wordfence.com",
diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30122.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30122.json
index 3d63bfa0825..779c0772991 100644
--- a/CVE-2022/CVE-2022-301xx/CVE-2022-30122.json
+++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30122.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30122",
"sourceIdentifier": "support@hackerone.com",
"published": "2022-12-05T22:15:10.227",
- "lastModified": "2023-07-21T16:56:08.727",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-22T19:15:08.350",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -96,6 +96,10 @@
"tags": [
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.debian.org/security/2023/dsa-5530",
+ "source": "support@hackerone.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30123.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30123.json
index 8c91d486e58..8e49a6aa5b7 100644
--- a/CVE-2022/CVE-2022-301xx/CVE-2022-30123.json
+++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30123.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30123",
"sourceIdentifier": "support@hackerone.com",
"published": "2022-12-05T22:15:10.280",
- "lastModified": "2022-12-07T04:38:59.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-22T19:15:08.450",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -95,6 +95,10 @@
"tags": [
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.debian.org/security/2023/dsa-5530",
+ "source": "support@hackerone.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30945.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30945.json
index 6590cac63b9..91a50853973 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30945.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30945.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30945",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:08.647",
- "lastModified": "2022-11-16T18:31:32.747",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.800",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30946.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30946.json
index bdac1f533c1..3a17767cd35 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30946.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30946.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30946",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:08.737",
- "lastModified": "2022-05-26T04:50:02.587",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30947.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30947.json
index c9281495542..345f0d3a522 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30947.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30947.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30947",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:08.797",
- "lastModified": "2022-05-26T14:57:41.530",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:02.943",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-435"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30948.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30948.json
index 000b6601717..92191316ab8 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30948.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30948.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30948",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:08.853",
- "lastModified": "2022-05-26T15:00:28.320",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.013",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-435"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30949.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30949.json
index 2fa60540873..233a7944465 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30949.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30949.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30949",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:08.963",
- "lastModified": "2022-05-26T15:35:25.460",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-435"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30950.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30950.json
index 0623072f605..80e5d835641 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30950.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30950.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30950",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:09.073",
- "lastModified": "2022-05-26T15:31:43.850",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.143",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-120"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-119"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30951.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30951.json
index 1c53940fadf..881c08da950 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30951.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30951.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30951",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:09.187",
- "lastModified": "2022-05-26T15:32:40.163",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.210",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30952.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30952.json
index 3f6f99208d7..60109605929 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30952.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30952.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30952",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:09.293",
- "lastModified": "2022-11-11T02:44:30.317",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.270",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-522"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30953.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30953.json
index f8aa397a321..0d76efe274b 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30953.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30953.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30953",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:09.397",
- "lastModified": "2022-05-26T15:48:54.330",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.337",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30954.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30954.json
index de4120e0778..2a5c9680dbd 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30954.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30954.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30954",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:09.450",
- "lastModified": "2022-05-26T15:49:55.847",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.397",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30955.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30955.json
index d2e699d5488..f6965d49bf1 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30955.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30955.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30955",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:09.563",
- "lastModified": "2022-05-26T15:53:10.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.460",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30956.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30956.json
index 3e5997e5531..105ad069474 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30956.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30956.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30956",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:09.687",
- "lastModified": "2022-05-26T15:53:54.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.517",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30957.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30957.json
index 860bf52d117..ffbbea16856 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30957.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30957.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30957",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:09.910",
- "lastModified": "2022-05-26T15:54:24.277",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.577",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30958.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30958.json
index db12afb6811..edc6ca6b8e5 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30958.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30958.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30958",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.013",
- "lastModified": "2022-05-25T16:53:16.700",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.643",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30959.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30959.json
index e9af1acd082..86dc8221727 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30959.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30959.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30959",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.117",
- "lastModified": "2022-05-25T17:01:00.190",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.700",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30960.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30960.json
index 938cd61e7f7..787d85dabb7 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30960.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30960.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30960",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.203",
- "lastModified": "2022-05-25T13:43:53.040",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.760",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30961.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30961.json
index 555e30b7648..dceb3c81efc 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30961.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30961.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30961",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.293",
- "lastModified": "2022-05-25T13:43:37.280",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.820",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30962.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30962.json
index 93f669b796a..0ada348963e 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30962.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30962.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30962",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.417",
- "lastModified": "2022-05-25T13:42:48.457",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.880",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30963.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30963.json
index e8ff11c460f..c0f43df8f24 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30963.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30963.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30963",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.523",
- "lastModified": "2022-05-25T13:27:32.990",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.937",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30964.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30964.json
index ed02f40722f..635babb88ab 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30964.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30964.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30964",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.617",
- "lastModified": "2022-05-25T16:21:17.000",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:03.993",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30965.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30965.json
index 585176d1d68..676efab89e5 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30965.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30965.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30965",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.717",
- "lastModified": "2022-05-25T16:21:33.147",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:04.050",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30966.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30966.json
index 68637aa2559..05885e27b7f 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30966.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30966.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30966",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.827",
- "lastModified": "2023-06-29T14:51:00.000",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:04.113",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-116"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30967.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30967.json
index e8725908ad4..80c53888305 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30967.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30967.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30967",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.937",
- "lastModified": "2022-05-25T16:17:18.687",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:04.193",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30968.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30968.json
index 5c80fc63e07..bc2d045772a 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30968.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30968.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30968",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:11.037",
- "lastModified": "2022-05-25T16:12:55.987",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:04.270",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30969.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30969.json
index 3d285f16f74..b9b3c326757 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30969.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30969.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30969",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:11.147",
- "lastModified": "2022-05-25T15:27:28.980",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:04.327",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30970.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30970.json
index 8b6aaabbe0e..be71f6282b7 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30970.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30970.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30970",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:11.257",
- "lastModified": "2022-05-25T14:56:15.187",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:04.397",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30971.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30971.json
index 0c9b8047c19..da61e29713d 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30971.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30971.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30971",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:11.370",
- "lastModified": "2022-05-25T15:28:28.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:04.460",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30972.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30972.json
index 7c62d47e0fd..fc0e95c5420 100644
--- a/CVE-2022/CVE-2022-309xx/CVE-2022-30972.json
+++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30972.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-30972",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:11.477",
- "lastModified": "2022-05-25T16:59:09.213",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:04.517",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-30xx/CVE-2022-3059.json b/CVE-2022/CVE-2022-30xx/CVE-2022-3059.json
index 9cb7567f4b8..317360c16ee 100644
--- a/CVE-2022/CVE-2022-30xx/CVE-2022-3059.json
+++ b/CVE-2022/CVE-2022-30xx/CVE-2022-3059.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-3059",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:12.330",
- "lastModified": "2022-11-03T16:44:03.187",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:15.660",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application was vulnerable to multiple instances of SQL injection (authenticated and unauthenticated) through a vulnerable parameter. Due to the stacked query support, complex SQL commands could be crafted and injected into the vulnerable parameter and using a sleep based inferential SQL injection it was possible to extract data from the database."
+ "value": "\nThe application was vulnerable to multiple instances of SQL injection (authenticated and unauthenticated) through a vulnerable parameter. Due to the stacked query support, complex SQL commands could be crafted and injected into the vulnerable parameter and using a sleep based inferential SQL injection it was possible to extract data from the database.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n era vulnerable a m\u00faltiples instancias de inyecci\u00f3n SQL (autenticadas y no autenticadas) a trav\u00e9s de un par\u00e1metro vulnerable. Debido al soporte de consultas apiladas, se pudieron manipular e inyectar comandos SQL complejos en el par\u00e1metro vulnerable y, utilizando una inyecci\u00f3n SQL inferencial basada en suspensi\u00f3n, fue posible extraer datos de la base de datos."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-327xx/CVE-2022-32755.json b/CVE-2022/CVE-2022-327xx/CVE-2022-32755.json
index e615b80ba8b..09d6edb80fa 100644
--- a/CVE-2022/CVE-2022-327xx/CVE-2022-32755.json
+++ b/CVE-2022/CVE-2022-327xx/CVE-2022-32755.json
@@ -2,16 +2,40 @@
"id": "CVE-2022-32755",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-14T15:15:09.643",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:13:07.170",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Directory Server 6.4.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 228505."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Directory Server 6.4.0 es vulnerable a un ataque de XML External Entity Injection (XXE) al procesar datos XML. Un atacante remoto podr\u00eda aprovechar esta vulnerabilidad para exponer informaci\u00f3n confidencial o consumir recursos de memoria. ID de IBM X-Force: 228505."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-611"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,49 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "24A76D30-88CD-418A-BEA2-BAD93A892FF0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_directory_suite:8.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F41F379B-77B9-4D07-AF10-14C4A000ECA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_directory:10.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "213D3285-0B6B-49AD-81C2-7265F3349B09"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228505",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047428",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-331xx/CVE-2022-33161.json b/CVE-2022/CVE-2022-331xx/CVE-2022-33161.json
index 10760752f0a..9ac39bb9b91 100644
--- a/CVE-2022/CVE-2022-331xx/CVE-2022-33161.json
+++ b/CVE-2022/CVE-2022-331xx/CVE-2022-33161.json
@@ -2,16 +2,40 @@
"id": "CVE-2022-33161",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-14T15:15:09.723",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:32:01.117",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Directory Server 6.4.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. X-Force ID: 228569."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Directory Server 6.4.0 podr\u00eda permitir que un atacante remoto obtenga informaci\u00f3n confidencial, causada por una falla al habilitar correctamente HTTP Strict Transport Security. Un atacante podr\u00eda aprovechar esta vulnerabilidad para obtener informaci\u00f3n confidencial utilizando t\u00e9cnicas de intermediario. ID de IBM X-Force: 228569."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-311"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,18 +80,62 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_directory_integrator:7.2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65A1A95C-1687-4304-88C5-1BEB58BBC8DF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_directory_server:6.4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "24A76D30-88CD-418A-BEA2-BAD93A892FF0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_directory_suite:8.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F41F379B-77B9-4D07-AF10-14C4A000ECA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_directory:10.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "213D3285-0B6B-49AD-81C2-7265F3349B09"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228569",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047116",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047428",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-331xx/CVE-2022-33165.json b/CVE-2022/CVE-2022-331xx/CVE-2022-33165.json
index 1eb4cbab64b..305253a3af0 100644
--- a/CVE-2022/CVE-2022-331xx/CVE-2022-33165.json
+++ b/CVE-2022/CVE-2022-331xx/CVE-2022-33165.json
@@ -2,16 +2,40 @@
"id": "CVE-2022-33165",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-14T15:15:09.797",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:34:14.447",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Directory Server 6.4.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 228582."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Directory Server 6.4.0 podr\u00eda permitir que un atacante remoto atraviese directorios del sistema. Un atacante podr\u00eda enviar una solicitud URL especialmente manipulada que contenga secuencias de \"puntos\" (/../) para ver archivos arbitrarios en el sistema. ID de IBM X-Force: 228582."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,18 +80,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_directory_integrator:7.2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65A1A95C-1687-4304-88C5-1BEB58BBC8DF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228582",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047116",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047428",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Not Applicable"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33321.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33321.json
index 1cfd964ea2a..1a8d2992dad 100644
--- a/CVE-2022/CVE-2022-333xx/CVE-2022-33321.json
+++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33321.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-33321",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2022-11-08T20:15:10.080",
- "lastModified": "2023-01-09T19:48:51.017",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T06:15:07.963",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section."
+ "value": "Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password).\nThe wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability.\nAs for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en la transmisi\u00f3n de texto plano de informaci\u00f3n confidencial debido al uso de autenticaci\u00f3n b\u00e1sica para conexiones HTTP en productos de electr\u00f3nica de consumo de Mitsubishi Electric (GU\u00cdA ECO DEL MONITOR DE COLOR FOTOVOLTAICO, adaptador HEMS, interfaz Wi-Fi, aire acondicionado, placa de inducci\u00f3n, unidad de medici\u00f3n de energ\u00eda HEMS de Mitsubishi Electric , refrigerador, control remoto con interfaz Wi-Fi, TERMO VENTILADOR DE BA\u00d1O, olla arrocera, adaptador de control HEMS de Mitsubishi Electric, ventilador de recuperaci\u00f3n de energ\u00eda, interruptor inteligente, ventilador, ventilador de campana extractora, unidad de medici\u00f3n de energ\u00eda y purificador de aire) permite un atacante remoto no autenticado revelar informaci\u00f3n en los productos o provocar una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS) como resultado del rastreo de informaci\u00f3n de credenciales (nombre de usuario y contrase\u00f1a). La amplia gama de modelos/versiones de productos de electr\u00f3nica de consumo de Mitsubishi Electric se ven afectados por esta vulnerabilidad. En cuanto a los modelos/versiones de productos afectados, consulte el aviso de Mitsubishi Electric que se enumera en la secci\u00f3n [References]."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33322.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33322.json
index b2554b3158b..c5a4582a7c6 100644
--- a/CVE-2022/CVE-2022-333xx/CVE-2022-33322.json
+++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33322.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-33322",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2022-11-08T20:15:11.017",
- "lastModified": "2023-01-31T19:03:56.877",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T06:15:09.297",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section."
+ "value": "Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) en productos de electr\u00f3nica de consumo de Mitsubishi Electric (aire acondicionado, interfaz Wi-Fi, refrigerador, adaptador HEMS, control remoto con interfaz Wi-Fi, TERMO VENTILADOR DE BA\u00d1O, olla arrocera, adaptador de control HEMS de Mitsubishi Electric, ventilador de recuperaci\u00f3n de energ\u00eda, Suiche Inteligente y Purificador de Aire) permite a un atacante remoto no autenticado ejecutar un script malicioso en el navegador de un usuario para revelar informaci\u00f3n, etc. La amplia gama de modelos/versiones de productos de electr\u00f3nica de consumo de Mitsubishi Electric se ven afectados por esta vulnerabilidad. En cuanto a los modelos/versiones de productos afectados, consulte el aviso de Mitsubishi Electric que se enumera en la secci\u00f3n [References]."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-338xx/CVE-2022-33859.json b/CVE-2022/CVE-2022-338xx/CVE-2022-33859.json
index 03400175bba..9819f6ca166 100644
--- a/CVE-2022/CVE-2022-338xx/CVE-2022-33859.json
+++ b/CVE-2022/CVE-2022-338xx/CVE-2022-33859.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-33859",
"sourceIdentifier": "CybersecurityCOE@eaton.com",
"published": "2022-10-28T02:15:17.343",
- "lastModified": "2022-11-01T18:23:17.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T07:15:08.907",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A security vulnerability was discovered in the Eaton Foreseer EPMS software. Foreseer EPMS connects an operation\u2019s vast array of devices to assist in the reduction of energy consumption and avoid unplanned downtime caused by the failures of critical systems. A threat actor may upload arbitrary files using the file upload feature. This vulnerability is present in versions 4.x, 5.x, 6.x & 7.0 to 7.5. A new version (v7.6) containing the remediation has been made available by Eaton and a mitigation has been provided for the affected versions that are currently supported. Customers are advised to update the software to the latest version (v7.6). Foreseer EPMS versions 4.x, 5.x, 6.x are no longer supported by Eaton. Please refer to the End-of-Support notification https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html ."
+ "value": "A security vulnerability was discovered in the Eaton Foreseer EPMS software. Foreseer EPMS connects an operation\u2019s vast array of devices to assist in the reduction of energy consumption and avoid unplanned downtime caused by the failures of critical systems. A threat actor may upload arbitrary files using the file upload feature. \n\nThis vulnerability is present in versions 4.x, 5.x, 6.x & 7.0 to 7.5. A new version (v7.6) containing the remediation has been made available by Eaton and a mitigation has been provided for the affected versions that are currently supported. \n\nCustomers are advised to update the software to the latest version (v7.6).\n\nForeseer EPMS versions 4.x, 5.x, 6.x are no longer supported by Eaton. Please\u00a0refer to the End-of-Support notification https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html ."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 una vulnerabilidad de seguridad en el software Eaton Foreseer EPMS. Foreseer EPMS conecta la amplia gama de dispositivos de una operaci\u00f3n para ayudar a reducir el consumo de energ\u00eda y evitar tiempos de inactividad no planificados causados ??por fallas de sistemas cr\u00edticos. Un actor de amenazas puede cargar archivos arbitrarios utilizando la funci\u00f3n de carga de archivos. Esta vulnerabilidad est\u00e1 presente en las versiones 4.x, 5.x, 6.x y 7.0 a 7.5. Eaton puso a disposici\u00f3n una nueva versi\u00f3n (v7.6) que contiene la soluci\u00f3n y se proporcion\u00f3 una mitigaci\u00f3n para las versiones afectadas que son compatibles actualmente. Se recomienda a los clientes que actualicen el software a la \u00faltima versi\u00f3n (v7.6). Eaton ya no admite las versiones 4.x, 5.x y 6.x de Foreseer EPMS. Consulte la notificaci\u00f3n de fin de soporte https://www.eaton.com/in/en-us/catalog/services/foreseer/foreseer-legacy.html."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-33xx/CVE-2022-3342.json b/CVE-2022/CVE-2022-33xx/CVE-2022-3342.json
new file mode 100644
index 00000000000..450b78749d8
--- /dev/null
+++ b/CVE-2022/CVE-2022-33xx/CVE-2022-3342.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2022-3342",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.787",
+ "lastModified": "2023-10-27T18:53:17.093",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Jetpack CRM plugin for WordPress is vulnerable to PHAR deserialization via the \u2018zbscrmcsvimpf\u2019 parameter in the 'zeroBSCRM_CSVImporterLitehtml_app' function in versions up to, and including, 5.3.1. While the function performs a nonce check, steps 2 and 3 of the check do not take any action upon a failed check. These steps then perform a 'file_exists' check on the value of 'zbscrmcsvimpf'. If a phar:// archive is supplied, its contents will be deserialized and an object injected in the execution stream. This allows an unauthenticated attacker to obtain object injection if they are able to upload a phar archive (for instance if the site supports image uploads) and then trick an administrator into performing an action, such as clicking a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Jetpack CRM para WordPress es vulnerable a la deserializaci\u00f3n PHAR a trav\u00e9s del par\u00e1metro 'zbscrmcsvimpf' en la funci\u00f3n 'zeroBSCRM_CSVImporterLitehtml_app' en versiones hasta la 5.3.1 incluida. Si bien la funci\u00f3n realiza una verificaci\u00f3n nonce, los pasos 2 y 3 de la verificaci\u00f3n no realizan ninguna acci\u00f3n ante una verificaci\u00f3n fallida. Luego, estos pasos realizan una verificaci\u00f3n de 'file_exists' en el valor de 'zbscrmcsvimpf'. Si se proporciona un archivo phar://, su contenido se deserializar\u00e1 y se inyectar\u00e1 un objeto en el flujo de ejecuci\u00f3n. Esto permite a un atacante no autenticado obtener una inyecci\u00f3n de objetos si puede cargar un archivo phar (por ejemplo, si el sitio admite la carga de im\u00e1genes) y luego enga\u00f1ar a un administrador para que realice una acci\u00f3n, como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:automattic:jetpack_crm:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "5.3.1",
+ "matchCriteriaId": "23B2D955-C8DB-410C-854D-E1276B683ABA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/zero-bs-crm/trunk/includes/ZeroBSCRM.CSVImporter.php?rev=2790863",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2805282/zero-bs-crm/trunk/includes/ZeroBSCRM.CSVImporter.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98ab264f-b210-41d0-bb6f-b4f31d933f80?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-33xx/CVE-2022-3388.json b/CVE-2022/CVE-2022-33xx/CVE-2022-3388.json
index 9ffd5f18c79..a64f73299ab 100644
--- a/CVE-2022/CVE-2022-33xx/CVE-2022-3388.json
+++ b/CVE-2022/CVE-2022-33xx/CVE-2022-3388.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-3388",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2022-11-21T19:15:13.353",
- "lastModified": "2022-12-08T15:26:01.427",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-19T05:15:58.283",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "An input validation vulnerability exists in the Monitor Pro interface of MicroSCADA Pro and MicroSCADA X SYS600. An authenticated user can launch an administrator level remote code execution irrespective of the authenticated user's role."
+ "value": "\n\n\nAn input validation vulnerability exists in the Monitor Pro interface of MicroSCADA\nPro and MicroSCADA X SYS600. An authenticated user can launch an administrator level remote code execution irrespective of the authenticated user's role.\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de validaci\u00f3n de entrada en la interfaz Monitor Pro de MicroSCADA Pro y MicroSCADA X SYS600. Un usuario autenticado puede iniciar una ejecuci\u00f3n remota de c\u00f3digo a nivel de administrador independientemente de la funci\u00f3n del usuario autenticado."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-340xx/CVE-2022-34092.json b/CVE-2022/CVE-2022-340xx/CVE-2022-34092.json
index 524f71b39d5..5f56bea51c2 100644
--- a/CVE-2022/CVE-2022-340xx/CVE-2022-34092.json
+++ b/CVE-2022/CVE-2022-340xx/CVE-2022-34092.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-34092",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-14T22:15:08.993",
- "lastModified": "2022-07-20T10:04:15.617",
+ "lastModified": "2023-10-18T15:51:58.343",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:i3geo_project:i3geo:7.0.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "D1CA9717-10E3-4BE2-9C09-564E53225B7D"
+ "criteria": "cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADD2D314-E4BD-4399-BC3E-9BDC7A780477"
}
]
}
diff --git a/CVE-2022/CVE-2022-340xx/CVE-2022-34093.json b/CVE-2022/CVE-2022-340xx/CVE-2022-34093.json
index a27ba4ddf2a..c37c1a097dc 100644
--- a/CVE-2022/CVE-2022-340xx/CVE-2022-34093.json
+++ b/CVE-2022/CVE-2022-340xx/CVE-2022-34093.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-34093",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-14T22:15:09.037",
- "lastModified": "2022-07-20T10:04:28.127",
+ "lastModified": "2023-10-18T15:52:09.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:i3geo_project:i3geo:7.0.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "D1CA9717-10E3-4BE2-9C09-564E53225B7D"
+ "criteria": "cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADD2D314-E4BD-4399-BC3E-9BDC7A780477"
}
]
}
diff --git a/CVE-2022/CVE-2022-340xx/CVE-2022-34094.json b/CVE-2022/CVE-2022-340xx/CVE-2022-34094.json
index c42b24e1cfe..a319e9a28e7 100644
--- a/CVE-2022/CVE-2022-340xx/CVE-2022-34094.json
+++ b/CVE-2022/CVE-2022-340xx/CVE-2022-34094.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-34094",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-14T22:15:09.083",
- "lastModified": "2022-07-20T10:04:03.587",
+ "lastModified": "2023-10-18T15:52:19.337",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:i3geo_project:i3geo:7.0.5:*:*:*:*:*:*:*",
- "matchCriteriaId": "D1CA9717-10E3-4BE2-9C09-564E53225B7D"
+ "criteria": "cpe:2.3:a:softwarepublico:i3geo:7.0.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADD2D314-E4BD-4399-BC3E-9BDC7A780477"
}
]
}
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34132.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34132.json
index c2bcfc5b500..25da5b6c674 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34132.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34132.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-34132",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-28T00:15:08.313",
- "lastModified": "2022-07-06T18:54:41.543",
+ "lastModified": "2023-10-25T15:00:33.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:jorani_project:jorani:1.0.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "00665EA7-7D22-4226-801E-ABA4BD94D0D7"
+ "criteria": "cpe:2.3:a:jorani:jorani:1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE8B2D2D-7CCC-4688-9C1C-5C2512F140E6"
}
]
}
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34133.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34133.json
index 9e901d1e8fd..02d8c36feec 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34133.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34133.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-34133",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-28T00:15:08.360",
- "lastModified": "2022-07-06T18:54:54.287",
+ "lastModified": "2023-10-25T15:00:33.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:jorani_project:jorani:1.0.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "00665EA7-7D22-4226-801E-ABA4BD94D0D7"
+ "criteria": "cpe:2.3:a:jorani:jorani:1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE8B2D2D-7CCC-4688-9C1C-5C2512F140E6"
}
]
}
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34134.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34134.json
index 338f29b5b01..1713b5f6826 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34134.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34134.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-34134",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-28T00:15:08.407",
- "lastModified": "2022-07-06T18:55:09.587",
+ "lastModified": "2023-10-25T15:00:33.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:jorani_project:jorani:1.0.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "00665EA7-7D22-4226-801E-ABA4BD94D0D7"
+ "criteria": "cpe:2.3:a:jorani:jorani:1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE8B2D2D-7CCC-4688-9C1C-5C2512F140E6"
}
]
}
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34170.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34170.json
index 2967eb25200..f3a63177bd8 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34170.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34170.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34170",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.253",
- "lastModified": "2022-11-05T02:16:09.813",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:05.083",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34171.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34171.json
index da813709fa0..0e8d6cf3c0d 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34171.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34171.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34171",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.317",
- "lastModified": "2022-11-05T02:21:28.840",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:05.217",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34172.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34172.json
index 8b9295b9f5a..c570ffe1a63 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34172.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34172.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34172",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.383",
- "lastModified": "2022-11-05T02:21:39.413",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:05.293",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34173.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34173.json
index 922171bc4ab..be4fd885481 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34173.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34173.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34173",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.447",
- "lastModified": "2022-11-05T02:21:33.360",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:05.420",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34174.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34174.json
index e68c150e2b1..e69f7706056 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34174.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34174.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34174",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.507",
- "lastModified": "2022-06-29T15:29:33.550",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:05.660",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-203"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-208"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34175.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34175.json
index 729fd37e534..0103f82a682 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34175.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34175.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34175",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.563",
- "lastModified": "2022-10-20T16:28:16.470",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:05.823",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34176.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34176.json
index c2a454f1208..f582f9c08c6 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34176.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34176.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34176",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.620",
- "lastModified": "2022-06-29T16:52:44.270",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:05.927",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34177.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34177.json
index 23052171394..3aa2806ef97 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34177.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34177.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34177",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.680",
- "lastModified": "2022-06-29T18:35:17.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:06.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34178.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34178.json
index 6628e1ac770..20b0a092aa1 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34178.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34178.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34178",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.737",
- "lastModified": "2022-06-29T15:31:42.053",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:06.300",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34179.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34179.json
index 7865fe988dd..d205f1e7683 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34179.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34179.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34179",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.810",
- "lastModified": "2022-06-29T15:34:03.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:06.417",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34180.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34180.json
index 45df3babe28..8e00971b049 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34180.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34180.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-34180",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.867",
- "lastModified": "2023-10-10T22:15:11.043",
+ "lastModified": "2023-10-25T18:17:06.497",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -64,19 +64,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34181.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34181.json
index c86522a74d6..53cec1d0940 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34181.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34181.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34181",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.923",
- "lastModified": "2022-06-29T15:37:26.327",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:06.667",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34182.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34182.json
index 8802284af29..dc6ad6ecaae 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34182.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34182.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34182",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.990",
- "lastModified": "2022-06-29T15:37:55.027",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:06.770",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34183.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34183.json
index b964d2fcc26..3159792b7f2 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34183.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34183.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34183",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.057",
- "lastModified": "2022-06-29T15:38:36.073",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:06.887",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34184.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34184.json
index 54452cfa48a..40a8fafabca 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34184.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34184.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34184",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.123",
- "lastModified": "2022-06-30T11:46:22.767",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:06.980",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34185.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34185.json
index 2ab82981eb4..a4f5c019d25 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34185.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34185.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34185",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.190",
- "lastModified": "2022-06-30T11:48:22.283",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.100",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34186.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34186.json
index 4cb64b4a937..864e3a353c4 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34186.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34186.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34186",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.257",
- "lastModified": "2022-06-30T11:53:37.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.203",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34187.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34187.json
index 59ca29aaa72..5b6687f7c8d 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34187.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34187.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34187",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.327",
- "lastModified": "2022-06-30T12:02:58.680",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.410",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34188.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34188.json
index fc3bff610c6..3bac95cfccb 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34188.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34188.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34188",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.387",
- "lastModified": "2022-06-30T12:18:00.860",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.527",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34189.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34189.json
index ac6cbc387a4..41cf8d92759 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34189.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34189.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34189",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.453",
- "lastModified": "2022-06-30T12:23:45.023",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.587",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34190.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34190.json
index 6840a835d9b..a0e959d1fa5 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34190.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34190.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34190",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.547",
- "lastModified": "2022-06-29T18:36:44.317",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.647",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34191.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34191.json
index 784f3eb44c0..e21e121c7dc 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34191.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34191.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34191",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.610",
- "lastModified": "2022-06-29T18:41:34.910",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.703",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34192.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34192.json
index 4e66c17afc3..3b2cac48210 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34192.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34192.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34192",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.670",
- "lastModified": "2022-06-29T18:49:13.123",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.767",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34193.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34193.json
index 5ed1ba01d8b..60dd3a3e0c1 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34193.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34193.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34193",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.730",
- "lastModified": "2022-06-29T18:56:55.890",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.830",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34194.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34194.json
index 36277f70707..93dbeb28745 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34194.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34194.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34194",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.797",
- "lastModified": "2022-06-29T19:02:41.823",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.887",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34195.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34195.json
index 99cfb9094b6..94952d7cbfa 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34195.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34195.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34195",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.857",
- "lastModified": "2022-06-29T19:06:05.827",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.940",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34196.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34196.json
index 4f2c33c853c..a6cd11f0165 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34196.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34196.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34196",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.920",
- "lastModified": "2022-06-29T19:18:03.893",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:07.997",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34197.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34197.json
index fb58822877a..4485aa70661 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34197.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34197.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34197",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.990",
- "lastModified": "2022-06-29T19:22:09.550",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.050",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34198.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34198.json
index 39488c87b28..a6e5a2aea08 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34198.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34198.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34198",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.107",
- "lastModified": "2022-06-29T19:24:10.473",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.107",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34199.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34199.json
index 5c59eae729c..7e57b1e0e0e 100644
--- a/CVE-2022/CVE-2022-341xx/CVE-2022-34199.json
+++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34199.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34199",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.220",
- "lastModified": "2023-06-29T15:43:15.760",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.163",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34200.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34200.json
index a5bd90201ff..86b34eb9f89 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34200.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34200.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34200",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.283",
- "lastModified": "2022-10-07T19:01:24.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.227",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34201.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34201.json
index 8f1735f131d..4ef9c524fb0 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34201.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34201.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34201",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.343",
- "lastModified": "2022-06-29T19:35:58.213",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.290",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34202.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34202.json
index 447b576af1d..1918404b90a 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34202.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34202.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34202",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.403",
- "lastModified": "2022-06-29T19:39:03.573",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.347",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34203.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34203.json
index 4d7770f7ffa..16ceb22f349 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34203.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34203.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34203",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.473",
- "lastModified": "2022-06-29T19:43:30.710",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.407",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34204.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34204.json
index 9625c323ded..0d48dfd2152 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34204.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34204.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34204",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.540",
- "lastModified": "2022-06-30T04:07:01.760",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.460",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34205.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34205.json
index b632f3985ab..47512fdce18 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34205.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34205.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34205",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.607",
- "lastModified": "2022-06-29T22:23:51.680",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.520",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34206.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34206.json
index dd279f83341..8d45309d121 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34206.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34206.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34206",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.677",
- "lastModified": "2022-06-30T04:09:39.060",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.577",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34207.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34207.json
index 854e3fbbb64..4858b06cdf0 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34207.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34207.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34207",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.737",
- "lastModified": "2022-06-29T22:30:26.350",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.633",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34208.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34208.json
index eafa4a97ff6..1ec0a259d77 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34208.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34208.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34208",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.797",
- "lastModified": "2022-06-30T04:10:18.830",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34209.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34209.json
index 3574c215181..92ab275c3e2 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34209.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34209.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34209",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.857",
- "lastModified": "2022-06-29T22:28:20.000",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.747",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34210.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34210.json
index f6d18d6c027..d569e6791e6 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34210.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34210.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34210",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.913",
- "lastModified": "2022-06-29T22:24:49.147",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.800",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34211.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34211.json
index c535feb3e57..23f817f1916 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34211.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34211.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34211",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:17.970",
- "lastModified": "2022-06-29T22:26:32.987",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.857",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34212.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34212.json
index a70fc58c7cc..0464b509c19 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34212.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34212.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34212",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:18.027",
- "lastModified": "2022-06-29T22:23:24.557",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.913",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34213.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34213.json
index 13c68198e5e..2173b37f57c 100644
--- a/CVE-2022/CVE-2022-342xx/CVE-2022-34213.json
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34213.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34213",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:18.083",
- "lastModified": "2022-06-30T03:57:12.450",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:08.970",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-344xx/CVE-2022-34401.json b/CVE-2022/CVE-2022-344xx/CVE-2022-34401.json
index 17049a6c68b..5218269a02a 100644
--- a/CVE-2022/CVE-2022-344xx/CVE-2022-34401.json
+++ b/CVE-2022/CVE-2022-344xx/CVE-2022-34401.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-34401",
"sourceIdentifier": "security_alert@emc.com",
"published": "2023-01-18T06:15:11.493",
- "lastModified": "2023-01-25T19:29:37.517",
+ "lastModified": "2023-10-18T18:12:55.640",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -114,9 +114,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:dell:alienware_m17_ryzen_r5_firmware:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:o:dell:alienware_m17_r5_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4.3",
- "matchCriteriaId": "BE326A51-40F2-4F8E-ADAE-C7AF0957BB7A"
+ "matchCriteriaId": "1B22D1FA-F68E-41B7-BCF2-D6E7AAF8D9B8"
}
]
},
@@ -126,8 +126,8 @@
"cpeMatch": [
{
"vulnerable": false,
- "criteria": "cpe:2.3:h:dell:alienware_m17_ryzen_r5:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "6CC14402-0228-4FBD-95A3-E106F1A38CBB"
+ "criteria": "cpe:2.3:h:dell:alienware_m17_r5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5E8A465D-8F53-49CB-9498-D2894CEE8264"
}
]
}
diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34676.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34676.json
index a2fc167c9ef..be71f4cb82e 100644
--- a/CVE-2022/CVE-2022-346xx/CVE-2022-34676.json
+++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34676.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34676",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:09.903",
- "lastModified": "2023-10-03T15:15:37.477",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:12:25.197",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -206,7 +206,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34677.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34677.json
index 70613c66585..a717242125e 100644
--- a/CVE-2022/CVE-2022-346xx/CVE-2022-34677.json
+++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34677.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34677",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:09.983",
- "lastModified": "2023-10-03T15:15:37.563",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:13:58.477",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -323,12 +323,30 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00010.html",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5415",
@@ -339,7 +357,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34678.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34678.json
index b470dde07af..272fb6cf750 100644
--- a/CVE-2022/CVE-2022-346xx/CVE-2022-34678.json
+++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34678.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34678",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:10.073",
- "lastModified": "2023-10-03T15:15:37.663",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:15:22.587",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -276,7 +276,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34679.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34679.json
index f60b190af6c..77a1d0d4826 100644
--- a/CVE-2022/CVE-2022-346xx/CVE-2022-34679.json
+++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34679.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34679",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:10.163",
- "lastModified": "2023-10-03T15:15:37.763",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:17:12.797",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -206,7 +206,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34680.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34680.json
index 58ceb95d785..0539615050b 100644
--- a/CVE-2022/CVE-2022-346xx/CVE-2022-34680.json
+++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34680.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34680",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:10.247",
- "lastModified": "2023-10-03T15:15:37.857",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:19:14.613",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -323,12 +323,30 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00010.html",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5415",
@@ -339,7 +357,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34682.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34682.json
index 48c15e150e1..35898aefd98 100644
--- a/CVE-2022/CVE-2022-346xx/CVE-2022-34682.json
+++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34682.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34682",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:10.417",
- "lastModified": "2023-10-03T15:15:37.950",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:20:33.350",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -206,7 +206,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-346xx/CVE-2022-34684.json b/CVE-2022/CVE-2022-346xx/CVE-2022-34684.json
index ab872134162..18193ddf722 100644
--- a/CVE-2022/CVE-2022-346xx/CVE-2022-34684.json
+++ b/CVE-2022/CVE-2022-346xx/CVE-2022-34684.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34684",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:10.583",
- "lastModified": "2023-10-03T15:15:38.040",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:20:43.180",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -262,7 +262,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34777.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34777.json
index c651bb68bb6..ab920acb107 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34777.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34777.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34777",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:09.543",
- "lastModified": "2022-07-08T18:00:47.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.027",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34778.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34778.json
index 8497467136b..167282d240e 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34778.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34778.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34778",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:09.747",
- "lastModified": "2022-07-11T13:22:56.673",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.100",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34779.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34779.json
index 34911706dfe..65a4d42e239 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34779.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34779.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34779",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:09.920",
- "lastModified": "2022-07-08T17:04:47.477",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.163",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -95,11 +83,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34780.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34780.json
index c7643bee389..88319b69d98 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34780.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34780.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34780",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:10.087",
- "lastModified": "2022-07-08T17:07:45.567",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.223",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -95,11 +83,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34781.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34781.json
index 21102d63639..b271fd1031a 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34781.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34781.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34781",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:10.237",
- "lastModified": "2022-07-08T17:08:20.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.283",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -95,11 +83,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34782.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34782.json
index 9a990eb997b..f34f2a6fae3 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34782.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34782.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34782",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:10.410",
- "lastModified": "2022-07-08T17:09:52.697",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.337",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34783.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34783.json
index b8786fcc2a2..b06d37e3643 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34783.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34783.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34783",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:10.577",
- "lastModified": "2022-07-08T17:10:44.263",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.400",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34784.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34784.json
index 345bd6f664a..8c3cfac1f8e 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34784.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34784.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34784",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:10.747",
- "lastModified": "2022-07-08T17:11:11.243",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.453",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34785.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34785.json
index e631847595b..b5b016c7ff2 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34785.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34785.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34785",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:10.930",
- "lastModified": "2022-07-08T17:12:01.380",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.517",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34786.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34786.json
index 0d98da30f82..a52ecef3920 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34786.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34786.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34786",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:11.140",
- "lastModified": "2022-07-08T17:12:40.300",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.577",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34787.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34787.json
index 45b2adf6b80..61b27d99892 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34787.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34787.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34787",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:11.333",
- "lastModified": "2022-07-08T17:14:12.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.633",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34788.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34788.json
index dd3447ecc13..9c29b5a8ee9 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34788.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34788.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34788",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:11.507",
- "lastModified": "2022-07-08T17:14:34.570",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34789.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34789.json
index 6f73b8d8d96..c3c845987b6 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34789.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34789.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34789",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:11.707",
- "lastModified": "2022-07-08T17:15:23.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.753",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34790.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34790.json
index 6c23e9db997..47439f73570 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34790.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34790.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34790",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:11.907",
- "lastModified": "2022-07-08T17:15:54.633",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.813",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34791.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34791.json
index 2411296f606..39042ca41d7 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34791.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34791.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34791",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:12.070",
- "lastModified": "2022-07-08T17:16:44.437",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34792.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34792.json
index b5413be7891..37aca85cbc5 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34792.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34792.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34792",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:12.227",
- "lastModified": "2022-07-08T17:18:04.540",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:09.947",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34793.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34793.json
index f36f20ece51..75bd7754906 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34793.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34793.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34793",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:12.383",
- "lastModified": "2022-07-08T03:47:48.557",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.007",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34794.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34794.json
index cf536e17349..4824dbceb91 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34794.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34794.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34794",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:12.547",
- "lastModified": "2022-07-08T03:48:45.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.060",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34795.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34795.json
index ed40793b665..0c359cd562a 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34795.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34795.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34795",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:12.727",
- "lastModified": "2022-07-08T03:52:37.700",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.123",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34796.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34796.json
index 42b03720989..910b4a05a12 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34796.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34796.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34796",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:12.890",
- "lastModified": "2022-10-17T19:19:44.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.190",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
@@ -105,11 +95,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34797.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34797.json
index e206cd1beb9..acabe36f658 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34797.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34797.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34797",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:13.037",
- "lastModified": "2022-07-08T03:50:37.753",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.250",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -95,11 +83,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34798.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34798.json
index 77a5ce7f93c..65bdbe6b590 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34798.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34798.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34798",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:13.220",
- "lastModified": "2022-10-21T17:32:17.540",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.303",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -95,11 +83,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34799.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34799.json
index f09ff1d73c5..55962744538 100644
--- a/CVE-2022/CVE-2022-347xx/CVE-2022-34799.json
+++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34799.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34799",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:13.367",
- "lastModified": "2022-07-08T03:47:12.520",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.363",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34800.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34800.json
index c454cf2700c..d64e153b8e3 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34800.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34800.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34800",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:13.527",
- "lastModified": "2022-07-08T03:46:43.400",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.420",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34801.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34801.json
index 34bf5348723..77d23a82ada 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34801.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34801.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34801",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:13.717",
- "lastModified": "2022-07-08T03:45:01.560",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.477",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-318"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34802.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34802.json
index e9f67efa370..de55e735b14 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34802.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34802.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34802",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:13.877",
- "lastModified": "2022-07-08T03:36:12.167",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.540",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34803.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34803.json
index 992db8bd2bb..104e1ef4e80 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34803.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34803.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34803",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:14.043",
- "lastModified": "2023-06-29T15:43:26.610",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.593",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34804.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34804.json
index ba18a4875f9..2d5a3374e7f 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34804.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34804.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34804",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:14.200",
- "lastModified": "2022-07-11T17:29:51.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.657",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-318"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34805.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34805.json
index dddbc0a9a26..8224cc28628 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34805.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34805.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34805",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:14.373",
- "lastModified": "2022-07-11T17:30:49.017",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.713",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34806.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34806.json
index fee883eb41b..73c0255eb2f 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34806.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34806.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34806",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:14.510",
- "lastModified": "2022-07-11T17:31:30.627",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.770",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34807.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34807.json
index 01fc73e0d03..7287d549dc5 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34807.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34807.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34807",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:14.653",
- "lastModified": "2023-06-29T15:43:30.727",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.830",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34808.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34808.json
index 01f93497756..29156134d37 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34808.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34808.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34808",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:14.797",
- "lastModified": "2022-07-08T18:30:50.040",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.883",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34809.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34809.json
index fba99677d6c..fd8a5bccddb 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34809.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34809.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34809",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:14.970",
- "lastModified": "2022-07-08T18:37:41.117",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.943",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34810.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34810.json
index 0711f181bc9..762aa29d546 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34810.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34810.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34810",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:15.117",
- "lastModified": "2022-07-08T18:38:06.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:10.993",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34811.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34811.json
index 50742a3c263..76519a94566 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34811.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34811.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34811",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:15.283",
- "lastModified": "2022-07-08T18:38:54.623",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.050",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34812.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34812.json
index b56317a8389..80df7c28de4 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34812.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34812.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34812",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:15.417",
- "lastModified": "2022-07-08T18:40:04.490",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.103",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,16 +73,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34813.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34813.json
index 9da02333ac2..0163db62a44 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34813.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34813.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34813",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:15.543",
- "lastModified": "2022-07-08T18:43:29.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.157",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34814.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34814.json
index 539aaaed246..17353acdd12 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34814.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34814.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34814",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:15.640",
- "lastModified": "2022-07-08T18:44:29.347",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.210",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34815.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34815.json
index b05a0eaf23f..c1ca2116862 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34815.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34815.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34815",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:15.693",
- "lastModified": "2022-07-08T18:44:50.053",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.267",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34816.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34816.json
index a11fff21084..9bdf9002236 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34816.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34816.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34816",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:15.740",
- "lastModified": "2022-07-08T18:45:20.620",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.320",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34817.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34817.json
index 9f512deca64..b8e8708811b 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34817.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34817.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34817",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:15.793",
- "lastModified": "2022-07-08T18:48:09.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.380",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34818.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34818.json
index f9b07fa5b34..6ac550f529f 100644
--- a/CVE-2022/CVE-2022-348xx/CVE-2022-34818.json
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34818.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-34818",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-30T18:15:15.843",
- "lastModified": "2022-07-08T18:49:18.453",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.433",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -63,18 +63,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34832.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34832.json
new file mode 100644
index 00000000000..5c21b2abdfb
--- /dev/null
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34832.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2022-34832",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T21:15:08.167",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in VERMEG AgileReporter 21.3. XXE can occur via an XML document to the Analysis component."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://crashpark.weebly.com/blog/xxe-in-agilereporter-213-by-vermeg",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.vermeg.com/agile-reporter/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34833.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34833.json
new file mode 100644
index 00000000000..d95629ab2aa
--- /dev/null
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34833.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2022-34833",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T21:15:08.213",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in VERMEG AgileReporter 21.3. An admin can enter an XSS payload in the Analysis component."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://crashpark.weebly.com/blog/1-stored-xss-in-agilereporter-213-by-vermeg",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.vermeg.com/agile-reporter/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34834.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34834.json
new file mode 100644
index 00000000000..1e104ff6310
--- /dev/null
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34834.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2022-34834",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T21:15:08.260",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in VERMEG AgileReporter 21.3. Attackers can gain privileges via an XSS payload in an Add Comment action to the Activity log."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://crashpark.weebly.com/blog/2-stored-xss-in-agilereporter-213-by-vermeg",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.vermeg.com/agile-reporter/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34886.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34886.json
new file mode 100644
index 00000000000..f232cd5256a
--- /dev/null
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34886.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2022-34886",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-27T19:15:40.913",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A remote code execution vulnerability was found in the firmware used in some Lenovo printers, which can be caused by a remote user pushing an illegal string to the server-side interface via a script, resulting in a stack overflow."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://iknow.lenovo.com.cn/detail/205041.html",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-348xx/CVE-2022-34887.json b/CVE-2022/CVE-2022-348xx/CVE-2022-34887.json
new file mode 100644
index 00000000000..2bc602b83fd
--- /dev/null
+++ b/CVE-2022/CVE-2022-348xx/CVE-2022-34887.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2022-34887",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-27T19:15:40.997",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Standard users can directly operate and set printer configuration information , such as IP, in some Lenovo Printers without having to authenticate with the administrator password."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://iknow.lenovo.com.cn/detail/205041.html",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3429.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3429.json
new file mode 100644
index 00000000000..631b28d837a
--- /dev/null
+++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3429.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2022-3429",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-27T19:15:41.080",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A denial-of-service vulnerability was found in the firmware used in Lenovo printers, where users send illegal or malformed strings to an open port, triggering a denial of service that causes a display error and prevents the printer from functioning properly."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://iknow.lenovo.com.cn/detail/205041.html",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-360xx/CVE-2022-36069.json b/CVE-2022/CVE-2022-360xx/CVE-2022-36069.json
index 5a708acb52f..46121effcf0 100644
--- a/CVE-2022/CVE-2022-360xx/CVE-2022-36069.json
+++ b/CVE-2022/CVE-2022-360xx/CVE-2022-36069.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36069",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-09-07T19:15:08.563",
- "lastModified": "2023-06-29T16:17:28.477",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.487",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -130,6 +130,10 @@
"Exploit",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://www.sonarsource.com/blog/securing-developer-tools-package-managers/",
+ "source": "security-advisories@github.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-363xx/CVE-2022-36351.json b/CVE-2022/CVE-2022-363xx/CVE-2022-36351.json
index 4dbd4df4a8c..a8d0fe9ffc4 100644
--- a/CVE-2022/CVE-2022-363xx/CVE-2022-36351.json
+++ b/CVE-2022/CVE-2022-363xx/CVE-2022-36351.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36351",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:12.807",
- "lastModified": "2023-09-30T22:15:10.010",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:03:48.877",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -151,6 +151,46 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -164,19 +204,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-367xx/CVE-2022-36784.json b/CVE-2022/CVE-2022-367xx/CVE-2022-36784.json
index ff787c96227..183e0750468 100644
--- a/CVE-2022/CVE-2022-367xx/CVE-2022-36784.json
+++ b/CVE-2022/CVE-2022-367xx/CVE-2022-36784.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-36784",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2022-11-17T23:15:16.317",
- "lastModified": "2022-11-22T18:17:53.317",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.587",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Elsight \u2013 Elsight Halo Remote Code Execution (RCE) Elsight Halo web panel allows us to perform connection validation. through the POST request : /api/v1/nics/wifi/wlan0/ping we can abuse DESTINATION parameter and leverage it to remote code execution."
+ "value": "\nElsight \u2013 Elsight Halo \u00a0Remote Code Execution (RCE)\nElsight Halo web panel allows us to perform connection validation.\nthrough the POST request :\n/api/v1/nics/wifi/wlan0/ping\nwe can abuse DESTINATION parameter and leverage it to remote code execution.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Elsight - Elsight Halo Remote Code Execution (RCE) El panel web de Elsight Halo nos permite realizar la validaci\u00f3n de la conexi\u00f3n. a trav\u00e9s de la solicitud POST: /api/v1/nics/wifi/wlan0/ping podemos abusar del par\u00e1metro DESTINATION y aprovecharlo para la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {
@@ -37,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
- "attackVector": "ADJACENT_NETWORK",
- "attackComplexity": "HIGH",
- "privilegesRequired": "LOW",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
"userInteraction": "NONE",
- "scope": "CHANGED",
- "confidentialityImpact": "LOW",
- "integrityImpact": "LOW",
- "availabilityImpact": "LOW",
- "baseScore": 5.5,
- "baseSeverity": "MEDIUM"
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
},
- "exploitabilityScore": 1.3,
- "impactScore": 3.7
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
diff --git a/CVE-2022/CVE-2022-367xx/CVE-2022-36785.json b/CVE-2022/CVE-2022-367xx/CVE-2022-36785.json
index eea0de3e32b..2783ba9cdf8 100644
--- a/CVE-2022/CVE-2022-367xx/CVE-2022-36785.json
+++ b/CVE-2022/CVE-2022-367xx/CVE-2022-36785.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-36785",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2022-11-17T23:15:16.810",
- "lastModified": "2022-11-22T17:09:29.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.683",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "D-Link \u2013 G integrated Access Device4 Information Disclosure & Authorization Bypass. *Information Disclosure \u2013 file contains a URL with private IP at line 15 \"login.asp\" A. The window.location.href = http://192.168.1.1/setupWizard.asp\" http://192.168.1.1/setupWizard.asp\" ; \"admin\" \u2013 contains default username value \"login.asp\" B. While accessing the web interface, the login form at *Authorization Bypass \u2013 URL by \"setupWizard.asp' while it blocks direct access to \u2013 the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a \"login_glag\" and \"login_status\" checking browser and to read the admin user credentials for the web interface."
+ "value": "\nD-Link \u2013 G integrated Access Device4 Information Disclosure & Authorization Bypass.\n*Information Disclosure \u2013 \nfile contains a URL with private IP at line 15 \"login.asp\" A. The\nwindow.location.href = http://192.168.1.1/setupWizard.asp\" http://192.168.1.1/setupWizard.asp\" ;\n\"admin\" \u2013 contains default username value \"login.asp\" B. While accessing the web interface, the login form at \n\n*Authorization Bypass \u2013 \nURL by \"setupWizard.asp' while it blocks direct access to \u2013 the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a \"login_glag\" and \"login_status\" checking browser and to read the admin user credentials for the web interface.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "D-Link G integrated Access Device4 Information Disclosure & Authorization Bypass. El archivo Information Disclosure contiene una URL con IP privada en la l\u00ednea 15 \"login.asp\" A. El window.location.href = http://192.168.1.1/setupWizard.asp\" http://192.168.1.1/setupWizard.asp\"; \"administrador\"? contiene el valor de nombre de usuario predeterminado \"login.asp\" B. Al acceder a la interfaz web, el formulario de inicio de sesi\u00f3n en *Authorization Bypass - URL por \"setupWizard.asp' mientras bloquea el acceso directo a la interfaz web no valida correctamente los valores de las variables de identidad del usuario ubicadas en el lado del cliente, est\u00e1 disponible para acceder sin un navegador de verificaci\u00f3n \"login_glag\" y \"login_status\" y para lea las credenciales del usuario administrador para la interfaz web."
}
],
"metrics": {
@@ -37,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
- "attackVector": "ADJACENT_NETWORK",
- "attackComplexity": "HIGH",
- "privilegesRequired": "LOW",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
- "confidentialityImpact": "LOW",
- "integrityImpact": "LOW",
- "availabilityImpact": "LOW",
- "baseScore": 4.6,
- "baseSeverity": "MEDIUM"
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
},
- "exploitabilityScore": 1.2,
- "impactScore": 3.4
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
}
]
},
diff --git a/CVE-2022/CVE-2022-367xx/CVE-2022-36786.json b/CVE-2022/CVE-2022-367xx/CVE-2022-36786.json
index 0a80157bcd0..e2d3105b807 100644
--- a/CVE-2022/CVE-2022-367xx/CVE-2022-36786.json
+++ b/CVE-2022/CVE-2022-367xx/CVE-2022-36786.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-36786",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2022-11-17T23:15:17.010",
- "lastModified": "2022-11-22T17:09:35.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.770",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "DLINK - DSL-224 Post-auth PCE. DLINK router has an interface where you can configure NTP servers (Network Time Protocol) via jsonrpc API. It is possible to inject a command through this interface that will run with ROOT permissions on the router."
+ "value": "DLINK - DSL-224 Post-auth RCE.\nDLINK router version 3.0.8 has an interface where you can configure NTP servers (Network Time Protocol) via jsonrpc API.\nIt is possible to inject a command through this interface that will run with ROOT permissions on the router.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "DLINK - DSL-224 Post-auth PCE. El router DLINK tiene una interfaz donde puede configurar servidores NTP (Protocolo de tiempo de red) a trav\u00e9s de la API jsonrpc. Es posible inyectar un comando a trav\u00e9s de esta interfaz que se ejecutar\u00e1 con permisos ROOT en el router."
}
],
"metrics": {
@@ -37,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
- "attackVector": "ADJACENT_NETWORK",
- "attackComplexity": "HIGH",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
- "confidentialityImpact": "LOW",
- "integrityImpact": "LOW",
- "availabilityImpact": "LOW",
- "baseScore": 5.5,
- "baseSeverity": "MEDIUM"
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.9,
+ "baseSeverity": "CRITICAL"
},
- "exploitabilityScore": 1.3,
- "impactScore": 3.7
+ "exploitabilityScore": 3.1,
+ "impactScore": 6.0
}
]
},
diff --git a/CVE-2022/CVE-2022-367xx/CVE-2022-36787.json b/CVE-2022/CVE-2022-367xx/CVE-2022-36787.json
index cc13a658acf..09368a270fd 100644
--- a/CVE-2022/CVE-2022-367xx/CVE-2022-36787.json
+++ b/CVE-2022/CVE-2022-367xx/CVE-2022-36787.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-36787",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2022-11-17T23:15:17.140",
- "lastModified": "2022-11-22T00:43:35.240",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.870",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Webvendome - Webvendome SQL Injection. SQL Injection in the Parameter \" DocNumber\" Request : Get Request : /webvendome/showfiles.aspx?jobnumber=nullDoc Number=HERE."
+ "value": "\nwebvendome - webvendome SQL Injection.\nSQL Injection in the Parameter \" DocNumber\"\nRequest :\nGet Request :\n/webvendome/showfiles.aspx?jobnumber=nullDoc Number=HERE.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Webvendome - Inyecci\u00f3n SQL de Webvendome. Inyecci\u00f3n SQL en el par\u00e1metro \"DocNumber\" Solicitud: Obtener solicitud: /webvendome/showfiles.aspx?jobnumber=nullDoc Number=HERE."
}
],
"metrics": {
@@ -37,26 +41,26 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
- "attackVector": "ADJACENT_NETWORK",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "LOW",
+ "privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
- "confidentialityImpact": "LOW",
+ "confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
- "availabilityImpact": "NONE",
- "baseScore": 6.3,
- "baseSeverity": "MEDIUM"
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
},
- "exploitabilityScore": 2.1,
- "impactScore": 4.2
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "cna@cyber.gov.il",
"type": "Primary",
"description": [
{
@@ -66,7 +70,7 @@
]
},
{
- "source": "cna@cyber.gov.il",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@@ -95,11 +99,8 @@
],
"references": [
{
- "url": "https://www.gov.il/en/departments/faq/cve_advisories",
- "source": "cna@cyber.gov.il",
- "tags": [
- "Third Party Advisory"
- ]
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36881.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36881.json
index d8cd4a9c5da..ae15e11d817 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36881.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36881.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36881",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:08.770",
- "lastModified": "2022-08-02T20:14:30.510",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:11.977",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-322"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36882.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36882.json
index 61d627eacb1..2623c1c6e5c 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36882.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36882.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36882",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:08.827",
- "lastModified": "2022-08-03T18:53:15.530",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.050",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36883.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36883.json
index 5738955c320..c1065561d52 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36883.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36883.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36883",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:08.880",
- "lastModified": "2022-08-03T19:52:29.497",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.103",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36884.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36884.json
index a7b2d19017c..3fd5557f666 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36884.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36884.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36884",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:08.933",
- "lastModified": "2023-07-21T19:17:50.407",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.157",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-306"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-200"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36885.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36885.json
index af19c49bf8b..cb93220cb84 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36885.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36885.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36885",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:08.980",
- "lastModified": "2022-08-03T17:27:15.757",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.217",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-208"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36886.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36886.json
index 5e0ea1af85b..18e3bcd0168 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36886.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36886.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36886",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.040",
- "lastModified": "2022-08-03T17:15:34.597",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.273",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36887.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36887.json
index 635cacc7b16..e92753a892d 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36887.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36887.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36887",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.090",
- "lastModified": "2022-08-03T17:42:56.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.327",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36888.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36888.json
index 2540ccf6c7f..10da4dcbf0b 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36888.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36888.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36888",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.143",
- "lastModified": "2022-08-03T17:07:48.307",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36889.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36889.json
index d6f56155665..b2d44c4ea86 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36889.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36889.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36889",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.197",
- "lastModified": "2022-08-03T18:05:55.617",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.447",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36890.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36890.json
index d27b6cafe43..798e2240f41 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36890.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36890.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36890",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.247",
- "lastModified": "2022-08-03T17:50:54.950",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.513",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36891.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36891.json
index fd07c9dd5f9..59e7002c0b3 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36891.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36891.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36891",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.300",
- "lastModified": "2022-08-03T17:54:32.180",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.570",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36892.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36892.json
index 4899ecff946..d00ad49c4af 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36892.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36892.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36892",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.353",
- "lastModified": "2022-08-03T18:02:17.790",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.633",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36893.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36893.json
index 925c731945c..2e632ba1be4 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36893.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36893.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36893",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.403",
- "lastModified": "2022-08-03T18:11:01.137",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.697",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36894.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36894.json
index b01d2062c3f..1926aaeb83b 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36894.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36894.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36894",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.453",
- "lastModified": "2022-08-03T18:16:17.893",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.757",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36895.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36895.json
index ea00aa7722d..7e0aaa7a007 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36895.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36895.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36895",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.503",
- "lastModified": "2022-08-03T18:23:00.110",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.813",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36896.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36896.json
index 069d59ae929..62e530766ef 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36896.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36896.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36896",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.557",
- "lastModified": "2022-08-03T18:26:13.080",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.870",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36897.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36897.json
index 91ce1d7357c..5439b2f4c4d 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36897.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36897.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36897",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.613",
- "lastModified": "2022-08-03T18:30:16.817",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:12.943",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36898.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36898.json
index c8faba1c830..358a153a03a 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36898.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36898.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36898",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.667",
- "lastModified": "2022-08-03T19:09:58.670",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.000",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36899.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36899.json
index fda49fd1c93..61818834b12 100644
--- a/CVE-2022/CVE-2022-368xx/CVE-2022-36899.json
+++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36899.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36899",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.723",
- "lastModified": "2022-08-03T23:59:55.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.057",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36900.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36900.json
index 531370c4ce5..f8d77d9171d 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36900.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36900.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36900",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.777",
- "lastModified": "2022-08-03T23:50:44.800",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.123",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"operator": "AND",
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36901.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36901.json
index 7cb1a6495f8..0fc6cf71377 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36901.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36901.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36901",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.827",
- "lastModified": "2022-08-03T19:00:45.873",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.223",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-668"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36902.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36902.json
index fec7d7efac8..67cc43d9596 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36902.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36902.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36902",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.873",
- "lastModified": "2022-08-03T18:59:14.453",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.317",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36903.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36903.json
index 4fb43fd9ee3..08ccafce08d 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36903.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36903.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36903",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.923",
- "lastModified": "2022-08-03T18:50:36.817",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.377",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2665%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2665%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36904.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36904.json
index d73e3262487..3330b86882e 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36904.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36904.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36904",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:09.973",
- "lastModified": "2022-08-03T18:33:43.520",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.437",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
@@ -88,11 +78,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2665%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2665%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36905.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36905.json
index 2d74fd6e87b..f9a465279c0 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36905.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36905.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36905",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:10.023",
- "lastModified": "2022-08-03T18:32:26.387",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.497",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36906.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36906.json
index 45600c32e82..dfc2744da7a 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36906.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36906.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36906",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:10.073",
- "lastModified": "2022-08-03T18:32:01.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.557",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36907.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36907.json
index 16685b80cd2..9a8c3ef53b8 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36907.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36907.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36907",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:10.123",
- "lastModified": "2022-08-03T18:24:57.167",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.617",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36908.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36908.json
index acd5a22fd0b..6bf614f0465 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36908.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36908.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36908",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:10.173",
- "lastModified": "2022-08-03T18:18:43.013",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.677",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36909.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36909.json
index 09bd823bab1..2aff1247162 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36909.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36909.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36909",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:10.227",
- "lastModified": "2022-08-03T18:01:35.733",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.733",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36910.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36910.json
index 92b7c7a829a..4a76a092830 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36910.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36910.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36910",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:10.277",
- "lastModified": "2022-08-03T17:58:48.360",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.790",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36911.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36911.json
index f34dea92724..848a1ebdf08 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36911.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36911.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36911",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:10.337",
- "lastModified": "2022-08-02T20:52:57.243",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.843",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36912.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36912.json
index f547811a730..a3b05da22ab 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36912.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36912.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36912",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:10.667",
- "lastModified": "2022-08-03T17:56:04.720",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.897",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
@@ -88,11 +78,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36913.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36913.json
index f2a6156213e..48df4a5b64d 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36913.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36913.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36913",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:11.093",
- "lastModified": "2022-08-03T12:45:35.997",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:13.960",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36914.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36914.json
index 093a077dde8..b906c5fc947 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36914.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36914.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36914",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:11.530",
- "lastModified": "2022-08-04T10:01:03.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.017",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36915.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36915.json
index c60059a975b..969f1a949f5 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36915.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36915.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36915",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:11.810",
- "lastModified": "2022-08-04T12:08:40.147",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.073",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36916.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36916.json
index 0db76d7f8a2..aab200a8004 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36916.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36916.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36916",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:12.053",
- "lastModified": "2022-08-03T16:28:30.087",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.127",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36917.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36917.json
index 97e87cbb105..e97902d26fd 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36917.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36917.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36917",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:12.297",
- "lastModified": "2022-08-03T16:33:43.353",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.187",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36918.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36918.json
index 89cf1fa899d..dbf3de35c4e 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36918.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36918.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36918",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:12.547",
- "lastModified": "2022-08-03T18:36:02.290",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.247",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36919.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36919.json
index a29a4e75288..73544d6fa8b 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36919.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36919.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36919",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:12.907",
- "lastModified": "2022-08-03T19:15:31.287",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.307",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36920.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36920.json
index 5bf9f98e865..66f98d19712 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36920.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36920.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36920",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:13.320",
- "lastModified": "2022-08-03T19:23:13.183",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.373",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36921.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36921.json
index 0cbab6a6b4e..09e10e29bab 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36921.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36921.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36921",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:13.640",
- "lastModified": "2022-08-03T19:40:17.507",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.427",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36922.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36922.json
index 8abbc822b8e..e11f3458938 100644
--- a/CVE-2022/CVE-2022-369xx/CVE-2022-36922.json
+++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36922.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-36922",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-07-27T15:15:13.877",
- "lastModified": "2022-08-04T12:09:13.987",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.483",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3611.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3611.json
new file mode 100644
index 00000000000..67084c535cc
--- /dev/null
+++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3611.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2022-3611",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-27T20:15:08.623",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An information disclosure vulnerability has been identified in the Lenovo App Store which may allow some applications to gain unauthorized access to sensitive user data used by other unrelated applications."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.6,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://iknow.lenovo.com.cn/detail/205280.html",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3622.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3622.json
new file mode 100644
index 00000000000..165b00e8a90
--- /dev/null
+++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3622.json
@@ -0,0 +1,131 @@
+{
+ "id": "CVE-2022-3622",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.847",
+ "lastModified": "2023-10-27T18:48:23.297",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Blog2Social plugin for WordPress is vulnerable to authorization bypass due to missing capability checks in versions up to, and including, 6.9.11. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change some plugin settings intended to be modifiable by admins only."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Blog2Social para WordPress es vulnerable a la omisi\u00f3n de autorizaci\u00f3n debido a la falta de comprobaciones de capacidad en versiones hasta la 6.9.11 incluida. Esto hace posible que los atacantes autenticados, con permisos de nivel de suscriptor y superiores, cambien algunas configuraciones de complementos que solo los administradores pueden modificar."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:adenion:blog2social:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "6.9.11",
+ "matchCriteriaId": "7536D4D8-8089-406B-9367-A113ACB4796F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/blog2social/tags/6.9.10/includes/B2S/Settings/Item.php#L116",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2795052%40blog2social&new=2795052%40blog2social&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2796598%40blog2social&new=2796598%40blog2social&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5b8d39c-d307-42c9-a972-29b5521a82a4?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3629.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3629.json
index 1fcef0848a6..78d5917d237 100644
--- a/CVE-2022/CVE-2022-36xx/CVE-2022-3629.json
+++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3629.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-3629",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-21T06:15:09.710",
- "lastModified": "2023-02-28T19:26:14.977",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:09.070",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
@@ -87,7 +87,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -97,7 +97,7 @@
]
},
{
- "source": "nvd@nist.gov",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3681.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3681.json
new file mode 100644
index 00000000000..075958d8df6
--- /dev/null
+++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3681.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2022-3681",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-27T20:15:08.707",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability has been identified in the MR2600 router v1.0.18 and earlier that could allow an attacker within range of the wireless network to successfully brute force the WPS pin, potentially allowing them unauthorized access to a wireless network.\n "
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://web.archive.org/web/20230317174952/https://help.motorolanetwork.com/hc/en-us/articles/9933302506523",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3698.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3698.json
new file mode 100644
index 00000000000..d7ac93f3e0b
--- /dev/null
+++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3698.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2022-3698",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-25T18:17:15.730",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nA denial of service vulnerability was reported in the Lenovo HardwareScanPlugin versions prior to \n\n1.3.1.2\n\n and\u00a0\n\nLenovo Diagnostics versions prior to 4.45\n\n that could allow a local user with administrative access to trigger a system crash.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se inform\u00f3 una vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en las versiones Lenovo HardwareScanPlugin anteriores a 1.3.1.2 y Lenovo Diagnostics anteriores a 4.45 que podr\u00eda permitir que un usuario local con acceso administrativo desencadene un bloqueo del sistema."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-102365",
+ "source": "psirt@lenovo.com"
+ },
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-94532",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3699.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3699.json
new file mode 100644
index 00000000000..57f4b086730
--- /dev/null
+++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3699.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2022-3699",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-25T18:17:15.807",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nA privilege escalation vulnerability was reported in the Lenovo HardwareScanPlugin prior to version\u00a01.3.1.2 and\u00a0Lenovo Diagnostics prior to version 4.45\n\n\n\n that could allow a local user to execute code with elevated privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Se inform\u00f3 una vulnerabilidad de escalada de privilegios en Lenovo HardwareScanPlugin antes de la versi\u00f3n 1.3.1.2 y Lenovo Diagnostics antes de la versi\u00f3n 4.45 que podr\u00eda permitir a un usuario local ejecutar c\u00f3digo con privilegios elevados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-102365",
+ "source": "psirt@lenovo.com"
+ },
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-94532",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-377xx/CVE-2022-37796.json b/CVE-2022/CVE-2022-377xx/CVE-2022-37796.json
index 6581d5d2a15..b230b37c695 100644
--- a/CVE-2022/CVE-2022-377xx/CVE-2022-37796.json
+++ b/CVE-2022/CVE-2022-377xx/CVE-2022-37796.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-37796",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-12T00:15:10.027",
- "lastModified": "2022-09-15T03:47:55.627",
+ "lastModified": "2023-10-18T15:57:45.823",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -59,8 +59,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:simple_online_book_store_system_project:simple_online_book_store_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "9314352F-92B4-478A-B8F1-3C84091931C9"
+ "criteria": "cpe:2.3:a:oretnom23:simple_online_book_store_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B40E9E0E-EAC6-4992-9E9D-2B519E73E134"
}
]
}
diff --git a/CVE-2022/CVE-2022-378xx/CVE-2022-37830.json b/CVE-2022/CVE-2022-378xx/CVE-2022-37830.json
new file mode 100644
index 00000000000..215e71cfe60
--- /dev/null
+++ b/CVE-2022/CVE-2022-378xx/CVE-2022-37830.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2022-37830",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T13:15:09.140",
+ "lastModified": "2023-10-25T16:13:24.713",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Interway a.s WebJET CMS 8.6.896 is vulnerable to Cross Site Scripting (XSS)."
+ },
+ {
+ "lang": "es",
+ "value": "Interway a.s WebJET CMS 8.6.896 es vulnerable a Cross Site Scripting (XSS)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:webjet:webjet_cms:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "8.6.896",
+ "matchCriteriaId": "0370E88A-BEE3-43AE-8535-7792D02EA10C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://webjet.com",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://citadelo.com/download/CVE-2022-37830.pdf",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3700.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3700.json
new file mode 100644
index 00000000000..02b930d33c5
--- /dev/null
+++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3700.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2022-3700",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-27T20:15:08.777",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A Time of Check Time of Use (TOCTOU) vulnerability was reported in the Lenovo Vantage SystemUpdate Plugin version 2.0.0.212 and earlier that could allow a local attacker to delete arbitrary files."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-367"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-94532",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3701.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3701.json
new file mode 100644
index 00000000000..26e02832bce
--- /dev/null
+++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3701.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2022-3701",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-27T20:15:08.857",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nA privilege elevation vulnerability was reported in the Lenovo Vantage SystemUpdate plugin version 2.0.0.212 and earlier that could allow a local attacker to execute arbitrary code with elevated privileges.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-367"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-94532",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3702.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3702.json
new file mode 100644
index 00000000000..c246764a696
--- /dev/null
+++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3702.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2022-3702",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-27T20:15:08.927",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nA denial of service vulnerability was reported in Lenovo Vantage HardwareScan Plugin version 1.3.0.5 and earlier that could allow a local attacker to delete contents of an arbitrary directory under certain conditions.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-367"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-94532",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3725.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3725.json
index 807a2c9f2d4..424e53d41ff 100644
--- a/CVE-2022/CVE-2022-37xx/CVE-2022-3725.json
+++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3725.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-3725",
"sourceIdentifier": "cve@gitlab.com",
"published": "2022-10-27T17:15:10.337",
- "lastModified": "2023-09-17T07:15:08.153",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T17:51:27.423",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "La falla en el disector del protocolo OPUS en Wireshark versi\u00f3n 3.6.0 a la versi\u00f3n 3.6.8 permite la Denegaci\u00f3n de Servicio mediante inyecci\u00f3n de paquetes o archivo de captura manipulado"
}
],
"metrics": {
@@ -127,7 +131,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2022-07.html",
diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3761.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3761.json
index 2f256879f3d..4a1042533c8 100644
--- a/CVE-2022/CVE-2022-37xx/CVE-2022-3761.json
+++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3761.json
@@ -2,16 +2,53 @@
"id": "CVE-2022-3761",
"sourceIdentifier": "security@openvpn.net",
"published": "2023-10-17T13:15:11.573",
- "lastModified": "2023-10-17T13:15:11.573",
- "vulnStatus": "Received",
+ "lastModified": "2023-10-24T17:34:27.393",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials"
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de OpenVPN Connect anteriores a 3.4.0.4506 (macOS) y OpenVPN Connect anteriores a 3.4.0.3100 (Windows) permiten a atacantes intermediarios interceptar solicitudes de descarga de perfiles de configuraci\u00f3n que contienen las credenciales de los usuarios."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-295"
+ }
+ ]
+ },
{
"source": "security@openvpn.net",
"type": "Secondary",
@@ -23,14 +60,44 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "3.4.0.3121",
+ "matchCriteriaId": "54A4FF64-4693-4196-87F8-F25728A1D9E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:macos:*:*",
+ "versionEndExcluding": "3.4.0.4506",
+ "matchCriteriaId": "70DC57A0-4862-443C-AC95-5EEED057B719"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/",
- "source": "security@openvpn.net"
+ "source": "security@openvpn.net",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/",
- "source": "security@openvpn.net"
+ "source": "security@openvpn.net",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38076.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38076.json
index 10c8a3f3d78..32edcaf6616 100644
--- a/CVE-2022/CVE-2022-380xx/CVE-2022-38076.json
+++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38076.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-38076",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:13.843",
- "lastModified": "2023-09-30T22:15:10.090",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:03:18.443",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -151,6 +151,46 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -164,19 +204,33 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-384xx/CVE-2022-38484.json b/CVE-2022/CVE-2022-384xx/CVE-2022-38484.json
new file mode 100644
index 00000000000..c5b3d2cd4e6
--- /dev/null
+++ b/CVE-2022/CVE-2022-384xx/CVE-2022-38484.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2022-38484",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:14.550",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An arbitrary file upload and directory traversal vulnerability exist in the file upload functionality of the System Setup menu in AgeVolt Portal prior to version 0.1. A remote authenticated attacker could leverage this vulnerability to upload files to any location on the target operating system with web server privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de carga de archivos arbitrarios y directory traversal en la funcionalidad de carga de archivos del men\u00fa Configuraci\u00f3n del sistema en AgeVolt Portal antes de la versi\u00f3n 0.1. Un atacante autenticado remotamente podr\u00eda aprovechar esta vulnerabilidad para cargar archivos en cualquier ubicaci\u00f3n del sistema operativo de destino con privilegios de servidor web."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://citadelo.com/download/CVE-2022-38484.pdf",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-384xx/CVE-2022-38485.json b/CVE-2022/CVE-2022-384xx/CVE-2022-38485.json
new file mode 100644
index 00000000000..99379a4bd35
--- /dev/null
+++ b/CVE-2022/CVE-2022-384xx/CVE-2022-38485.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2022-38485",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:14.600",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A directory traversal vulnerability exists in the AgeVolt Portal prior to version 0.1 that leads to Information Disclosure. A remote authenticated attacker could leverage this vulnerability to read files from any location on the target operating system with web server privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de directory traversal en el AgeVolt Portal anterior a la versi\u00f3n 0.1 que conduce a la divulgaci\u00f3n de informaci\u00f3n. Un atacante autenticado remoto podr\u00eda aprovechar esta vulnerabilidad para leer archivos desde cualquier ubicaci\u00f3n en el sistema operativo de destino con privilegios de servidor web."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://citadelo.com/download/CVE-2022-38485.pdf",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-386xx/CVE-2022-38663.json b/CVE-2022/CVE-2022-386xx/CVE-2022-38663.json
index 327b2397148..c47a4a8d6ae 100644
--- a/CVE-2022/CVE-2022-386xx/CVE-2022-38663.json
+++ b/CVE-2022/CVE-2022-386xx/CVE-2022-38663.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-38663",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-08-23T17:15:15.257",
- "lastModified": "2022-08-25T13:29:11.940",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.640",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-522"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-386xx/CVE-2022-38664.json b/CVE-2022/CVE-2022-386xx/CVE-2022-38664.json
index 40011c80514..b0f227c3935 100644
--- a/CVE-2022/CVE-2022-386xx/CVE-2022-38664.json
+++ b/CVE-2022/CVE-2022-386xx/CVE-2022-38664.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-38664",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-08-23T17:15:15.310",
- "lastModified": "2022-08-25T12:59:25.367",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.717",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-386xx/CVE-2022-38665.json b/CVE-2022/CVE-2022-386xx/CVE-2022-38665.json
index 29d5dcdb5b3..97dfd56680f 100644
--- a/CVE-2022/CVE-2022-386xx/CVE-2022-38665.json
+++ b/CVE-2022/CVE-2022-386xx/CVE-2022-38665.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-38665",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-08-23T17:15:15.363",
- "lastModified": "2023-07-21T19:21:35.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.773",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-386xx/CVE-2022-38666.json b/CVE-2022/CVE-2022-386xx/CVE-2022-38666.json
index b754089e4eb..f2b2aca68bf 100644
--- a/CVE-2022/CVE-2022-386xx/CVE-2022-38666.json
+++ b/CVE-2022/CVE-2022-386xx/CVE-2022-38666.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-38666",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.193",
- "lastModified": "2022-11-18T21:28:44.973",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.833",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -66,11 +54,12 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2910%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2910%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3844.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3844.json
index d4fac9e7406..704418de6a6 100644
--- a/CVE-2022/CVE-2022-38xx/CVE-2022-3844.json
+++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3844.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-3844",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-02T20:15:11.023",
- "lastModified": "2023-03-01T18:16:13.963",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:09.187",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, was found in Webmin 2.001. Affected is an unknown function of the file xterm/index.cgi. The manipulation leads to basic cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.003 is able to address this issue. The name of the patch is d3d33af3c0c3fd3a889c84e287a038b7a457d811. It is recommended to upgrade the affected component. VDB-212862 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, was found in Webmin 2.001. Affected is an unknown function of the file xterm/index.cgi. The manipulation leads to basic cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.003 is able to address this issue. The patch is identified as d3d33af3c0c3fd3a889c84e287a038b7a457d811. It is recommended to upgrade the affected component. VDB-212862 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Webmin 2.001 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo xterm/index.cgi es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). Es posible lanzar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.003 puede solucionar este problema. El nombre del parche es d3d33af3c0c3fd3a889c84e287a038b7a457d811. Se recomienda actualizar el componente afectado. VDB-212862 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -83,22 +87,22 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "CWE-80"
+ "value": "CWE-79"
}
]
},
{
- "source": "nvd@nist.gov",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-79"
+ "value": "CWE-80"
}
]
}
diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39016.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39016.json
index f6dac538f0b..98aab931012 100644
--- a/CVE-2022/CVE-2022-390xx/CVE-2022-39016.json
+++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39016.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-39016",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:11.917",
- "lastModified": "2022-11-01T19:57:00.233",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.897",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Javascript injection in PDFtron in M-Files Hubshare before 3.3.10.9 allows authenticated attackers to perform an account takeover via a crafted PDF upload."
+ "value": "\nJavascript injection in PDFtron in M-Files Hubshare before 3.3.10.9 allows authenticated attackers to perform an account takeover via a crafted PDF upload."
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de Javascript en PDFtron en M-Files Hubshare anterior a 3.3.10.9 permite a atacantes autenticados realizar una apropiaci\u00f3n de cuenta mediante una carga de PDF manipulada.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39017.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39017.json
index 6abde634992..b31d9290ddc 100644
--- a/CVE-2022/CVE-2022-390xx/CVE-2022-39017.json
+++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39017.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-39017",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:12.017",
- "lastModified": "2022-11-01T19:47:15.327",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:14.980",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Improper input validation and output encoding in all comments fields, in M-Files Hubshare before 3.3.10.9 allows authenticated attackers to introduce cross-site scripting attacks via specially crafted comments."
+ "value": "\n\n\nImproper input validation and output encoding in all comments fields, in M-Files Hubshare before 3.3.10.9 allows authenticated attackers to introduce cross-site scripting attacks via specially crafted comments.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La validaci\u00f3n de entrada y codificaci\u00f3n de salida inadecuadas en todos los campos de comentarios, en M-Files Hubshare anterior a 3.3.10.9, permite a atacantes autenticados introducir ataques de Cross-Site Scripting (XSS) a trav\u00e9s de comentarios especialmente manipulados.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39018.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39018.json
index d7d1093e4aa..c8e05ed8c2f 100644
--- a/CVE-2022/CVE-2022-390xx/CVE-2022-39018.json
+++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39018.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-39018",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:12.090",
- "lastModified": "2022-11-01T19:46:57.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:15.047",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Broken access controls on PDFtron data in M-Files Hubshare before 3.3.11.3 allows unauthenticated attackers to access restricted PDF files via a known URL."
+ "value": "\nBroken access controls on PDFtron data in M-Files Hubshare before 3.3.11.3 allows unauthenticated attackers to access restricted PDF files via a known URL.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Los controles de acceso rotos a los datos de PDFtron en M-Files Hubshare anteriores a 3.3.11.3 permiten a atacantes no autenticados acceder a archivos PDF restringidos a trav\u00e9s de una URL conocida.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39019.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39019.json
index 38c086c3637..45e764a836e 100644
--- a/CVE-2022/CVE-2022-390xx/CVE-2022-39019.json
+++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39019.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-39019",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:12.173",
- "lastModified": "2023-06-27T18:44:33.693",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:15.110",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Broken access controls on PDFtron WebviewerUI in M-Files Hubshare before 3.3.11.3 allows unauthenticated attackers to upload malicious files to the application server."
+ "value": "\nBroken access controls on PDFtron WebviewerUI in M-Files Hubshare before 3.3.11.3 allows unauthenticated attackers to upload malicious files to the application server.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Los controles de acceso rotos en PDFtron WebviewerUI en M-Files Hubshare anterior a 3.3.11.3 permiten a atacantes no autenticados cargar archivos maliciosos al servidor de aplicaciones.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39020.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39020.json
index 989807cd1cb..5cc40c712a4 100644
--- a/CVE-2022/CVE-2022-390xx/CVE-2022-39020.json
+++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39020.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-39020",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:12.250",
- "lastModified": "2022-11-01T19:31:17.100",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:15.187",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Multiple instances of XSS (stored and reflected) was found in the application. For example, features such as student assessment submission, file upload, news, ePortfolio and calendar event creation were found to be vulnerable to cross-site scripting."
+ "value": "\nMultiple instances of XSS (stored and reflected) was found in the application. For example, features such as student assessment submission, file upload, news, ePortfolio and calendar event creation were found to be vulnerable to cross-site scripting.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se encontraron varias instancias de Cross Site-Scripting XSS (stored y reflejadas) en la aplicaci\u00f3n. Por ejemplo, se descubri\u00f3 que funciones como el env\u00edo de evaluaciones de los estudiantes, la carga de archivos, las noticias, el portafolio electr\u00f3nico y la creaci\u00f3n de eventos de calendario eran vulnerables a Cross-Site Scripting.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39178.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39178.json
index 59595c7be96..f49a0719beb 100644
--- a/CVE-2022/CVE-2022-391xx/CVE-2022-39178.json
+++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39178.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-39178",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2022-11-17T23:15:18.110",
- "lastModified": "2022-11-22T00:41:21.953",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:15.283",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Webvendome - Webvendome Internal Server IP Disclosure. Send GET Request to the request which is shown in the picture. Internal Server IP and Full path disclosure."
+ "value": "\nWebvendome - webvendome Internal Server IP Disclosure.\nSend GET Request to the request which is shown in the picture.\nInternal Server IP and Full path disclosure. \n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Webvendome: divulgaci\u00f3n de IP del servidor interno de Webvendome. Env\u00ede GET Request a la solicitud que se muestra en la imagen. IP del servidor interno y divulgaci\u00f3n de ruta completa."
}
],
"metrics": {
@@ -37,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
- "attackVector": "ADJACENT_NETWORK",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "LOW",
- "userInteraction": "REQUIRED",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
- "integrityImpact": "LOW",
+ "integrityImpact": "NONE",
"availabilityImpact": "NONE",
- "baseScore": 4.1,
+ "baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
- "exploitabilityScore": 1.5,
- "impactScore": 2.5
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
}
]
},
@@ -85,11 +89,8 @@
],
"references": [
{
- "url": "https://www.gov.il/en/departments/faq/cve_advisories",
- "source": "cna@cyber.gov.il",
- "tags": [
- "Technical Description"
- ]
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39179.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39179.json
index 5258a031a70..30404c2b29e 100644
--- a/CVE-2022/CVE-2022-391xx/CVE-2022-39179.json
+++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39179.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-39179",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2022-11-17T23:15:18.490",
- "lastModified": "2022-11-18T18:27:57.533",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:15.373",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "College Management System v1.0 - Authenticated remote code execution. An admin user (the authentication can be bypassed using SQL Injection that mentioned in my other report) can upload .php file that contains malicious code via student.php file."
+ "value": "\nCollege Management System v1.0 - Authenticated remote code execution.\nAn admin user (the authentication can be bypassed using SQL Injection that mentioned in my other report) can upload\n.php file that contains malicious code via student.php file.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "College Management System v1.0: ejecuci\u00f3n remota de c\u00f3digo autenticado. Un usuario administrador (la autenticaci\u00f3n se puede omitir mediante la inyecci\u00f3n SQL que mencion\u00e9 en mi otro informe) puede cargar un archivo .php que contenga c\u00f3digo malicioso a trav\u00e9s del archivo Student.php."
}
],
"metrics": {
@@ -37,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
- "attackVector": "ADJACENT_NETWORK",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "LOW",
- "userInteraction": "REQUIRED",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
"scope": "UNCHANGED",
- "confidentialityImpact": "LOW",
- "integrityImpact": "LOW",
- "availabilityImpact": "LOW",
- "baseScore": 4.9,
- "baseSeverity": "MEDIUM"
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
},
- "exploitabilityScore": 1.5,
- "impactScore": 3.4
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
}
]
},
@@ -85,11 +89,8 @@
],
"references": [
{
- "url": "https://www.gov.il/en/departments/faq/cve_advisories",
- "source": "cna@cyber.gov.il",
- "tags": [
- "Third Party Advisory"
- ]
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39180.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39180.json
index 88e822ec20c..6241bce8f70 100644
--- a/CVE-2022/CVE-2022-391xx/CVE-2022-39180.json
+++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39180.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-39180",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2022-11-17T23:15:18.857",
- "lastModified": "2022-11-18T18:28:22.090",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:15.467",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "College Management System v1.0 - SQL Injection (SQLi). By inserting SQL commands to the username and password fields in the login.php page."
+ "value": "\nCollege Management System v1.0 - SQL Injection (SQLi).\nBy inserting SQL commands to the username and password fields in the login.php page\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "College Management System v1.0 - Inyecci\u00f3n SQL (SQLi). Insertando comandos SQL en los campos de nombre de usuario y contrase\u00f1a en la p\u00e1gina login.php."
}
],
"metrics": {
@@ -37,26 +41,26 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
- "attackVector": "ADJACENT_NETWORK",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "LOW",
- "userInteraction": "REQUIRED",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
"scope": "UNCHANGED",
- "confidentialityImpact": "LOW",
- "integrityImpact": "LOW",
- "availabilityImpact": "LOW",
- "baseScore": 4.9,
- "baseSeverity": "MEDIUM"
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
},
- "exploitabilityScore": 1.5,
- "impactScore": 3.4
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
}
]
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "cna@cyber.gov.il",
"type": "Primary",
"description": [
{
@@ -66,7 +70,7 @@
]
},
{
- "source": "cna@cyber.gov.il",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@@ -95,11 +99,8 @@
],
"references": [
{
- "url": "https://www.gov.il/en/departments/faq/cve_advisories",
- "source": "cna@cyber.gov.il",
- "tags": [
- "Third Party Advisory"
- ]
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39181.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39181.json
index 297900c441a..a7f0a4f4956 100644
--- a/CVE-2022/CVE-2022-391xx/CVE-2022-39181.json
+++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39181.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-39181",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2022-11-17T23:15:19.187",
- "lastModified": "2022-11-23T16:12:51.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:15.567",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser."
+ "value": "\nGLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS).\nType 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in\nthe HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a\nvulnerable web application, which is then reflected back to the victim and executed by the web browser. The most\ncommon mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby\nan attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content\nback to the victim, the content is executed by the victim's browser. \n\n"
+ },
+ {
+ "lang": "es",
+ "value": "GLPI: complemento de informes para GLPI Cross-Site-Scripting (XSS) Reflejado. Tipo 1: XSS reflejado (o no persistente): el servidor lee los datos directamente de la solicitud HTTP y los refleja en la respuesta HTTP. Los exploits XSS reflejados ocurren cuando un atacante hace que una v\u00edctima proporcione contenido peligroso a una aplicaci\u00f3n web vulnerable, que luego se refleja en la v\u00edctima y el navegador web lo ejecuta. El mecanismo m\u00e1s com\u00fan para entregar contenido malicioso es incluirlo como par\u00e1metro en una URL que se publica p\u00fablicamente o se env\u00eda por correo electr\u00f3nico directamente a la v\u00edctima. Las URL construidas de esta manera constituyen el n\u00facleo de muchos esquemas de phishing, mediante los cuales un atacante convence a una v\u00edctima para que visite una URL que hace referencia a un sitio vulnerable. Despu\u00e9s de que el sitio refleja el contenido del atacante a la v\u00edctima, el navegador de la v\u00edctima ejecuta el contenido."
}
],
"metrics": {
@@ -37,26 +41,26 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
- "attackVector": "ADJACENT_NETWORK",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "LOW",
+ "privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
- "scope": "UNCHANGED",
+ "scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
- "availabilityImpact": "LOW",
- "baseScore": 4.9,
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
- "exploitabilityScore": 1.5,
- "impactScore": 3.4
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
}
]
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "cna@cyber.gov.il",
"type": "Primary",
"description": [
{
@@ -66,7 +70,7 @@
]
},
{
- "source": "cna@cyber.gov.il",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@@ -95,11 +99,8 @@
],
"references": [
{
- "url": "https://www.gov.il/en/departments/faq/cve_advisories",
- "source": "cna@cyber.gov.il",
- "tags": [
- "Third Party Advisory"
- ]
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39189.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39189.json
index 49f6a19223c..48f2b04df58 100644
--- a/CVE-2022/CVE-2022-391xx/CVE-2022-39189.json
+++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39189.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-39189",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-02T05:15:07.693",
- "lastModified": "2023-09-12T19:41:21.317",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T00:15:11.020",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -160,6 +160,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20230214-0007/",
"source": "cve@mitre.org",
diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3979.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3979.json
index fca32c05cef..8e97496b41d 100644
--- a/CVE-2022/CVE-2022-39xx/CVE-2022-3979.json
+++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3979.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-3979",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-13T23:15:09.810",
- "lastModified": "2022-11-18T21:19:09.317",
+ "lastModified": "2023-10-27T12:57:43.983",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in NagVis up to 1.9.33 and classified as problematic. This issue affects the function checkAuthCookie of the file share/server/core/classes/CoreLogonMultisite.php. The manipulation of the argument hash leads to incorrect type conversion. The attack may be initiated remotely. Upgrading to version 1.9.34 is able to address this issue. The name of the patch is 7574fd8a2903282c2e0d1feef5c4876763db21d5. It is recommended to upgrade the affected component. The identifier VDB-213557 was assigned to this vulnerability."
+ "value": "A vulnerability was found in NagVis up to 1.9.33 and classified as problematic. This issue affects the function checkAuthCookie of the file share/server/core/classes/CoreLogonMultisite.php. The manipulation of the argument hash leads to incorrect type conversion. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 1.9.34 is able to address this issue. The identifier of the patch is 7574fd8a2903282c2e0d1feef5c4876763db21d5. It is recommended to upgrade the affected component. The identifier VDB-213557 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en NagVis hasta 1.9.33 y clasificada como problem\u00e1tica. Este problema afecta la funci\u00f3n checkAuthCookie del archivo compartido/server/core/classes/CoreLogonMultisite.php. La manipulaci\u00f3n del argumento hash conduce a una conversi\u00f3n de tipo incorrecta. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.9.34 puede solucionar este problema. El nombre del parche es 7574fd8a2903282c2e0d1feef5c4876763db21d5. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-213557."
}
],
"metrics": {
@@ -17,27 +21,29 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
- "attackComplexity": "LOW",
+ "attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL"
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
},
- "exploitabilityScore": 3.9,
+ "exploitabilityScore": 2.2,
"impactScore": 5.9
- },
+ }
+ ],
+ "cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
- "version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@@ -52,11 +58,36 @@
"exploitabilityScore": 2.2,
"impactScore": 3.4
}
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
+ "accessVector": "NETWORK",
+ "accessComplexity": "HIGH",
+ "authentication": "NONE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL",
+ "baseScore": 5.1
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 4.9,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
]
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -64,6 +95,16 @@
"value": "CWE-704"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-704"
+ }
+ ]
}
],
"configurations": [
@@ -101,12 +142,27 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://vuldb.com/?ctiid.213557",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://vuldb.com/?id.213557",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.sonarsource.com/blog/checkmk-rce-chain-2/",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40287.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40287.json
index cfa051a0e8f..e882ca204a4 100644
--- a/CVE-2022/CVE-2022-402xx/CVE-2022-40287.json
+++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40287.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40287",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:12.730",
- "lastModified": "2022-11-03T02:13:51.290",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.037",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application was found to be vulnerable to an authenticated Stored Cross-Site Scripting (XSS) vulnerability in messaging functionality, leading to privilege escalation or a compromise of a targeted account."
+ "value": "\nThe application was found to be vulnerable to an authenticated Stored Cross-Site Scripting (XSS) vulnerability in messaging functionality,\u00a0leading to privilege escalation or a compromise of a targeted account.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que la aplicaci\u00f3n era vulnerable a una vulnerabilidad de Stored Cross-Site Scripting (XSS) autenticadas en la funcionalidad de mensajer\u00eda, lo que provocaba una escalada de privilegios o el compromiso de una cuenta espec\u00edfica.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40288.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40288.json
index 29a279b4a41..28e6580884a 100644
--- a/CVE-2022/CVE-2022-402xx/CVE-2022-40288.json
+++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40288.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40288",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:12.790",
- "lastModified": "2022-11-03T02:18:55.250",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.100",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application was vulnerable to an authenticated Stored Cross-Site Scripting (XSS) in the user profile data fields, which could be leveraged to escalate privileges within and compromise any account that views their user profile."
+ "value": "\nThe application was vulnerable to an authenticated Stored Cross-Site Scripting (XSS) in the user profile data fields, which could be leveraged to escalate privileges within and compromise any account that views their user profile.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n era vulnerable a Stored Cross-Site Scripting (XSS) autenticado en los campos de datos del perfil de usuario, que podr\u00eda aprovecharse para escalar privilegios y comprometer cualquier cuenta que vea su perfil de usuario.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40289.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40289.json
index d1a7aef7e01..d4b0faa5690 100644
--- a/CVE-2022/CVE-2022-402xx/CVE-2022-40289.json
+++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40289.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40289",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:12.850",
- "lastModified": "2022-11-03T15:14:36.490",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.163",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application was vulnerable to an authenticated Stored Cross-Site Scripting (XSS) in the upload and download functionality, which could be leveraged to escalate privileges or compromise any accounts they can coerce into observing the targeted files."
+ "value": "\nThe application was vulnerable to an authenticated Stored Cross-Site Scripting (XSS) in the upload and download functionality, which could be leveraged to escalate privileges or compromise any accounts they can coerce into observing the targeted files.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n era vulnerable a un Stored Cross-Site Scripting (XSS) autenticado en la funcionalidad de carga y descarga, que podr\u00eda aprovecharse para escalar privilegios o comprometer cualquier cuenta a la que puedan obligar a observar los archivos de destino.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40290.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40290.json
index 9013adb791d..82c49c65373 100644
--- a/CVE-2022/CVE-2022-402xx/CVE-2022-40290.json
+++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40290.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40290",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:12.910",
- "lastModified": "2022-11-03T02:33:32.550",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.220",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application was vulnerable to an unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability in the barcode generation functionality, allowing attackers to generate an unsafe link that could compromise users."
+ "value": "\nThe application was vulnerable to an unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability in the barcode generation functionality, allowing attackers to generate an unsafe link that could compromise users.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n era vulnerable a una vulnerabilidad de Cross-Site Scripting (XSS) Reflejado no autenticadas en la funcionalidad de generaci\u00f3n de c\u00f3digos de barras, lo que permit\u00eda a los atacantes generar un enlace inseguro que podr\u00eda comprometer a los usuarios.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40291.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40291.json
index 3204c483a7c..97a6ee0a62f 100644
--- a/CVE-2022/CVE-2022-402xx/CVE-2022-40291.json
+++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40291.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40291",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:12.967",
- "lastModified": "2022-11-03T02:28:09.567",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.277",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application was vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing an attacker to coerce users into sending malicious requests to the site to delete their account, or in rare circumstances, hijack their account and create other admin accounts."
+ "value": "\nThe application was vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing an attacker to coerce users into sending malicious requests to the site to delete their account, or in rare circumstances, hijack their account and create other admin accounts.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n era vulnerable a ataques de Cross-Site Request Forgery (CSRF), lo que permit\u00eda a un atacante obligar a los usuarios a enviar solicitudes maliciosas al sitio para eliminar su cuenta o, en circunstancias excepcionales, secuestrar su cuenta y crear otras cuentas de administrador.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40292.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40292.json
index ce678646fbb..98a1a9bc7e7 100644
--- a/CVE-2022/CVE-2022-402xx/CVE-2022-40292.json
+++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40292.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40292",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:13.030",
- "lastModified": "2022-11-03T02:35:32.747",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.330",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application allowed for Unauthenticated User Enumeration by interacting with an unsecured endpoint to retrieve information on each account within the system."
+ "value": "\nThe application allowed for Unauthenticated User Enumeration by interacting with an unsecured endpoint to retrieve information on each account within the system.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n permit\u00eda la Enumeraci\u00f3n de Usuarios No Autenticados interactuando con un endpoint no seguro para recuperar informaci\u00f3n sobre cada cuenta dentro del sistema."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40293.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40293.json
index eb3e403c0eb..be082f6df3a 100644
--- a/CVE-2022/CVE-2022-402xx/CVE-2022-40293.json
+++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40293.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40293",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:13.100",
- "lastModified": "2022-11-04T02:15:30.763",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application was vulnerable to a session fixation that could be used hijack accounts."
+ "value": "\nThe application was vulnerable to a session fixation that could be used hijack accounts.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n era vulnerable a una fijaci\u00f3n de sesi\u00f3n que podr\u00eda usarse para secuestrar cuentas.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40294.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40294.json
index 4b52b31f7c7..074c77cb4a0 100644
--- a/CVE-2022/CVE-2022-402xx/CVE-2022-40294.json
+++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40294.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40294",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:13.167",
- "lastModified": "2022-11-03T02:50:13.277",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.443",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application was identified to have an CSV injection in data export functionality, allowing for malicious code to be embedded within export data and then triggered in exported data viewers."
+ "value": "\nThe application was identified to have an CSV injection in data export functionality, allowing for malicious code to be embedded within export data and then triggered in exported data viewers.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se identific\u00f3 que la aplicaci\u00f3n ten\u00eda una inyecci\u00f3n CSV en la funcionalidad de exportaci\u00f3n de datos, lo que permit\u00eda incrustar c\u00f3digo malicioso en los datos exportados y luego activarlos en los visores de datos exportados."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40295.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40295.json
index f64279efe5b..e032f7ed148 100644
--- a/CVE-2022/CVE-2022-402xx/CVE-2022-40295.json
+++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40295.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40295",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:13.227",
- "lastModified": "2022-11-03T02:38:05.933",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.503",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application was vulnerable to an authenticated information disclosure, allowing administrators to view unsalted user passwords, which could lead to the compromise of plaintext passwords via offline attacks."
+ "value": "\nThe application was vulnerable to an authenticated information disclosure, allowing administrators to view unsalted user passwords, which could lead to the compromise of plaintext passwords via offline attacks.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n era vulnerable a una divulgaci\u00f3n de informaci\u00f3n autenticada, lo que permit\u00eda a los administradores ver contrase\u00f1as de usuario sin vector de inicializaci\u00f3n, lo que podr\u00eda comprometer las contrase\u00f1as en texto plano a trav\u00e9s de ataques fuera de l\u00ednea.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-402xx/CVE-2022-40296.json b/CVE-2022/CVE-2022-402xx/CVE-2022-40296.json
index ca8bfa5b348..538490b5d32 100644
--- a/CVE-2022/CVE-2022-402xx/CVE-2022-40296.json
+++ b/CVE-2022/CVE-2022-402xx/CVE-2022-40296.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40296",
"sourceIdentifier": "vdp@themissinglink.com.au",
"published": "2022-10-31T21:15:13.293",
- "lastModified": "2022-11-03T02:46:38.293",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.567",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The application was vulnerable to a Server-Side Request Forgery attacks, allowing the backend server to interact with unexpected endpoints, potentially including internal and local services, leading to attacks in other downstream systems."
+ "value": "\nThe application was vulnerable to a Server-Side Request Forgery attacks, allowing the backend server to interact with unexpected endpoints, potentially including internal and local services, leading to attacks in other downstream systems.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n era vulnerable a ataques de Server-Side Request Forgery (SSRF), lo que permit\u00eda que el servidor de backend interactuara con endpoints inesperados, incluidos potencialmente servicios internos y locales, lo que provocaba ataques en otros sistemas posteriores.\n"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-407xx/CVE-2022-40752.json b/CVE-2022/CVE-2022-407xx/CVE-2022-40752.json
index 3d0d941f01c..681fa74df29 100644
--- a/CVE-2022/CVE-2022-407xx/CVE-2022-40752.json
+++ b/CVE-2022/CVE-2022-407xx/CVE-2022-40752.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-40752",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2022-11-16T23:15:10.223",
- "lastModified": "2022-11-20T13:23:30.517",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T18:15:09.630",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "IBM InfoSphere DataStage 11.7 is vulnerable to a command injection vulnerability due to improper neutralization of special elements. IBM X-Force ID: 236687."
+ "value": "\nIBM InfoSphere DataStage 11.7 is vulnerable to a command injection vulnerability due to improper neutralization of special elements. IBM X-Force ID:\u00a0 236687."
+ },
+ {
+ "lang": "es",
+ "value": "IBM InfoSphere DataStage 11.7 es vulnerable a una vulnerabilidad de inyecci\u00f3n de comandos debido a una neutralizaci\u00f3n inadecuada de elementos especiales. ID de IBM X-Force: 236687."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-409xx/CVE-2022-40964.json b/CVE-2022/CVE-2022-409xx/CVE-2022-40964.json
index a31b64d9038..63d68dfcf9c 100644
--- a/CVE-2022/CVE-2022-409xx/CVE-2022-40964.json
+++ b/CVE-2022/CVE-2022-409xx/CVE-2022-40964.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-40964",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:14.603",
- "lastModified": "2023-09-30T22:15:10.177",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T18:00:10.380",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -161,6 +161,46 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -174,19 +214,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4065.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4065.json
index 2307debf15f..4e8ef564f79 100644
--- a/CVE-2022/CVE-2022-40xx/CVE-2022-4065.json
+++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4065.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-19T19:15:10.433",
- "lastModified": "2023-04-29T07:15:07.957",
+ "lastModified": "2023-10-20T15:15:09.280",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The name of the patch is 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027."
+ "value": "A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The patch is named 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. Ha sido declarado cr\u00edtico. La funci\u00f3n testngXmlExistsInJar del archivo testng-core/src/main/java/org/testng/JarFileUtils.java del componente XML File Parser es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce al Path Traversal. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a las versiones 7.5.1 y 7.7.1 puede solucionar este problema. El nombre del parche es 9150736cd2c123a6a3b60e6193630859f9f0422b. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-214027."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41015.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41015.json
index 0b3601a6113..3b969bf3ae2 100644
--- a/CVE-2022/CVE-2022-410xx/CVE-2022-41015.json
+++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41015.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-41015",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-01-26T22:15:20.793",
- "lastModified": "2023-02-03T17:19:26.433",
+ "lastModified": "2023-10-18T17:45:20.523",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -88,8 +88,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:siretta:quartz-gold_router_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
- "matchCriteriaId": "9B5DBA27-12B6-428F-8FD6-029FD9BEBCCF"
+ "criteria": "cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCF01A7B-4B0B-4548-B9EA-EF781F7C1593"
}
]
},
@@ -99,8 +99,8 @@
"cpeMatch": [
{
"vulnerable": false,
- "criteria": "cpe:2.3:h:siretta:quartz-gold_router:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "20F58BD8-49AF-4CA6-AEAB-713D82E06E85"
+ "criteria": "cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "64BC55F4-B069-4F99-B41D-BF1476A83ED4"
}
]
}
diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41016.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41016.json
index b3be74d6aea..ee2827660b4 100644
--- a/CVE-2022/CVE-2022-410xx/CVE-2022-41016.json
+++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41016.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-41016",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-01-26T22:15:20.997",
- "lastModified": "2023-02-03T17:19:36.410",
+ "lastModified": "2023-10-18T17:44:19.767",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -88,8 +88,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:siretta:quartz-gold_router_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
- "matchCriteriaId": "9B5DBA27-12B6-428F-8FD6-029FD9BEBCCF"
+ "criteria": "cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCF01A7B-4B0B-4548-B9EA-EF781F7C1593"
}
]
},
@@ -99,8 +99,8 @@
"cpeMatch": [
{
"vulnerable": false,
- "criteria": "cpe:2.3:h:siretta:quartz-gold_router:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "20F58BD8-49AF-4CA6-AEAB-713D82E06E85"
+ "criteria": "cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "64BC55F4-B069-4F99-B41D-BF1476A83ED4"
}
]
}
diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41017.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41017.json
index ac89f6eb1a9..efa4be803b5 100644
--- a/CVE-2022/CVE-2022-410xx/CVE-2022-41017.json
+++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41017.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-41017",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-01-26T22:15:21.243",
- "lastModified": "2023-02-03T17:19:45.663",
+ "lastModified": "2023-10-18T17:43:54.713",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -88,8 +88,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:siretta:quartz-gold_router_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
- "matchCriteriaId": "9B5DBA27-12B6-428F-8FD6-029FD9BEBCCF"
+ "criteria": "cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCF01A7B-4B0B-4548-B9EA-EF781F7C1593"
}
]
},
@@ -99,8 +99,8 @@
"cpeMatch": [
{
"vulnerable": false,
- "criteria": "cpe:2.3:h:siretta:quartz-gold_router:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "20F58BD8-49AF-4CA6-AEAB-713D82E06E85"
+ "criteria": "cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "64BC55F4-B069-4F99-B41D-BF1476A83ED4"
}
]
}
diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41018.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41018.json
index 2a7c8fe5f99..1e48f08d4e6 100644
--- a/CVE-2022/CVE-2022-410xx/CVE-2022-41018.json
+++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41018.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-41018",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-01-26T22:15:21.480",
- "lastModified": "2023-02-03T17:20:35.167",
+ "lastModified": "2023-10-18T17:43:40.620",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -88,8 +88,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:siretta:quartz-gold_router_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
- "matchCriteriaId": "9B5DBA27-12B6-428F-8FD6-029FD9BEBCCF"
+ "criteria": "cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCF01A7B-4B0B-4548-B9EA-EF781F7C1593"
}
]
},
@@ -99,8 +99,8 @@
"cpeMatch": [
{
"vulnerable": false,
- "criteria": "cpe:2.3:h:siretta:quartz-gold_router:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "20F58BD8-49AF-4CA6-AEAB-713D82E06E85"
+ "criteria": "cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "64BC55F4-B069-4F99-B41D-BF1476A83ED4"
}
]
}
diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41019.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41019.json
index 82c3f66e56b..892aa9abf23 100644
--- a/CVE-2022/CVE-2022-410xx/CVE-2022-41019.json
+++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41019.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-41019",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-01-26T22:15:21.707",
- "lastModified": "2023-02-06T17:29:40.217",
+ "lastModified": "2023-10-18T17:43:03.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -88,8 +88,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:siretta:quartz-gold_router_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
- "matchCriteriaId": "9B5DBA27-12B6-428F-8FD6-029FD9BEBCCF"
+ "criteria": "cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCF01A7B-4B0B-4548-B9EA-EF781F7C1593"
}
]
},
@@ -99,8 +99,8 @@
"cpeMatch": [
{
"vulnerable": false,
- "criteria": "cpe:2.3:h:siretta:quartz-gold_router:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "20F58BD8-49AF-4CA6-AEAB-713D82E06E85"
+ "criteria": "cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "64BC55F4-B069-4F99-B41D-BF1476A83ED4"
}
]
}
diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41064.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41064.json
index cf3eed184ce..370ed9070ba 100644
--- a/CVE-2022/CVE-2022-410xx/CVE-2022-41064.json
+++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41064.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-41064",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-11-09T22:15:20.917",
- "lastModified": "2023-07-11T17:15:11.940",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T19:01:23.327",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": ".NET Framework Information Disclosure Vulnerability"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de .NET Framework"
}
],
"metrics": {
@@ -594,11 +598,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2D3F18AF-84ED-473B-A8DF-65EB23C475AF"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:microsoft:.net_framework:6.7.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "5D781D99-5255-4D1A-81B7-49705EA27297"
}
]
},
@@ -690,7 +689,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41224.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41224.json
index c8aa13618ae..7d786707513 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41224.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41224.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41224",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:09.710",
- "lastModified": "2022-09-22T15:17:10.737",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.623",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41225.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41225.json
index df7f12ed17d..52eb5c24c8f 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41225.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41225.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41225",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:09.917",
- "lastModified": "2022-09-22T15:16:42.557",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.700",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41226.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41226.json
index a2528394a15..8b15ab44c15 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41226.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41226.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41226",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:09.977",
- "lastModified": "2022-09-22T15:14:12.330",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.753",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41227.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41227.json
index d54e3c7f0d9..c5658641d39 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41227.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41227.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41227",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.037",
- "lastModified": "2022-09-22T15:10:52.607",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.813",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-352"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41228.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41228.json
index 5df26d809c9..5e0fbe56314 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41228.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41228.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41228",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.097",
- "lastModified": "2022-09-22T15:10:00.310",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.867",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41229.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41229.json
index 6bef63fcc65..758ab16cf82 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41229.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41229.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41229",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.157",
- "lastModified": "2022-09-22T15:09:23.483",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:16.917",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41230.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41230.json
index 9d0343964d7..d83370370d0 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41230.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41230.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41230",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.217",
- "lastModified": "2023-10-10T22:15:11.177",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T18:17:16.970",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -39,19 +39,9 @@
]
},
"weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- },
{
"source": "nvd@nist.gov",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41231.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41231.json
index 265994d713e..d6960611d7d 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41231.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41231.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41231",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.273",
- "lastModified": "2022-09-22T15:07:26.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.027",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41232.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41232.json
index 364a53b5729..5abe4425ef9 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41232.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41232.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41232",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.330",
- "lastModified": "2022-09-22T15:06:54.917",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.083",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41233.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41233.json
index d99ef1059bc..89c72a90b84 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41233.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41233.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41233",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.387",
- "lastModified": "2022-09-22T15:48:10.057",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.133",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41234.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41234.json
index ae923b052f2..7f8761a7c59 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41234.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41234.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41234",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.443",
- "lastModified": "2022-09-22T16:09:56.880",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.190",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41235.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41235.json
index fb3023ba34d..94a36d8df67 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41235.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41235.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41235",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.500",
- "lastModified": "2022-11-29T13:42:46.253",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.243",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41236.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41236.json
index 719108e01d2..59661b426c0 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41236.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41236.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41236",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.560",
- "lastModified": "2022-09-22T16:08:19.070",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.303",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41237.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41237.json
index b21bedafa4f..187672c0bb3 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41237.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41237.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41237",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.617",
- "lastModified": "2022-09-22T16:07:31.540",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.363",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-502"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41238.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41238.json
index ed2cbff0b11..8ae7a5c53f0 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41238.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41238.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41238",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.677",
- "lastModified": "2022-09-22T16:06:46.347",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.417",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41239.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41239.json
index c59278d8ece..b72d09d0e36 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41239.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41239.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41239",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.733",
- "lastModified": "2022-09-22T16:06:12.513",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.477",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41240.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41240.json
index 56cdac6a968..f9fc3e49a29 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41240.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41240.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41240",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.790",
- "lastModified": "2022-09-22T16:05:49.277",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.527",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41241.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41241.json
index d71cbe36ad0..cbfcf666568 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41241.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41241.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41241",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.847",
- "lastModified": "2022-09-22T16:05:23.450",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.590",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41242.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41242.json
index 9164fd0de3d..1d66eb1ee98 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41242.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41242.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41242",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.907",
- "lastModified": "2022-09-22T15:54:59.590",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.647",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41243.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41243.json
index bbf0e21adb0..3eccd6cfb01 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41243.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41243.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41243",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:10.967",
- "lastModified": "2022-09-22T15:53:19.883",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.697",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-297"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41244.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41244.json
index e8cf6554eca..718bb4c7800 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41244.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41244.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41244",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.033",
- "lastModified": "2022-09-22T15:52:30.243",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.753",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-297"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41245.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41245.json
index c3403f77805..0923e3ef2d9 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41245.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41245.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41245",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.090",
- "lastModified": "2022-09-22T15:51:15.087",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.807",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41246.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41246.json
index 8855da66037..452459ab805 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41246.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41246.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41246",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.153",
- "lastModified": "2022-09-22T15:49:17.330",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.863",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41247.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41247.json
index 884d5ff285e..8d5528e8767 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41247.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41247.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41247",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.213",
- "lastModified": "2022-09-22T16:15:43.103",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.917",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41248.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41248.json
index b2225c332dd..4c76cc8be9d 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41248.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41248.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41248",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.277",
- "lastModified": "2022-09-22T18:36:36.107",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:17.977",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-549"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41249.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41249.json
index 3694d990a2c..2d85b1924b8 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41249.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41249.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41249",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.333",
- "lastModified": "2022-09-22T18:37:49.953",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.037",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41250.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41250.json
index 4cca3105809..a5ce3982209 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41250.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41250.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41250",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.390",
- "lastModified": "2022-09-22T18:38:52.950",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.093",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41251.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41251.json
index 0aa0a74f647..919a0e6891c 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41251.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41251.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41251",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.450",
- "lastModified": "2022-09-22T18:40:08.890",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.153",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41252.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41252.json
index 27b9266354a..61e75f0934e 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41252.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41252.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41252",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.507",
- "lastModified": "2022-09-22T18:41:18.913",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.213",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41253.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41253.json
index 93c3f10e294..2576e0faeb5 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41253.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41253.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41253",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.563",
- "lastModified": "2022-09-22T18:43:28.500",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.280",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41254.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41254.json
index 15931866626..e0c55de34f9 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41254.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41254.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41254",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.623",
- "lastModified": "2022-09-22T18:44:58.547",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.337",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41255.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41255.json
index 54b3e6f8e60..2f748209dd9 100644
--- a/CVE-2022/CVE-2022-412xx/CVE-2022-41255.json
+++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41255.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-41255",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-09-21T16:15:11.683",
- "lastModified": "2023-06-27T14:39:25.127",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.393",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41775.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41775.json
index cfad334628e..159cefaab50 100644
--- a/CVE-2022/CVE-2022-417xx/CVE-2022-41775.json
+++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41775.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-41775",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-11-17T23:15:22.497",
- "lastModified": "2022-11-18T18:50:46.633",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T00:15:08.653",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "SQL Injection in Handler_CFG.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network"
+ "value": "SQL Injection in \n\n\n\n\n\n\n\nHandler_CFG.ashx\u00a0in Delta Electronics DIAEnergie versions prior to\u00a0v1.9.02.001\u00a0allows an attacker to inject SQL queries via Network"
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n SQL en Handler_CFG.ashx en versiones de Delta Electronics DIAEnergie anteriores a la v1.9.02.001 permite a un atacante inyectar consultas SQL a trav\u00e9s de la red"
}
],
"metrics": {
@@ -57,7 +61,7 @@
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42150.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42150.json
new file mode 100644
index 00000000000..123ab99f746
--- /dev/null
+++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42150.json
@@ -0,0 +1,120 @@
+{
+ "id": "CVE-2022-42150",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T20:15:08.710",
+ "lastModified": "2023-10-26T14:36:29.843",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TinyLab linux-lab v1.1-rc1 and cloud-labv0.8-rc2, v1.1-rc1 are vulnerable to insecure permissions. The default configuration could cause Container Escape."
+ },
+ {
+ "lang": "es",
+ "value": "TinyLab linux-lab v1.1-rc1 y cloud-labv0.8-rc2, v1.1-rc1 son vulnerables a permisos inseguros. La configuraci\u00f3n predeterminada podr\u00eda provocar el escape del contenedor."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 10.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-276"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tinylab:cloud_lab:0.8:rc2:*:*:*:*:*:*",
+ "matchCriteriaId": "97511A97-0470-42FA-8D7A-132508A64C39"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tinylab:cloud_lab:1.1:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "4F4C8B86-BDC7-4766-ADEC-E7A365E832AC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tinylab:linux_lab:1.1:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "170D3DC8-E719-4B58-92B0-82B5D0A219A2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/eBPF-Research/eBPF-Attack/blob/main/PoC.md#attack-requirements",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/tinyclub/cloud-lab/blob/d19ff92713685a7fb84b423dea6a184b25c378c9/configs/common/seccomp-profiles-default.json",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/tinyclub/linux-lab/issues/14",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking"
+ ]
+ },
+ {
+ "url": "https://hackmd.io/@UR9gnr32QymtmtZHnZceOw/ry428EZGo",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.usenix.org/conference/usenixsecurity23/presentation/he",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42187.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42187.json
index 7f91dd1fa64..a40f0540f0a 100644
--- a/CVE-2022/CVE-2022-421xx/CVE-2022-42187.json
+++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42187.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-42187",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-17T04:15:10.950",
- "lastModified": "2022-11-17T23:24:14.183",
+ "lastModified": "2023-10-18T16:05:51.957",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Hustoj 22.09.22 has a XSS Vulnerability in /admin/problem_judge.php."
+ },
+ {
+ "lang": "es",
+ "value": "Hustoj 22.09.22 tiene una vulnerabilidad XSS en /admin/problem_judge.php."
}
],
"metrics": {
@@ -41,7 +45,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-77"
+ "value": "CWE-79"
}
]
}
@@ -55,8 +59,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:hustoj_project:hustoj:22.09.22:*:*:*:*:*:*:*",
- "matchCriteriaId": "5A5323AB-0CEA-4392-96EF-CE1681ECB9AA"
+ "criteria": "cpe:2.3:a:hustoj:hustoj:22.09.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F9D317C-8136-4514-8E07-250E38E47B48"
}
]
}
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42254.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42254.json
index 8f1f892c287..ef4817084d6 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42254.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42254.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42254",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:10.657",
- "lastModified": "2023-10-03T15:15:38.143",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:21:04.743",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -269,7 +269,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42255.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42255.json
index 6d38037a5d1..eb7bc0d7077 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42255.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42255.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42255",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:10.753",
- "lastModified": "2023-10-03T15:15:38.243",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:21:45.383",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -206,7 +206,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42256.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42256.json
index c0bee598402..7c8e2aefb3d 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42256.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42256.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42256",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:10.830",
- "lastModified": "2023-10-03T15:15:38.330",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:24:02.397",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -206,7 +206,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42257.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42257.json
index 68124bd97d4..0e35c39977e 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42257.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42257.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42257",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:10.897",
- "lastModified": "2023-10-03T15:15:38.417",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:34:36.963",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -323,12 +323,30 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00010.html",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5415",
@@ -339,7 +357,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42258.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42258.json
index c96b1a0d41c..578dca8eaae 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42258.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42258.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42258",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:10.963",
- "lastModified": "2023-10-03T15:15:38.520",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:34:16.413",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -323,12 +323,30 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00010.html",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5415",
@@ -339,7 +357,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42259.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42259.json
index 7bbab51ed7a..dbe85a28ae8 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42259.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42259.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42259",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:11.030",
- "lastModified": "2023-10-03T15:15:38.620",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:33:55.463",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -323,12 +323,30 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00010.html",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5415",
@@ -339,7 +357,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42260.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42260.json
index 63cf5ebb168..647f05f6356 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42260.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42260.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42260",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:11.097",
- "lastModified": "2023-10-03T15:15:38.717",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:33:32.770",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -300,7 +300,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42261.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42261.json
index f2927b3e1db..985034436d9 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42261.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42261.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42261",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:11.167",
- "lastModified": "2023-10-03T15:15:38.813",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:33:15.580",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -272,7 +272,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42263.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42263.json
index f070a7c37f1..2bd5a119974 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42263.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42263.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42263",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:11.360",
- "lastModified": "2023-10-03T15:15:38.907",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:30:40.070",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -307,7 +307,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42264.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42264.json
index 1632e03d536..e3326ea4994 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42264.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42264.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42264",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:11.443",
- "lastModified": "2023-10-03T15:15:39.003",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:29:04.023",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -307,7 +307,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-422xx/CVE-2022-42265.json b/CVE-2022/CVE-2022-422xx/CVE-2022-42265.json
index e2e40c950aa..12cfb8de326 100644
--- a/CVE-2022/CVE-2022-422xx/CVE-2022-42265.json
+++ b/CVE-2022/CVE-2022-422xx/CVE-2022-42265.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42265",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2022-12-30T23:15:11.513",
- "lastModified": "2023-10-03T15:15:39.107",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:24:24.970",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -137,7 +137,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-423xx/CVE-2022-42344.json b/CVE-2022/CVE-2022-423xx/CVE-2022-42344.json
index 1ad55772772..a3aabc2b760 100644
--- a/CVE-2022/CVE-2022-423xx/CVE-2022-42344.json
+++ b/CVE-2022/CVE-2022-423xx/CVE-2022-42344.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-42344",
"sourceIdentifier": "psirt@adobe.com",
"published": "2022-10-20T17:15:10.723",
- "lastModified": "2023-07-06T14:37:45.133",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.470",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by an improper input validation vulnerability. An authenticated attacker can trigger an insecure direct object reference in the `V1/customers/me` endpoint to achieve information exposure and privilege escalation."
+ "value": "Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by an Incorrect Authorization vulnerability. An authenticated attacker can exploit this vulnerability to achieve information exposure and privilege escalation."
},
{
"lang": "es",
@@ -40,22 +40,22 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "CWE-639"
+ "value": "CWE-863"
}
]
},
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "CWE-639"
}
]
}
diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42451.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42451.json
index adda1d45b56..026f1c17040 100644
--- a/CVE-2022/CVE-2022-424xx/CVE-2022-42451.json
+++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42451.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-42451",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-10-11T06:15:09.387",
- "lastModified": "2023-10-11T12:54:12.883",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T15:02:36.410",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ },
{
"source": "psirt@hcl.com",
"type": "Secondary",
@@ -38,10 +58,43 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-522"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:bigfix_patch_management:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1055",
+ "matchCriteriaId": "B601BA92-3530-4204-A30D-A9FB1C0F3709"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108007",
- "source": "psirt@hcl.com"
+ "source": "psirt@hcl.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4269.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4269.json
index da44e4f0eea..05029cd9d7c 100644
--- a/CVE-2022/CVE-2022-42xx/CVE-2022-4269.json
+++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4269.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4269",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-12-05T16:15:10.283",
- "lastModified": "2023-09-29T22:15:10.673",
+ "lastModified": "2023-10-20T00:15:11.157",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
@@ -64,6 +64,10 @@
}
],
"references": [
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lore.kernel.org/netdev/33dc43f587ec1388ba456b4915c75f02a8aae226.1663945716.git.dcaratti%40redhat.com/",
"source": "secalert@redhat.com"
diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4290.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4290.json
new file mode 100644
index 00000000000..cdef52768e7
--- /dev/null
+++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4290.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2022-4290",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.917",
+ "lastModified": "2023-10-27T18:47:25.887",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Cyr to Lat plugin for WordPress is vulnerable to authenticated SQL Injection via the 'ctl_sanitize_title' function in versions up to, and including, 3.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This potentially allows authenticated users with the ability to add or modify terms or tags to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. A partial patch became available in version 3.6 and the issue was fully patched in version 3.7."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Cyr to Lat para WordPress es vulnerable a la inyecci\u00f3n SQL autenticada a trav\u00e9s de la funci\u00f3n 'ctl_sanitize_title' en versiones hasta la 3.5 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Potencialmente, esto permite a los usuarios autenticados tener la capacidad de agregar o modificar t\u00e9rminos o etiquetas para agregar consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos. Un parche parcial estuvo disponible en la versi\u00f3n 3.6 y el problema se solucion\u00f3 completamente en la versi\u00f3n 3.7."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cyr_to_lat_project:cyr_to_lat:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.7",
+ "matchCriteriaId": "6781C5A9-3F42-4AB7-ADF1-32763A6908E2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/cyr3lat/trunk/cyr-to-lat.php?rev=1117224#L69",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c29130-1b42-4edd-ad62-6f635e03ae31?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43401.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43401.json
index 1b9b697699a..72327171b17 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43401.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43401.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43401",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.127",
- "lastModified": "2022-10-31T17:37:20.617",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.590",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,12 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Patch",
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43402.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43402.json
index cec570d9f9c..559bf8f839d 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43402.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43402.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43402",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.197",
- "lastModified": "2023-01-30T19:18:41.127",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.667",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43403.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43403.json
index 4f505572749..eca8ff813ce 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43403.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43403.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-43403",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.253",
- "lastModified": "2023-03-01T01:15:10.390",
+ "lastModified": "2023-10-25T18:17:18.727",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
},
{
"url": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/",
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43404.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43404.json
index b5e2f0eccd1..900db4e4066 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43404.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43404.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43404",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.313",
- "lastModified": "2022-10-21T15:10:37.667",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.797",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43405.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43405.json
index 3092eca92a6..6faf326ff50 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43405.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43405.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43405",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.370",
- "lastModified": "2022-10-21T19:01:30.567",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.860",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
@@ -88,11 +78,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43406.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43406.json
index d7b94f0c3f7..0a12f3938b7 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43406.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43406.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43406",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.427",
- "lastModified": "2022-10-24T14:58:44.497",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.920",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43407.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43407.json
index eada9213a94..e671acb1465 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43407.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43407.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43407",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.483",
- "lastModified": "2022-10-21T17:40:00.763",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:18.987",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-838"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43408.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43408.json
index f7b6dd98160..3da89c9b996 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43408.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43408.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43408",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.543",
- "lastModified": "2022-10-21T18:52:20.570",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.043",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-838"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43409.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43409.json
index df307da371a..5b36dd75480 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43409.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43409.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43409",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.600",
- "lastModified": "2022-10-21T17:20:57.013",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.110",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43410.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43410.json
index ffd6e4c64ae..f20bb63b5b7 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43410.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43410.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43410",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.660",
- "lastModified": "2023-07-06T14:42:01.913",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.167",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-200"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43411.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43411.json
index e089d799039..34f78cb0d33 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43411.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43411.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43411",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.717",
- "lastModified": "2022-10-20T18:42:04.517",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.227",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-203"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-208"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43412.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43412.json
index cd58480c3ee..e96d57ed945 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43412.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43412.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43412",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.773",
- "lastModified": "2022-10-20T19:21:55.893",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.290",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-203"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-208"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43413.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43413.json
index 7f9a6f7ab00..7d2c96d2b21 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43413.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43413.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43413",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.830",
- "lastModified": "2022-10-21T03:42:04.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.343",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43414.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43414.json
index ff16e521430..a1697b838a1 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43414.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43414.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43414",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.887",
- "lastModified": "2022-10-21T03:14:55.993",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.397",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43415.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43415.json
index 62891856f09..b8d9d840a30 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43415.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43415.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43415",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:10.940",
- "lastModified": "2022-10-21T03:15:24.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.457",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-611"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43416.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43416.json
index ad86bae0081..49ca73db0aa 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43416.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43416.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43416",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.000",
- "lastModified": "2022-10-21T03:16:02.817",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.517",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43417.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43417.json
index 6bbdcc587f9..4f8d9c8b54d 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43417.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43417.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43417",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.057",
- "lastModified": "2022-10-21T03:17:10.943",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.583",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43418.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43418.json
index fee9e6388d3..70e72b44ce3 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43418.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43418.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43418",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.110",
- "lastModified": "2022-10-21T03:18:00.450",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.690",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -78,11 +66,8 @@
]
},
{
- "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43419.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43419.json
index 086fa0cb742..2ba1d32438e 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43419.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43419.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43419",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.167",
- "lastModified": "2022-10-21T03:40:42.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.750",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43420.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43420.json
index e6f15fd285a..6344fc28935 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43420.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43420.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43420",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.223",
- "lastModified": "2022-10-21T03:41:04.363",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.810",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43421.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43421.json
index 21e61cf6146..59d161e03a6 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43421.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43421.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43421",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.280",
- "lastModified": "2022-10-21T03:41:30.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.867",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43422.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43422.json
index cf8d6566631..079619bc600 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43422.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43422.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43422",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.333",
- "lastModified": "2022-10-21T03:41:44.060",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.923",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43423.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43423.json
index e8f6575cd3c..80b0b701238 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43423.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43423.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43423",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.387",
- "lastModified": "2022-10-20T18:28:11.377",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:19.980",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "NVD-CWE-noinfo"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43424.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43424.json
index 172442bf91b..508438bcb0f 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43424.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43424.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43424",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.440",
- "lastModified": "2022-10-22T02:07:38.443",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.057",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"operator": "AND",
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43425.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43425.json
index 4e1c84a94d8..ab10dd4252e 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43425.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43425.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43425",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.500",
- "lastModified": "2022-10-22T02:05:18.207",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.140",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43426.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43426.json
index 56b8c9a4043..384d3624dfc 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43426.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43426.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43426",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.553",
- "lastModified": "2022-10-22T02:32:45.807",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.197",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-549"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43427.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43427.json
index 48cd1c1f0b8..658c598d124 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43427.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43427.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43427",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.613",
- "lastModified": "2022-10-22T02:11:03.823",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.257",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43428.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43428.json
index c237f683f7e..b28489094f6 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43428.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43428.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43428",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.673",
- "lastModified": "2023-01-31T20:15:47.190",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.313",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"operator": "AND",
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43429.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43429.json
index 3c53db7ddd9..0e944203588 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43429.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43429.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43429",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.730",
- "lastModified": "2022-10-22T02:24:38.983",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.383",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"operator": "AND",
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43430.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43430.json
index 0259880f760..36c8e26e858 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43430.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43430.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43430",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.787",
- "lastModified": "2022-10-22T02:19:13.387",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.473",
+ "vulnStatus": "Undergoing Analysis",
"evaluatorComment": "\n\n",
"descriptions": [
{
@@ -39,18 +39,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43431.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43431.json
index 78cd31e4355..174dae1626b 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43431.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43431.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43431",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.847",
- "lastModified": "2022-10-22T02:25:42.633",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.547",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43432.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43432.json
index cec20aabcd9..67cd870f23d 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43432.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43432.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43432",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.897",
- "lastModified": "2022-10-23T02:06:36.153",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.617",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43433.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43433.json
index c3b2a9a282e..a347ce6d787 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43433.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43433.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43433",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.953",
- "lastModified": "2022-10-23T02:07:02.157",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.677",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43434.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43434.json
index 08e8ef8e72a..2c1c3c6411c 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43434.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43434.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43434",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:12.010",
- "lastModified": "2022-10-24T13:56:31.973",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.733",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -38,18 +38,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43435.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43435.json
index 6cd3efad49b..a863eb27bda 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43435.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43435.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43435",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:12.070",
- "lastModified": "2022-10-24T13:57:21.417",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.787",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -48,16 +48,6 @@
"value": "NVD-CWE-Other"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43447.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43447.json
index 0c4bf89b721..7a3fd90bfae 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43447.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43447.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-43447",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-11-17T23:15:24.017",
- "lastModified": "2022-11-18T18:50:31.493",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T00:15:08.747",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "SQL Injection in AM_EBillAnalysis.aspx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network"
+ "value": "SQL Injection in \n\n\n\n\n\n\n\n\n\nAM_EBillAnalysis.aspx\u00a0in Delta Electronics DIAEnergie versions prior to\u00a0v1.9.02.001\u00a0allows an attacker to inject SQL queries via Network"
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n SQL en AM_EBillAnalysis.aspx en versiones de Delta Electronics DIAEnergie anteriores a v1.9.02.001 permite a un atacante inyectar consultas SQL a trav\u00e9s de la red"
}
],
"metrics": {
@@ -57,7 +61,7 @@
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43452.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43452.json
index fdc32317666..00807a975b0 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43452.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43452.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-43452",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-11-17T23:15:24.117",
- "lastModified": "2022-11-18T18:33:47.847",
+ "lastModified": "2023-10-27T20:31:36.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "SQL Injection in FtyInfoSetting.aspx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network"
+ "value": "SQL Injection in \n\n\n\n\n\n\n\n\n\n\n\n\n\nFtyInfoSetting.aspx\u00a0in Delta Electronics DIAEnergie versions prior to\u00a0v1.9.02.001\u00a0allows an attacker to inject SQL queries via Network"
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n SQL en FtyInfoSetting.aspx en las versiones de Delta Electronics DIAEnergie anteriores a v1.9.02.001 permite a un atacante inyectar consultas SQL a trav\u00e9s de la red"
}
],
"metrics": {
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "ics-cert@hq.dhs.gov",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -64,6 +68,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43457.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43457.json
index 8487393e811..d62155dd3a1 100644
--- a/CVE-2022/CVE-2022-434xx/CVE-2022-43457.json
+++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43457.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-43457",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-11-17T23:15:24.203",
- "lastModified": "2022-11-18T18:34:29.523",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T00:15:08.893",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "SQL Injection in HandlerPage_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network"
+ "value": "SQL Injection in \n\n\n\n\n\n\n\n\n\n\n\nHandlerPage_KID.ashx\u00a0in Delta Electronics DIAEnergie versions prior to\u00a0v1.9.02.001\u00a0allows an attacker to inject SQL queries via Network"
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n SQL en HandlerPage_KID.ashx en versiones de Delta Electronics DIAEnergie anteriores a la v1.9.02.001 permite a un atacante inyectar consultas SQL a trav\u00e9s de la red"
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-435xx/CVE-2022-43506.json b/CVE-2022/CVE-2022-435xx/CVE-2022-43506.json
index dc17c384c70..6e2fb31f698 100644
--- a/CVE-2022/CVE-2022-435xx/CVE-2022-43506.json
+++ b/CVE-2022/CVE-2022-435xx/CVE-2022-43506.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-43506",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-11-17T23:15:24.303",
- "lastModified": "2022-11-18T19:17:28.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T00:15:08.967",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "SQL Injection in HandlerTag_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network"
+ "value": "SQL Injection in \n\n\n\nHandlerTag_KID.ashx\n\n\n\nin Delta Electronics DIAEnergie versions prior to\u00a0v1.9.02.001\u00a0allows an attacker to inject SQL queries via Network"
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n SQL en HandlerTag_KID.ashx en versiones de Delta Electronics DIAEnergie anteriores a v1.9.02.001 permite a un atacante inyectar consultas SQL a trav\u00e9s de la red"
}
],
"metrics": {
@@ -57,7 +61,7 @@
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-435xx/CVE-2022-43551.json b/CVE-2022/CVE-2022-435xx/CVE-2022-43551.json
index 057b37da8c5..9de8df2603b 100644
--- a/CVE-2022/CVE-2022-435xx/CVE-2022-43551.json
+++ b/CVE-2022/CVE-2022-435xx/CVE-2022-43551.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43551",
"sourceIdentifier": "support@hackerone.com",
"published": "2022-12-23T15:15:15.777",
- "lastModified": "2023-10-11T11:15:09.723",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:57:25.710",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -88,6 +88,41 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
+ "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
+ "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -109,11 +144,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-435xx/CVE-2022-43552.json b/CVE-2022/CVE-2022-435xx/CVE-2022-43552.json
index 70c215f1c2a..21912d6c0e6 100644
--- a/CVE-2022/CVE-2022-435xx/CVE-2022-43552.json
+++ b/CVE-2022/CVE-2022-435xx/CVE-2022-43552.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43552",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-09T20:15:10.950",
- "lastModified": "2023-10-11T11:15:10.070",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:57:21.877",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -72,12 +72,33 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.0",
+ "versionEndExcluding": "13.3",
+ "matchCriteriaId": "A6D636F7-278A-491B-8960-91A4D5A86A96"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Mar/17",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://hackerone.com/reports/1764858",
@@ -90,7 +111,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230214-0002/",
@@ -101,7 +125,10 @@
},
{
"url": "https://support.apple.com/kb/HT213670",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-435xx/CVE-2022-43557.json b/CVE-2022/CVE-2022-435xx/CVE-2022-43557.json
index 153d71c5a47..9e94839c72e 100644
--- a/CVE-2022/CVE-2022-435xx/CVE-2022-43557.json
+++ b/CVE-2022/CVE-2022-435xx/CVE-2022-43557.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-43557",
"sourceIdentifier": "cybersecurity@bd.com",
"published": "2022-12-05T22:15:11.157",
- "lastModified": "2022-12-09T00:32:15.427",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T21:15:08.310",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "The BD BodyGuard\u2122 infusion pumps specified allow for access through the RS-232 (serial) port interface. If exploited, threat actors with physical access, specialized equipment and knowledge may be able to configure or disable the pump. No electronic protected health information (ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the pump."
+ "value": "The BD BodyGuard\u2122 infusion pumps specified allow for access through the RS-232\u00a0(serial) port interface. If exploited, threat actors with physical access, specialized equipment and\u00a0knowledge may be able to configure or disable the pump. No electronic protected health information\u00a0(ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the\u00a0pump."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-437xx/CVE-2022-43722.json b/CVE-2022/CVE-2022-437xx/CVE-2022-43722.json
index adb1a0b0392..3810d8da907 100644
--- a/CVE-2022/CVE-2022-437xx/CVE-2022-43722.json
+++ b/CVE-2022/CVE-2022-437xx/CVE-2022-43722.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-43722",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-12-13T16:15:24.070",
- "lastModified": "2023-10-13T16:45:10.723",
+ "lastModified": "2023-10-17T19:05:34.467",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -61,7 +61,15 @@
"nodes": [
{
"operator": "OR",
- "negate": false
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0",
+ "matchCriteriaId": "8FD90B1C-FD0B-4EA2-9226-3849F7ECFC2F"
+ }
+ ]
}
]
}
diff --git a/CVE-2022/CVE-2022-437xx/CVE-2022-43723.json b/CVE-2022/CVE-2022-437xx/CVE-2022-43723.json
index e12cc32fd63..66a69f63861 100644
--- a/CVE-2022/CVE-2022-437xx/CVE-2022-43723.json
+++ b/CVE-2022/CVE-2022-437xx/CVE-2022-43723.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-43723",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-12-13T16:15:24.250",
- "lastModified": "2023-10-13T16:45:10.723",
+ "lastModified": "2023-10-17T19:05:26.933",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -61,7 +61,16 @@
"nodes": [
{
"operator": "OR",
- "negate": false
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.0",
+ "versionEndExcluding": "8.06",
+ "matchCriteriaId": "21250DFA-9054-4988-BB37-E77789AD4F20"
+ }
+ ]
}
]
}
diff --git a/CVE-2022/CVE-2022-437xx/CVE-2022-43724.json b/CVE-2022/CVE-2022-437xx/CVE-2022-43724.json
index 8bb120143d2..3473b9f3c12 100644
--- a/CVE-2022/CVE-2022-437xx/CVE-2022-43724.json
+++ b/CVE-2022/CVE-2022-437xx/CVE-2022-43724.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-43724",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-12-13T16:15:24.327",
- "lastModified": "2023-10-13T16:45:10.723",
+ "lastModified": "2023-10-17T19:01:36.840",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -61,7 +61,15 @@
"nodes": [
{
"operator": "OR",
- "negate": false
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:siemens:sicam_pas\\/pqs:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0",
+ "matchCriteriaId": "8FD90B1C-FD0B-4EA2-9226-3849F7ECFC2F"
+ }
+ ]
}
]
}
diff --git a/CVE-2022/CVE-2022-437xx/CVE-2022-43740.json b/CVE-2022/CVE-2022-437xx/CVE-2022-43740.json
index 452922b510e..22d5fd19bde 100644
--- a/CVE-2022/CVE-2022-437xx/CVE-2022-43740.json
+++ b/CVE-2022/CVE-2022-437xx/CVE-2022-43740.json
@@ -2,16 +2,40 @@
"id": "CVE-2022-43740",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-14T16:15:10.503",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:38:34.560",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Access OIDC Provider could allow a remote user to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 238921."
+ },
+ {
+ "lang": "es",
+ "value": "El proveedor OIDC de IBM Security Verify Access podr\u00eda permitir que un usuario remoto provoque una Denegaci\u00f3n de Servicio (DoS) debido al consumo incontrolado de recursos. ID de IBM X-Force: 238921."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_access_oidc_provider:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F8CF0EE-40BC-421E-8458-57699FDE9C2E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/238921",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7028513",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43868.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43868.json
index 3f01b6dee37..5c9194b696d 100644
--- a/CVE-2022/CVE-2022-438xx/CVE-2022-43868.json
+++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43868.json
@@ -2,16 +2,40 @@
"id": "CVE-2022-43868",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-14T16:15:10.580",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:42:37.737",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Access OIDC Provider could disclose directory information that could aid attackers in further attacks against the system. IBM X-Force ID: 239445."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Verify Access OIDC Provider podr\u00eda revelar informaci\u00f3n de directorio que podr\u00eda ayudar a los atacantes en futuros ataques contra el sistema. ID de IBM X-Force: 239445."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_access_oidc_provider:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F8CF0EE-40BC-421E-8458-57699FDE9C2E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239445",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7028513",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43889.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43889.json
index a727da1b522..2d7d16c6ff6 100644
--- a/CVE-2022/CVE-2022-438xx/CVE-2022-43889.json
+++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43889.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43889",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T02:15:10.427",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T18:04:04.597",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,56 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/240452",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43891.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43891.json
index e287950ba35..b605595e3e2 100644
--- a/CVE-2022/CVE-2022-438xx/CVE-2022-43891.json
+++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43891.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43891",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T03:15:09.520",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T18:02:44.460",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-209"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/240454",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43892.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43892.json
index 2e39894b402..f8bf4988b90 100644
--- a/CVE-2022/CVE-2022-438xx/CVE-2022-43892.json
+++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43892.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43892",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T03:15:09.603",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T18:08:05.683",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-295"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/240455",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43893.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43893.json
index e3f3d138b9e..8f28763e853 100644
--- a/CVE-2022/CVE-2022-438xx/CVE-2022-43893.json
+++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43893.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-43893",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T02:15:10.507",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T18:03:11.993",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,57 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.5",
+ "matchCriteriaId": "CEE9CBED-455C-4B83-A735-76EE4C7E331A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/240534",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047202",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44570.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44570.json
index ba157a14eb7..44ba6253cb1 100644
--- a/CVE-2022/CVE-2022-445xx/CVE-2022-44570.json
+++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44570.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-44570",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-09T20:15:11.090",
- "lastModified": "2023-06-23T18:30:05.373",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-22T19:15:08.540",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -104,6 +104,10 @@
"Patch",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://www.debian.org/security/2023/dsa-5530",
+ "source": "support@hackerone.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44571.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44571.json
index 62ae06e33e0..f11f091812d 100644
--- a/CVE-2022/CVE-2022-445xx/CVE-2022-44571.json
+++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44571.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-44571",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-09T20:15:11.153",
- "lastModified": "2023-02-17T18:51:41.527",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-22T19:15:08.620",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -104,6 +104,10 @@
"Patch",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://www.debian.org/security/2023/dsa-5530",
+ "source": "support@hackerone.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44572.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44572.json
index d344c0cb964..e952c65ee50 100644
--- a/CVE-2022/CVE-2022-445xx/CVE-2022-44572.json
+++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44572.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-44572",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-09T20:15:11.220",
- "lastModified": "2023-02-17T18:55:23.453",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-22T19:15:08.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -96,6 +96,10 @@
"Permissions Required",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://www.debian.org/security/2023/dsa-5530",
+ "source": "support@hackerone.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44617.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44617.json
index 5d8b6cf2cdd..9f83c111250 100644
--- a/CVE-2022/CVE-2022-446xx/CVE-2022-44617.json
+++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44617.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-44617",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-02-06T23:15:09.787",
- "lastModified": "2023-06-20T14:15:09.837",
+ "lastModified": "2023-10-17T15:55:36.773",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -69,9 +69,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:libxpm_project:libxpm:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.15",
- "matchCriteriaId": "934FFD94-DF18-451C-BB87-0360AACC094D"
+ "matchCriteriaId": "D98D97AA-EDDE-48F7-B4DE-E51BFB5A72D3"
}
]
}
diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44757.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44757.json
index cad29d143c8..2e6a5232479 100644
--- a/CVE-2022/CVE-2022-447xx/CVE-2022-44757.json
+++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44757.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-44757",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-10-11T07:15:09.237",
- "lastModified": "2023-10-11T12:54:12.883",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T14:50:59.800",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.2
+ },
{
"source": "psirt@hcl.com",
"type": "Secondary",
@@ -38,10 +58,43 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-522"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:bigfix_insights_for_vulnerability_remediation:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.0.3",
+ "matchCriteriaId": "2F53F59E-AF8B-4EEA-AB79-E6B1DD6EEFBF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108005",
- "source": "psirt@hcl.com"
+ "source": "psirt@hcl.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44758.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44758.json
index 09bba6264e1..dd8703bb1d0 100644
--- a/CVE-2022/CVE-2022-447xx/CVE-2022-44758.json
+++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44758.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-44758",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-10-11T07:15:09.477",
- "lastModified": "2023-10-11T12:54:12.883",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T14:50:38.337",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "psirt@hcl.com",
"type": "Secondary",
@@ -38,10 +58,43 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-522"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:bigfix_insights_for_vulnerability_remediation:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.0.3",
+ "matchCriteriaId": "2F53F59E-AF8B-4EEA-AB79-E6B1DD6EEFBF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108005",
- "source": "psirt@hcl.com"
+ "source": "psirt@hcl.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45379.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45379.json
index e08e162b48d..7e7f6a4ecf6 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45379.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45379.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45379",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.390",
- "lastModified": "2022-11-18T20:26:54.673",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.847",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -44,16 +44,6 @@
"value": "CWE-326"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-328"
- }
- ]
}
],
"configurations": [
@@ -75,6 +65,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json
index e7de8a673a0..7c586bfbc74 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45380",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.480",
- "lastModified": "2022-11-18T20:21:06.733",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.903",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json
index dce1f343fb8..5d1688e6f66 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45381",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.567",
- "lastModified": "2022-11-29T14:19:32.183",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:20.960",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -44,16 +44,6 @@
"value": "CWE-22"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
}
],
"configurations": [
@@ -75,6 +65,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json
index 3a2e4bdabe4..500854fb9bd 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45382",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.647",
- "lastModified": "2022-11-18T19:53:43.850",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.023",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2946",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json
index 4f51451f767..6ccbba24a04 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45383",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.730",
- "lastModified": "2022-11-21T14:42:21.510",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.077",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -44,16 +44,6 @@
"value": "CWE-863"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-863"
- }
- ]
}
],
"configurations": [
@@ -75,6 +65,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2804",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45384.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45384.json
index 8bd7d871cca..197c392fd48 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45384.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45384.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45384",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.817",
- "lastModified": "2022-11-18T17:04:54.273",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.143",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -44,16 +44,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
@@ -75,6 +65,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2094",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45385.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45385.json
index d5836ddb31f..525498f9406 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45385.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45385.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45385",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.897",
- "lastModified": "2022-11-18T15:48:26.607",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.197",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2843",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45386.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45386.json
index a943e612c08..de32f26c0bc 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45386.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45386.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45386",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.977",
- "lastModified": "2022-11-18T15:36:30.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.257",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-766",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45387.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45387.json
index 64d7d71cbbf..c1b7ccff837 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45387.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45387.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45387",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:12.063",
- "lastModified": "2022-11-17T23:22:53.070",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.317",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2802",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45388.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45388.json
index e364ed23cbe..1b55c754181 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45388.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45388.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45388",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:12.150",
- "lastModified": "2022-11-18T04:53:18.843",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.370",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-22"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2842",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45389.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45389.json
index b3b848b93d1..04dea1095af 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45389.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45389.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45389",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:12.267",
- "lastModified": "2022-11-18T04:52:49.173",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.430",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2853",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45390.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45390.json
index 5938c1417a8..21c0447e0d3 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45390.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45390.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45390",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:12.430",
- "lastModified": "2022-11-18T04:50:05.733",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.487",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2857",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45391.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45391.json
index 74add08d960..6fa4504e094 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45391.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45391.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45391",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:12.623",
- "lastModified": "2022-11-18T04:49:53.970",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.540",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-295"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -66,11 +54,12 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2910%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2910%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45392.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45392.json
index 7d21c71d007..ddbd308badd 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45392.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45392.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45392",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:12.797",
- "lastModified": "2023-07-07T19:06:43.127",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.610",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -44,16 +44,6 @@
"value": "CWE-522"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-256"
- }
- ]
}
],
"configurations": [
@@ -75,6 +65,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2912",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45393.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45393.json
index 626a254e60b..26b02e4684a 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45393.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45393.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45393",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:13.000",
- "lastModified": "2022-11-18T04:53:02.310",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.673",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2920",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45394.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45394.json
index 25c401dd863..6ac8ccfd425 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45394.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45394.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45394",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:13.423",
- "lastModified": "2022-11-18T04:54:10.683",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.730",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -44,16 +44,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
@@ -75,6 +65,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2920",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45395.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45395.json
index 56c75d1f3ff..29dbf296beb 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45395.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45395.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45395",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:13.657",
- "lastModified": "2022-11-20T03:02:59.407",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.790",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2921",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45396.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45396.json
index 74856d0283d..83b38272ccf 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45396.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45396.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45396",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:13.947",
- "lastModified": "2022-11-20T03:08:19.407",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.847",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2927",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45397.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45397.json
index daff65f7ff4..5f3c12e2897 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45397.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45397.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45397",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:14.190",
- "lastModified": "2022-11-20T03:08:42.347",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.903",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2937",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45398.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45398.json
index cc40f61a9f2..b99bd2df973 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45398.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45398.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45398",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:14.423",
- "lastModified": "2022-11-18T04:55:44.387",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:21.967",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2938",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45399.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45399.json
index 4ac4f365e60..8e31f0b6773 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45399.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45399.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45399",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:14.617",
- "lastModified": "2022-11-18T04:56:24.400",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:22.047",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2938",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45400.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45400.json
index 4afe5c489fd..f09ecc8b14c 100644
--- a/CVE-2022/CVE-2022-454xx/CVE-2022-45400.json
+++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45400.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45400",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:14.803",
- "lastModified": "2022-11-20T03:07:36.333",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:22.117",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-611"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2941",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45401.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45401.json
index 3eb34c5968a..8359fe635f0 100644
--- a/CVE-2022/CVE-2022-454xx/CVE-2022-45401.json
+++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45401.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-45401",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:15.343",
- "lastModified": "2022-11-18T04:48:47.850",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:22.180",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
@@ -65,6 +53,10 @@
}
],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2947",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45436.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45436.json
index 2cea39da818..5e3b506f786 100644
--- a/CVE-2022/CVE-2022-454xx/CVE-2022-45436.json
+++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45436.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-45436",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-02-15T04:15:10.613",
- "lastModified": "2023-02-23T18:21:48.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T12:15:08.737",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Artica PFMS Pandora FMS v765 on all platforms, allows Cross-Site Scripting (XSS). As a manager privilege user , create a network map containing name as xss payload. Once created, admin user must click on the edit network maps and XSS payload will be executed, which could be used for stealing admin users cookie value."
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Artica PFMS Pandora FMS v765 on all platforms, allows Cross-Site Scripting (XSS). As a manager privilege user , create a network map containing name as xss payload. Once created, admin user must click on the edit network maps and XSS payload will be executed, which could be used for stealing admin users cookie value.\n\n"
}
],
"metrics": {
@@ -56,7 +56,7 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
@@ -66,7 +66,7 @@
]
},
{
- "source": "cve-coordination@incibe.es",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@@ -94,6 +94,10 @@
}
],
"references": [
+ {
+ "url": "https://gist.github.com/damodarnaik/ac07a179972cd4d508f246e9bc5500e7",
+ "source": "cve-coordination@incibe.es"
+ },
{
"url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",
"source": "cve-coordination@incibe.es",
diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45437.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45437.json
index 51f0cce613e..c00bd0a07d0 100644
--- a/CVE-2022/CVE-2022-454xx/CVE-2022-45437.json
+++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45437.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-45437",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-02-15T04:15:10.893",
- "lastModified": "2023-02-23T18:22:45.303",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T12:15:08.917",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Artica PFMS Pandora FMS v765 on all allows Cross-Site Scripting (XSS). A user with edition privileges can create a Payload in the reporting dashboard module. An admin user can observe the Payload without interaction and attacker can get information."
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Artica PFMS Pandora FMS v765 on all allows Cross-Site Scripting (XSS). A user with edition privileges can create a Payload in the reporting dashboard module. An admin user can observe the Payload without interaction and attacker can get information.\n\n"
}
],
"metrics": {
@@ -56,7 +56,7 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
@@ -66,7 +66,7 @@
]
},
{
- "source": "cve-coordination@incibe.es",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@@ -94,6 +94,10 @@
}
],
"references": [
+ {
+ "url": "https://gist.github.com/damodarnaik/06180e8a5aa237b38740486b3e398011",
+ "source": "cve-coordination@incibe.es"
+ },
{
"url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",
"source": "cve-coordination@incibe.es",
diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4531.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4531.json
new file mode 100644
index 00000000000..9c8ccc3cd92
--- /dev/null
+++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4531.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2022-4531",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T03:15:08.537",
+ "lastModified": "2023-10-20T03:15:08.537",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** Not a valid vulnerability."
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46285.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46285.json
index 9cedcae541d..a9f0c1d5ebc 100644
--- a/CVE-2022/CVE-2022-462xx/CVE-2022-46285.json
+++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46285.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-46285",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-02-07T19:15:09.147",
- "lastModified": "2023-10-04T00:15:11.413",
+ "lastModified": "2023-10-17T15:55:36.773",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
@@ -55,9 +55,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:libxpm_project:libxpm:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.15",
- "matchCriteriaId": "934FFD94-DF18-451C-BB87-0360AACC094D"
+ "matchCriteriaId": "D98D97AA-EDDE-48F7-B4DE-E51BFB5A72D3"
}
]
}
diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46329.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46329.json
index c3a67f64969..fcb07738925 100644
--- a/CVE-2022/CVE-2022-463xx/CVE-2022-46329.json
+++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46329.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-46329",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:16.540",
- "lastModified": "2023-09-30T22:15:10.257",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:59:50.840",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -106,6 +106,46 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -119,19 +159,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/",
- "source": "secure@intel.com"
+ "source": "secure@intel.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46836.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46836.json
index ddb57967d82..872806da7e6 100644
--- a/CVE-2022/CVE-2022-468xx/CVE-2022-46836.json
+++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46836.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-46836",
"sourceIdentifier": "security@checkmk.com",
"published": "2023-02-20T17:15:12.153",
- "lastModified": "2023-03-02T18:16:41.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:22.277",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -610,6 +610,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://www.sonarsource.com/blog/checkmk-rce-chain-3/",
+ "source": "security@checkmk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-469xx/CVE-2022-46945.json b/CVE-2022/CVE-2022-469xx/CVE-2022-46945.json
index 917e03d4f97..9f20b7f8047 100644
--- a/CVE-2022/CVE-2022-469xx/CVE-2022-46945.json
+++ b/CVE-2022/CVE-2022-469xx/CVE-2022-46945.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-46945",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-26T15:15:09.393",
- "lastModified": "2023-06-01T14:02:24.270",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T22:15:09.117",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -99,6 +99,10 @@
"Patch",
"Product"
]
+ },
+ {
+ "url": "https://www.sonarsource.com/blog/checkmk-rce-chain-3/",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47002.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47002.json
index b5b245be495..31880037b52 100644
--- a/CVE-2022/CVE-2022-470xx/CVE-2022-47002.json
+++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47002.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-47002",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-01T14:15:08.873",
- "lastModified": "2023-03-06T20:15:09.607",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T18:17:22.390",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -101,15 +101,11 @@
]
},
{
- "url": "https://hoyahaxa.blogspot.com/2023/01/preliminary-security-advisory.html",
- "source": "cve@mitre.org",
- "tags": [
- "Patch",
- "Third Party Advisory"
- ]
+ "url": "https://www.hoyahaxa.com/2023/01/preliminary-security-advisory.html",
+ "source": "cve@mitre.org"
},
{
- "url": "https://hoyahaxa.blogspot.com/2023/03/authentication-bypass-mura-masa.html",
+ "url": "https://www.hoyahaxa.com/2023/03/authentication-bypass-mura-masa.html",
"source": "cve@mitre.org"
}
]
diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47372.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47372.json
index 87e2f6181c7..c44070f4fb9 100644
--- a/CVE-2022/CVE-2022-473xx/CVE-2022-47372.json
+++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47372.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-47372",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-02-15T04:15:10.987",
- "lastModified": "2023-02-23T19:29:45.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T12:15:08.997",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Stored cross-site scripting vulnerability in the Create event section in Pandora FMS Console v766 and lower. An attacker typically exploits this vulnerability by injecting XSS payloads on popular pages of a site or passing a link to a victim, tricking them into viewing the page that contains the stored XSS payload."
+ "value": "Stored cross-site scripting vulnerability in the Create event section in Pandora FMS Console v766 and lower. An attacker typically exploits this vulnerability by injecting XSS payloads on popular pages of a site or passing a link to a victim, tricking them into viewing the page that contains the stored XSS payload.\n\n"
}
],
"metrics": {
@@ -56,22 +56,22 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "CWE-79"
+ "value": "CWE-352"
}
]
},
{
- "source": "cve-coordination@incibe.es",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-352"
+ "value": "CWE-79"
}
]
}
@@ -95,6 +95,10 @@
}
],
"references": [
+ {
+ "url": "https://gist.github.com/damodarnaik/576c39162fce7da458d2f41f1cbe99e8",
+ "source": "cve-coordination@incibe.es"
+ },
{
"url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",
"source": "cve-coordination@incibe.es",
diff --git a/CVE-2022/CVE-2022-475xx/CVE-2022-47583.json b/CVE-2022/CVE-2022-475xx/CVE-2022-47583.json
new file mode 100644
index 00000000000..999f26604e5
--- /dev/null
+++ b/CVE-2022/CVE-2022-475xx/CVE-2022-47583.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2022-47583",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T16:15:08.833",
+ "lastModified": "2023-10-25T19:46:29.443",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Terminal character injection in Mintty before 3.6.3 allows code execution via unescaped output to the terminal."
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de caracteres de terminal en Mintty anterior a 3.6.3 permite la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de salida sin escape al terminal."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-74"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mintty_project:mintty:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "3.6.3",
+ "matchCriteriaId": "D53E5A23-C161-4360-A154-6259698F80B9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://dgl.cx/2023/09/ansi-terminal-security#mintty",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://github.com/mintty/mintty/releases/tag/3.6.3",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47909.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47909.json
index f48c06e2a40..eea8221dd4a 100644
--- a/CVE-2022/CVE-2022-479xx/CVE-2022-47909.json
+++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47909.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-47909",
"sourceIdentifier": "security@checkmk.com",
"published": "2023-02-20T17:15:12.230",
- "lastModified": "2023-06-23T13:12:17.483",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:22.470",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Livestatus Query Language (LQL) injection in the AuthUser HTTP query header of Tribe29's Checkmk <= 2.1.0p11, Checkmk <= 2.0.0p28, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to perform direct queries to the application's core from localhost."
+ "value": "Livestatus Query Language (LQL) injection in the AuthUser HTTP query header of\u00a0Tribe29's Checkmk <= 2.1.0p11, Checkmk <= 2.0.0p28, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to perform direct queries to the application's core from localhost."
}
],
"metrics": {
@@ -625,6 +625,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://www.sonarsource.com/blog/checkmk-rce-chain-1/",
+ "source": "security@checkmk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4712.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4712.json
new file mode 100644
index 00000000000..9475bc6b7fc
--- /dev/null
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4712.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2022-4712",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:14.993",
+ "lastModified": "2023-10-26T17:29:13.440",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The WP Cerber Security plugin for WordPress is vulnerable to stored cross-site scripting via the log parameter when logging in to the site in versions up to, and including, 9.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WP Cerber Security para WordPress es vulnerable a Cross-Site Scripting (XSS) almacenados a trav\u00e9s del par\u00e1metro de registro al iniciar sesi\u00f3n en el sitio en versiones hasta la 9.1 incluida. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cerber:wp_cerber_security\\,_anti-spam_\\&_malware_scan:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "9.2",
+ "matchCriteriaId": "AF84A1A7-10E3-4A50-A2F7-82A3EED15F27"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-cerber/trunk/admin/cerber-dashboard.php?rev=2721561#L1338",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6cd9cbba-10b0-4fb0-ad49-4593a307a615?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48064.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48064.json
index 14836293cc7..038d4684c57 100644
--- a/CVE-2022/CVE-2022-480xx/CVE-2022-48064.json
+++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48064.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-48064",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:30.937",
- "lastModified": "2023-10-13T03:15:09.493",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:24:09.337",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-400"
+ "value": "CWE-770"
}
]
}
@@ -62,20 +62,64 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3XKYUAIORNQ32IZUOZFURECZKEXOHX7Z/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSUNHSOWWLLNGHRM5TUBNCJHEYHPDX2M/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0008/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29922",
diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48065.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48065.json
index f105756e736..c6220f1c904 100644
--- a/CVE-2022/CVE-2022-480xx/CVE-2022-48065.json
+++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48065.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-48065",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:31.013",
- "lastModified": "2023-10-06T15:15:13.433",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-23T05:15:07.710",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -65,6 +65,10 @@
}
],
"references": [
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLZXZXFX2ZWTDU2QZUSZG36LZZVTKUVG/",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0008/",
"source": "cve@mitre.org"
diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json
index e612f41771a..f8be39f467e 100644
--- a/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json
+++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48118.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48118",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-27T20:15:14.867",
- "lastModified": "2023-02-04T01:51:48.413",
+ "lastModified": "2023-10-25T15:00:33.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:jorani_project:jorani:1.0.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "00665EA7-7D22-4226-801E-ABA4BD94D0D7"
+ "criteria": "cpe:2.3:a:jorani:jorani:1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE8B2D2D-7CCC-4688-9C1C-5C2512F140E6"
}
]
}
diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48321.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48321.json
index 9dab6af2776..f547e5ed6e5 100644
--- a/CVE-2022/CVE-2022-483xx/CVE-2022-48321.json
+++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48321.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-48321",
"sourceIdentifier": "security@checkmk.com",
"published": "2023-02-20T17:15:12.607",
- "lastModified": "2023-03-02T18:35:12.083",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:22.573",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -201,6 +201,10 @@
"Mitigation",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://www.sonarsource.com/blog/checkmk-rce-chain-1/",
+ "source": "security@checkmk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48565.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48565.json
index 8221df69b2b..4755e234178 100644
--- a/CVE-2022/CVE-2022-485xx/CVE-2022-48565.json
+++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48565.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-48565",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:32.007",
- "lastModified": "2023-10-11T23:15:10.210",
+ "lastModified": "2023-10-21T03:15:08.423",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -122,6 +122,14 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html",
"source": "cve@mitre.org"
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0007/",
"source": "cve@mitre.org"
diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48612.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48612.json
index b23e6385b72..07891650ce2 100644
--- a/CVE-2022/CVE-2022-486xx/CVE-2022-48612.json
+++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48612.json
@@ -2,19 +2,80 @@
"id": "CVE-2022-48612",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T00:15:10.350",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:22:05.877",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A Universal Cross Site Scripting (UXSS) vulnerability in ClassLink OneClick Extension through 10.7 allows remote attackers to inject JavaScript into any webpage, because a regular expression (validating whether a URL is controlled by ClassLink) is not present in all applicable places."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Universal Cross Site Scripting (UXSS) en ClassLink OneClick Extension hasta 10.7 permite a atacantes remotos inyectar JavaScript en cualquier p\u00e1gina web, porque una expresi\u00f3n regular (que valida si una URL est\u00e1 controlada por ClassLink) no est\u00e1 presente en todos los lugares aplicables."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:classlink:oneclick:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "10.7",
+ "matchCriteriaId": "2A6FA3A4-8DFC-4337-8DCA-147E4BDF5CEC"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://blog.zerdle.net/classlink/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4859.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4859.json
index 1ebfa0c7341..bfa0797f9c9 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4859.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4859.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4859",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:09.513",
- "lastModified": "2023-01-06T20:30:45.270",
+ "lastModified": "2023-10-29T03:08:37.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in Joget up to 7.0.33. This issue affects the function submitForm of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java of the component User Profile Menu. The manipulation of the argument firstName/lastName leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.34 is able to address this issue. The name of the patch is 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217055."
+ "value": "A vulnerability, which was classified as problematic, has been found in Joget up to 7.0.33. This issue affects the function submitForm of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java of the component User Profile Menu. The manipulation of the argument firstName/lastName leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.34 is able to address this issue. The patch is named 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217055."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -117,23 +127,21 @@
"url": "https://github.com/jogetworkflow/jw-community/commit/9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/jogetworkflow/jw-community/releases/tag/7.0.34",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.217055",
"source": "cna@vuldb.com",
"tags": [
- "Third Party Advisory"
+ "Permissions Required"
]
},
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4860.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4860.json
index c9f97ae3e81..e89c3cef8b8 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4860.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4860.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4860",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:09.583",
- "lastModified": "2023-01-06T18:56:35.230",
+ "lastModified": "2023-10-29T03:03:11.013",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in KBase Metrics. It has been classified as critical. This affects the function upload_user_data of the file source/daily_cron_jobs/methods_upload_user_stats.py. The manipulation leads to sql injection. The name of the patch is 959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217059."
+ "value": "A vulnerability was found in KBase Metrics. It has been classified as critical. This affects the function upload_user_data of the file source/daily_cron_jobs/methods_upload_user_stats.py. The manipulation leads to sql injection. The patch is named 959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217059."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
@@ -116,23 +126,21 @@
"url": "https://github.com/kbase/metrics/commit/959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/kbase/metrics/pull/77",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.217059",
"source": "cna@vuldb.com",
"tags": [
- "Third Party Advisory"
+ "Permissions Required"
]
},
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4869.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4869.json
index 4579a90d76a..ebdd206b895 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4869.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4869.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4869",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T09:15:08.753",
- "lastModified": "2023-01-11T17:06:05.117",
+ "lastModified": "2023-10-29T02:58:52.513",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Evolution Events Artaxerxes. It has been declared as problematic. This vulnerability affects unknown code of the file arta/common/middleware.py of the component POST Parameter Handler. The manipulation of the argument password leads to information disclosure. The attack can be initiated remotely. The name of the patch is 022111407d34815c16c6eada2de69ca34084dc0d. It is recommended to apply a patch to fix this issue. VDB-217438 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Evolution Events Artaxerxes. It has been declared as problematic. This vulnerability affects unknown code of the file arta/common/middleware.py of the component POST Parameter Handler. The manipulation of the argument password leads to information disclosure. The attack can be initiated remotely. The patch is identified as 022111407d34815c16c6eada2de69ca34084dc0d. It is recommended to apply a patch to fix this issue. VDB-217438 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -126,23 +126,20 @@
"url": "https://github.com/evolution-events/Artaxerxes/commit/022111407d34815c16c6eada2de69ca34084dc0d",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.217438",
"source": "cna@vuldb.com",
"tags": [
- "Permissions Required",
- "Third Party Advisory"
+ "Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.217438",
"source": "cna@vuldb.com",
"tags": [
- "Permissions Required",
"Third Party Advisory"
]
}
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4871.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4871.json
index 597a3482b16..fa6aaa110e3 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4871.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4871.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4871",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-03T12:15:10.660",
- "lastModified": "2023-01-09T21:09:17.993",
+ "lastModified": "2023-10-29T02:59:32.857",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in ummmmm nflpick-em.com up to 2.2.x. This vulnerability affects the function _Load_Users of the file html/includes/runtime/admin/JSON/LoadUsers.php. The manipulation of the argument sort leads to sql injection. The attack can be initiated remotely. The name of the patch is dd77a35942f527ea0beef5e0ec62b92e8b93211e. It is recommended to apply a patch to fix this issue. VDB-217270 is the identifier assigned to this vulnerability. NOTE: JSON entrypoint is only accessible via an admin account"
+ "value": "A vulnerability classified as problematic was found in ummmmm nflpick-em.com up to 2.2.x. This vulnerability affects the function _Load_Users of the file html/includes/runtime/admin/JSON/LoadUsers.php. The manipulation of the argument sort leads to sql injection. The attack can be initiated remotely. The patch is identified as dd77a35942f527ea0beef5e0ec62b92e8b93211e. It is recommended to apply a patch to fix this issue. VDB-217270 is the identifier assigned to this vulnerability. NOTE: JSON entrypoint is only accessible via an admin account"
}
],
"metrics": {
@@ -126,16 +126,14 @@
"url": "https://github.com/ummmmm/nflpick-em.com/commit/dd77a35942f527ea0beef5e0ec62b92e8b93211e",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.217270",
"source": "cna@vuldb.com",
"tags": [
- "Third Party Advisory",
- "VDB Entry"
+ "Permissions Required"
]
},
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4875.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4875.json
index 61660b06a74..bad970a8fbf 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4875.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4875.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4875",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T22:15:09.093",
- "lastModified": "2023-01-11T01:50:28.687",
+ "lastModified": "2023-10-29T02:59:26.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in fossology and classified as problematic. This vulnerability affects unknown code. The manipulation of the argument sql/VarValue leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 8e0eba001662c7eb35f045b70dd458a4643b4553. It is recommended to apply a patch to fix this issue. VDB-217426 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability has been found in fossology and classified as problematic. This vulnerability affects unknown code. The manipulation of the argument sql/VarValue leads to cross site scripting. The attack can be initiated remotely. The patch is identified as 8e0eba001662c7eb35f045b70dd458a4643b4553. It is recommended to apply a patch to fix this issue. VDB-217426 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -116,23 +126,21 @@
"url": "https://github.com/fossology/fossology/commit/8e0eba001662c7eb35f045b70dd458a4643b4553",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/fossology/fossology/pull/2356",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.217426",
"source": "cna@vuldb.com",
"tags": [
- "Third Party Advisory"
+ "Permissions Required"
]
},
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4876.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4876.json
index d9aae2e9f70..3f41144d172 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4876.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4876.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4876",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T23:15:20.037",
- "lastModified": "2023-01-30T16:37:16.607",
+ "lastModified": "2023-10-29T02:59:15.090",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Kaltura mwEmbed up to 2.96.rc1 and classified as problematic. This issue affects some unknown processing of the file includes/DefaultSettings.php. The manipulation of the argument HTTP_X_FORWARDED_HOST leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.96.rc2 is able to address this issue. The name of the patch is 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217427."
+ "value": "A vulnerability was found in Kaltura mwEmbed up to 2.96.rc1 and classified as problematic. This issue affects some unknown processing of the file includes/DefaultSettings.php. The manipulation of the argument HTTP_X_FORWARDED_HOST leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.96.rc2 is able to address this issue. The patch is named 13b8812ebc8c9fa034eed91ab35ba8423a528c0b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217427."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -121,39 +131,34 @@
"url": "https://github.com/kaltura/mwEmbed/commit/13b8812ebc8c9fa034eed91ab35ba8423a528c0b",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/kaltura/mwEmbed/pull/4266",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/kaltura/mwEmbed/releases/tag/v2.96.rc2",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.217427",
"source": "cna@vuldb.com",
"tags": [
- "Permissions Required",
- "Third Party Advisory"
+ "Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.217427",
"source": "cna@vuldb.com",
"tags": [
- "Permissions Required",
"Third Party Advisory"
]
}
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4879.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4879.json
index 398bf9921b6..de0528894a3 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4879.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4879.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4879",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T11:15:09.557",
- "lastModified": "2023-01-12T15:48:49.473",
+ "lastModified": "2023-10-29T02:58:47.550",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Forged Alliance Forever up to 3746. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Vote Handler. The manipulation leads to improper authorization. Upgrading to version 3747 is able to address this issue. The name of the patch is 6880971bd3d73d942384aff62d53058c206ce644. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217555."
+ "value": "A vulnerability was found in Forged Alliance Forever up to 3746. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Vote Handler. The manipulation leads to improper authorization. Upgrading to version 3747 is able to address this issue. The patch is named 6880971bd3d73d942384aff62d53058c206ce644. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217555."
}
],
"metrics": {
@@ -126,38 +126,34 @@
"url": "https://github.com/FAForever/fa/commit/6880971bd3d73d942384aff62d53058c206ce644",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/FAForever/fa/pull/4398",
"source": "cna@vuldb.com",
"tags": [
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/FAForever/fa/releases/tag/3747",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.217555",
"source": "cna@vuldb.com",
"tags": [
- "Permissions Required",
- "Third Party Advisory"
+ "Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.217555",
"source": "cna@vuldb.com",
"tags": [
- "Permissions Required",
"Third Party Advisory"
]
}
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4880.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4880.json
index 593cb3f354e..d1bf54ac31d 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4880.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4880.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4880",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.700",
- "lastModified": "2023-01-12T18:54:47.407",
+ "lastModified": "2023-10-29T02:57:50.997",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in stakira OpenUtau. It has been classified as critical. This affects the function VoicebankInstaller of the file OpenUtau.Core/Classic/VoicebankInstaller.cs of the component ZIP Archive Handler. The manipulation leads to path traversal. Upgrading to version 0.0.991 is able to address this issue. The name of the patch is 849a0a6912aac8b1c28cc32aa1132a3140caff4a. It is recommended to upgrade the affected component. The identifier VDB-217617 was assigned to this vulnerability."
+ "value": "A vulnerability was found in stakira OpenUtau. It has been classified as critical. This affects the function VoicebankInstaller of the file OpenUtau.Core/Classic/VoicebankInstaller.cs of the component ZIP Archive Handler. The manipulation leads to path traversal. Upgrading to version 0.0.991 is able to address this issue. The identifier of the patch is 849a0a6912aac8b1c28cc32aa1132a3140caff4a. It is recommended to upgrade the affected component. The identifier VDB-217617 was assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-22"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
}
],
"configurations": [
@@ -116,32 +126,28 @@
"url": "https://github.com/stakira/OpenUtau/commit/849a0a6912aac8b1c28cc32aa1132a3140caff4a",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/stakira/OpenUtau/pull/544",
"source": "cna@vuldb.com",
"tags": [
- "Exploit",
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/stakira/OpenUtau/releases/tag/build%2F0.0.991",
"source": "cna@vuldb.com",
"tags": [
- "Release Notes",
- "Third Party Advisory"
+ "Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.217617",
"source": "cna@vuldb.com",
"tags": [
- "Third Party Advisory"
+ "Permissions Required"
]
},
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4881.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4881.json
index be020769e22..ff71845fca1 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4881.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4881.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4881",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T13:15:10.047",
- "lastModified": "2023-01-12T20:10:12.480",
+ "lastModified": "2023-10-29T02:57:33.730",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in CapsAdmin PAC3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lua/pac3/core/shared/http.lua. The manipulation of the argument url leads to cross site scripting. The attack may be launched remotely. The name of the patch is 8fc9e12dfa21d757be6eb4194c763e848b299ac0. It is recommended to apply a patch to fix this issue. VDB-217646 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in CapsAdmin PAC3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lua/pac3/core/shared/http.lua. The manipulation of the argument url leads to cross site scripting. The attack may be launched remotely. The patch is identified as 8fc9e12dfa21d757be6eb4194c763e848b299ac0. It is recommended to apply a patch to fix this issue. VDB-217646 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -116,34 +126,28 @@
"url": "https://github.com/CapsAdmin/pac3/commit/8fc9e12dfa21d757be6eb4194c763e848b299ac0",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://github.com/CapsAdmin/pac3/pull/1210",
"source": "cna@vuldb.com",
"tags": [
- "Patch",
- "Third Party Advisory"
+ "Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.217646",
"source": "cna@vuldb.com",
"tags": [
- "Permissions Required",
- "Third Party Advisory",
- "VDB Entry"
+ "Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.217646",
"source": "cna@vuldb.com",
"tags": [
- "Permissions Required",
- "Third Party Advisory",
- "VDB Entry"
+ "Permissions Required"
]
}
]
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4882.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4882.json
index 94df2f25862..e70b9fbfc65 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4882.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4882.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4882",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T09:15:10.140",
- "lastModified": "2023-01-13T13:22:20.230",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.090",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in kaltura mwEmbed up to 2.91. It has been rated as problematic. Affected by this issue is some unknown functionality of the file modules/KalturaSupport/components/share/share.js of the component Share Plugin. The manipulation of the argument res leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.92.rc1 is able to address this issue. The name of the patch is 4f11b6f6610acd6d89de5f8be47cf7c610643845. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217664."
+ "value": "A vulnerability was found in kaltura mwEmbed up to 2.91. It has been rated as problematic. Affected by this issue is some unknown functionality of the file modules/KalturaSupport/components/share/share.js of the component Share Plugin. The manipulation of the argument res leads to cross site scripting. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.92.rc1 is able to address this issue. The name of the patch is 4f11b6f6610acd6d89de5f8be47cf7c610643845. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217664."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json
index 89f48f73d74..3945c33f423 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4883.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4883",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-02-07T19:15:09.223",
- "lastModified": "2023-06-20T14:15:10.027",
+ "lastModified": "2023-10-17T15:55:36.773",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
@@ -55,9 +55,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:libxpm_project:libxpm:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.15",
- "matchCriteriaId": "934FFD94-DF18-451C-BB87-0360AACC094D"
+ "matchCriteriaId": "D98D97AA-EDDE-48F7-B4DE-E51BFB5A72D3"
}
]
}
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4885.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4885.json
index 7cdd2509e9d..b038e796fae 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4885.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4885.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4885",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T18:15:09.227",
- "lastModified": "2023-01-18T19:12:09.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.160",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in sviehb jefferson up to 0.3 and classified as critical. This vulnerability affects unknown code of the file src/scripts/jefferson. The manipulation leads to path traversal. The attack can be initiated remotely. Upgrading to version 0.4 is able to address this issue. The name of the patch is 53b3f2fc34af0bb32afbcee29d18213e61471d87. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218020."
+ "value": "A vulnerability has been found in sviehb jefferson up to 0.3 and classified as critical. This vulnerability affects unknown code of the file src/scripts/jefferson. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.4 is able to address this issue. The name of the patch is 53b3f2fc34af0bb32afbcee29d18213e61471d87. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218020."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4886.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4886.json
new file mode 100644
index 00000000000..9359ed13698
--- /dev/null
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4886.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2022-4886",
+ "sourceIdentifier": "jordan@liggitt.net",
+ "published": "2023-10-25T20:15:09.790",
+ "lastModified": "2023-10-25T21:15:09.930",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Ingress-nginx `path` sanitization can be bypassed with `log_format` directive.\n"
+ },
+ {
+ "lang": "es",
+ "value": "La sanitizaci\u00f3n del par\u00e1metro `path` de Ingress-nginx se puede omitir con la directiva `log_format`."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "jordan@liggitt.net",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "jordan@liggitt.net",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/5",
+ "source": "jordan@liggitt.net"
+ },
+ {
+ "url": "https://github.com/kubernetes/ingress-nginx/issues/10570",
+ "source": "jordan@liggitt.net"
+ },
+ {
+ "url": "https://groups.google.com/g/kubernetes-security-announce/c/ge7u3qCwZLI",
+ "source": "jordan@liggitt.net"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4889.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4889.json
index 16d169d4141..1c82765fdee 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4889.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4889.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4889",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T08:15:08.210",
- "lastModified": "2023-01-24T16:33:12.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.237",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in visegripped Stracker. Affected by this vulnerability is the function getHistory of the file doc_root/public_html/stracker/api.php. The manipulation of the argument symbol/startDate/endDate leads to sql injection. The name of the patch is 63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a. It is recommended to apply a patch to fix this issue. The identifier VDB-218377 was assigned to this vulnerability."
+ "value": "A vulnerability classified as critical was found in visegripped Stracker. Affected by this vulnerability is the function getHistory of the file doc_root/public_html/stracker/api.php. The manipulation of the argument symbol/startDate/endDate leads to sql injection. The identifier of the patch is 63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a. It is recommended to apply a patch to fix this issue. The identifier VDB-218377 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4890.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4890.json
index 91da8ee80b8..fbc97dbc866 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4890.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4890.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4890",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T13:15:10.137",
- "lastModified": "2023-01-24T16:19:48.380",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.310",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in abhilash1985 PredictApp. This issue affects some unknown processing of the file config/initializers/new_framework_defaults_7_0.rb of the component Cookie Handler. The manipulation leads to deserialization. The attack may be initiated remotely. The name of the patch is b067372f3ee26fe1b657121f0f41883ff4461a06. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218387."
+ "value": "A vulnerability, which was classified as critical, has been found in abhilash1985 PredictApp. This issue affects some unknown processing of the file config/initializers/new_framework_defaults_7_0.rb of the component Cookie Handler. The manipulation leads to deserialization. The attack may be initiated remotely. The patch is named b067372f3ee26fe1b657121f0f41883ff4461a06. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218387."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4892.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4892.json
index 66189e2e356..6d069c6fb43 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4892.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4892.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4892",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T08:15:13.163",
- "lastModified": "2023-01-25T20:56:15.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.387",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in MyCMS. It has been classified as problematic. This affects the function build_view of the file lib/gener/view.php of the component Visitors Module. The manipulation of the argument original/converted leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is d64fcba4882a50e21cdbec3eb4a080cb694d26ee. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218895."
+ "value": "A vulnerability was found in MyCMS. It has been classified as problematic. This affects the function build_view of the file lib/gener/view.php of the component Visitors Module. The manipulation of the argument original/converted leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named d64fcba4882a50e21cdbec3eb4a080cb694d26ee. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218895."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4903.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4903.json
index 5675d773846..e30106f0929 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4903.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4903.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4903",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-10T15:15:11.717",
- "lastModified": "2023-02-16T21:25:34.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.470",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in CodenameOne 7.0.70. It has been classified as problematic. Affected is an unknown function. The manipulation leads to use of implicit intent for sensitive communication. It is possible to launch the attack remotely. Upgrading to version 7.0.71 is able to address this issue. The name of the patch is dad49c9ef26a598619fc48d2697151a02987d478. It is recommended to upgrade the affected component. VDB-220470 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in CodenameOne 7.0.70. It has been classified as problematic. Affected is an unknown function. The manipulation leads to use of implicit intent for sensitive communication. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 7.0.71 is able to address this issue. The patch is identified as dad49c9ef26a598619fc48d2697151a02987d478. It is recommended to upgrade the affected component. VDB-220470 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4905.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4905.json
index 636fee1171c..c8893884d0c 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4905.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4905.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4905",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-13T21:15:13.710",
- "lastModified": "2023-02-23T15:29:00.040",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.550",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in UDX Stateless Media Plugin 3.1.1. It has been declared as problematic. This vulnerability affects the function setup_wizard_interface of the file lib/classes/class-settings.php. The manipulation of the argument settings leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.2.0 is able to address this issue. The name of the patch is 6aee7ae0b0beeb2232ce6e1c82aa7e2041ae151a. It is recommended to upgrade the affected component. VDB-220750 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in UDX Stateless Media Plugin 3.1.1 on WordPress. It has been declared as problematic. This vulnerability affects the function setup_wizard_interface of the file lib/classes/class-settings.php. The manipulation of the argument settings leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.2.0 is able to address this issue. The patch is identified as 6aee7ae0b0beeb2232ce6e1c82aa7e2041ae151a. It is recommended to upgrade the affected component. VDB-220750 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4927.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4927.json
index b36a9f39ad4..dc948e0988f 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4927.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4927.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4927",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T20:15:08.873",
- "lastModified": "2023-06-23T17:18:06.220",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.630",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in ualbertalib NEOSDiscovery 1.0.70 and classified as problematic. This issue affects some unknown processing of the file app/views/bookmarks/_refworks.html.erb. The manipulation leads to use of web link to untrusted target with window.opener access. The attack may be initiated remotely. Upgrading to version 1.0.71 is able to address this issue. The name of the patch is abe9f57123e0c278ae190cd7402a623d66c51375. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222287."
+ "value": "A vulnerability was found in ualbertalib NEOSDiscovery 1.0.70 and classified as problematic. This issue affects some unknown processing of the file app/views/bookmarks/_refworks.html.erb. The manipulation leads to use of web link to untrusted target with window.opener access. The attack may be initiated remotely. Upgrading to version 1.0.71 is able to address this issue. The patch is named abe9f57123e0c278ae190cd7402a623d66c51375. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222287."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4928.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4928.json
index 2793671afd0..25541205765 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4928.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4928.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4928",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T01:15:09.993",
- "lastModified": "2023-03-13T17:15:32.620",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.710",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in icplayer up to 0.819. It has been declared as problematic. Affected by this vulnerability is the function AddonText_Selection_create of the file addons/Text_Selection/src/presenter.js. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.820 is able to address this issue. The name of the patch is 2223628e6db1df73f6d633d2c0422d995990f0a3. It is recommended to upgrade the affected component. The identifier VDB-222289 was assigned to this vulnerability."
+ "value": "A vulnerability was found in icplayer up to 0.819. It has been declared as problematic. Affected by this vulnerability is the function AddonText_Selection_create of the file addons/Text_Selection/src/presenter.js. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.820 is able to address this issue. The identifier of the patch is 2223628e6db1df73f6d633d2c0422d995990f0a3. It is recommended to upgrade the affected component. The identifier VDB-222289 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4929.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4929.json
index 3525a88a56e..b6636df32f8 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4929.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4929.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4929",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T03:15:08.440",
- "lastModified": "2023-03-13T17:14:45.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.780",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in icplayer up to 0.818. It has been rated as problematic. Affected by this issue is some unknown functionality of the file addons/Commons/src/tts-utils.js. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.819 is able to address this issue. The name of the patch is fa785969f213c76384f1fe67d47b17d57fcc60c8. It is recommended to upgrade the affected component. VDB-222290 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in icplayer up to 0.818. It has been rated as problematic. Affected by this issue is some unknown functionality of the file addons/Commons/src/tts-utils.js. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.819 is able to address this issue. The patch is identified as fa785969f213c76384f1fe67d47b17d57fcc60c8. It is recommended to upgrade the affected component. VDB-222290 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4930.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4930.json
index ef45d0d7d00..2f616167876 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4930.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4930.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4930",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T16:15:09.593",
- "lastModified": "2023-03-13T18:33:32.357",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.863",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in nuxsmin sysPass up to 3.2.4. Affected by this vulnerability is an unknown functionality of the component URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.2.5 is able to address this issue. The name of the patch is 4da4d031732ecca67519851fd0c34597dbb8ee55. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222319."
+ "value": "A vulnerability classified as problematic was found in nuxsmin sysPass up to 3.2.4. Affected by this vulnerability is an unknown functionality of the component URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.2.5 is able to address this issue. The patch is named 4da4d031732ecca67519851fd0c34597dbb8ee55. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222319."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4933.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4933.json
index 16b612acf9b..b766791b5a6 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4933.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4933.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4933",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T05:15:12.050",
- "lastModified": "2023-03-24T19:05:48.167",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:10.947",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in ATM Consulting dolibarr_module_quicksupplierprice up to 1.1.6. Affected by this issue is the function upatePrice of the file script/interface.php. The manipulation leads to sql injection. The attack may be launched remotely. Upgrading to version 1.1.7 is able to address this issue. The name of the patch is ccad1e4282b0e393a32fcc852e82ec0e0af5446f. It is recommended to upgrade the affected component. VDB-223382 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, has been found in ATM Consulting dolibarr_module_quicksupplierprice up to 1.1.6. Affected by this issue is the function upatePrice of the file script/interface.php. The manipulation leads to sql injection. The attack may be launched remotely. Upgrading to version 1.1.7 is able to address this issue. The patch is identified as ccad1e4282b0e393a32fcc852e82ec0e0af5446f. It is recommended to upgrade the affected component. VDB-223382 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4942.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4942.json
index 84d196bc484..2b6edc02f5f 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4942.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4942.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-4942",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-20T06:15:07.440",
- "lastModified": "2023-04-29T02:52:40.117",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:11.020",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in mportuga eslint-detailed-reporter up to 0.9.0 and classified as problematic. Affected by this issue is the function renderIssue in the library lib/template-generator.js. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The name of the patch is 505c190efd4905990db6207863bdcbd9b1d7e1bd. It is recommended to apply a patch to fix this issue. VDB-226310 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in mportuga eslint-detailed-reporter up to 0.9.0 and classified as problematic. Affected by this issue is the function renderIssue in the library lib/template-generator.js. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The patch is identified as 505c190efd4905990db6207863bdcbd9b1d7e1bd. It is recommended to apply a patch to fix this issue. VDB-226310 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4943.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4943.json
new file mode 100644
index 00000000000..cc0f2205f1c
--- /dev/null
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4943.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2022-4943",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:11.983",
+ "lastModified": "2023-10-26T17:26:13.140",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The miniOrange's Google Authenticator plugin for WordPress is vulnerable to authorization bypass due to a missing capability check when changing plugin settings in versions up to, and including, 5.6.5. This makes it possible for unauthenticated attackers to change the plugin's settings."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Google Authenticator de miniOrange para WordPress es vulnerable a la omisi\u00f3n de autorizaci\u00f3n debido a una falta de verificaci\u00f3n de capacidad al cambiar la configuraci\u00f3n del complemento en versiones hasta la 5.6.5 incluida. Esto hace posible que atacantes no autenticados cambien la configuraci\u00f3n del complemento."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:miniorange:google_authenticator:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "5.6.5",
+ "matchCriteriaId": "FA5D80D0-7543-49BC-8D9F-9C33C26EF1EE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2842228%40miniorange-2-factor-authentication%2Ftrunk&old=2815645%40miniorange-2-factor-authentication%2Ftrunk&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7267ede1-7745-47cc-ac0d-4362140b4c23?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4954.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4954.json
new file mode 100644
index 00000000000..93c0ac17f9e
--- /dev/null
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4954.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2022-4954",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:15.103",
+ "lastModified": "2023-10-26T17:28:59.520",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Waiting: One-click countdowns plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown name in versions up to, and including, 0.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Waiting: One-click countdowns para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del nombre Countdown en versiones hasta la 0.6.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:plugin:waiting:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "0.6.2",
+ "matchCriteriaId": "E719F69E-20BF-46D4-A862-E84F6CA72723"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/waiting/trunk/waiting.php?rev=2826039",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ef5b0de-0b8b-4286-86ea-6dca0dbc1a52?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0003.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0003.json
index ff4fe44c580..796c2b60e28 100644
--- a/CVE-2023/CVE-2023-00xx/CVE-2023-0003.json
+++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0003.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0003",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2023-02-08T18:15:11.777",
- "lastModified": "2023-07-21T19:21:55.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T05:15:24.807",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -156,6 +156,14 @@
}
],
"references": [
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
+ "source": "psirt@paloaltonetworks.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
+ "source": "psirt@paloaltonetworks.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMEELCREWMRT6NS7HWXLA6XFLLMO36HE/",
"source": "psirt@paloaltonetworks.com",
@@ -163,6 +171,10 @@
"Mailing List"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
+ "source": "psirt@paloaltonetworks.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEJWL67XR67JAGEL2ZK22NA3BRKNMZNY/",
"source": "psirt@paloaltonetworks.com",
@@ -184,6 +196,10 @@
"Mailing List"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
+ "source": "psirt@paloaltonetworks.com"
+ },
{
"url": "https://security.paloaltonetworks.com/CVE-2023-0003",
"source": "psirt@paloaltonetworks.com",
diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0004.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0004.json
index 94956750f13..5c12c47237a 100644
--- a/CVE-2023/CVE-2023-00xx/CVE-2023-0004.json
+++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0004.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0004",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2023-04-12T17:15:07.043",
- "lastModified": "2023-04-21T16:13:00.517",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T05:15:25.050",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -124,6 +124,22 @@
}
],
"references": [
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
+ "source": "psirt@paloaltonetworks.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
+ "source": "psirt@paloaltonetworks.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
+ "source": "psirt@paloaltonetworks.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
+ "source": "psirt@paloaltonetworks.com"
+ },
{
"url": "https://security.paloaltonetworks.com/CVE-2023-0004",
"source": "psirt@paloaltonetworks.com",
diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0052.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0052.json
index 2399ed70cf2..ea7c0587308 100644
--- a/CVE-2023/CVE-2023-00xx/CVE-2023-0052.json
+++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0052.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0052",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-01-20T22:15:10.417",
- "lastModified": "2023-02-02T14:21:46.400",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T00:15:09.050",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "SAUTER Controls Nova 200\u2013220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior allows the execution of commands without credentials. As Telnet and file transfer protocol (FTP) are the only protocols available for device management, an unauthorized user could access the system and modify the device configuration, which could result in the unauthorized user executing unrestricted malicious commands."
+ "value": "SAUTER Controls Nova 200\u2013220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior allows the execution of commands without credentials. As Telnet and file transfer protocol (FTP) are the only protocols available for device management, an unauthorized user could access the system and modify the device configuration, which could result in the unauthorized user executing unrestricted malicious commands.\n\n"
}
],
"metrics": {
@@ -57,7 +57,7 @@
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
- "type": "Primary",
+ "type": "Secondary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0053.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0053.json
index 28de37e222a..c7ac180a758 100644
--- a/CVE-2023/CVE-2023-00xx/CVE-2023-0053.json
+++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0053.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0053",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-03-02T01:15:11.590",
- "lastModified": "2023-03-10T04:58:43.923",
+ "lastModified": "2023-10-27T20:32:10.447",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "SAUTER Controls Nova 200\u2013220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior have only FTP and Telnet available for device management. Any sensitive information communicated through these protocols, such as credentials, is sent in cleartext. An attacker could obtain sensitive information such as user credentials to gain access to the system."
+ "value": "SAUTER Controls Nova 200\u2013220 Series with firmware version 3.3-006 and \nprior and BACnetstac version 4.2.1 and prior have only FTP and Telnet \navailable for device management. Any sensitive information communicated \nthrough these protocols, such as credentials, is sent in cleartext. An \nattacker could obtain sensitive information such as user credentials to \ngain access to the system. \n\n\n\n"
}
],
"metrics": {
@@ -56,7 +56,7 @@
},
"weaknesses": [
{
- "source": "ics-cert@hq.dhs.gov",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -64,6 +64,16 @@
"value": "CWE-319"
}
]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
}
],
"configurations": [
@@ -208,7 +218,6 @@
]
},
{
- "operator": "AND",
"nodes": [
{
"operator": "OR",
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0180.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0180.json
index f7bef1f49a6..fd03054ed2b 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0180.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0180.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0180",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:07.160",
- "lastModified": "2023-10-03T15:15:39.200",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:26:49.570",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -145,7 +145,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0181.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0181.json
index b82dba71c3c..b0160c259d0 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0181.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0181.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0181",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:07.713",
- "lastModified": "2023-10-03T15:15:39.300",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:27:14.150",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -150,7 +150,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0183.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0183.json
index fb35d58fd3a..3b32a1f7cd5 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0183.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0183.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0183",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:07.867",
- "lastModified": "2023-10-03T15:15:39.383",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:27:32.010",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -145,7 +145,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0184.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0184.json
index 283f89b1ce3..5d562c88b13 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0184.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0184.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0184",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-22T03:15:08.817",
- "lastModified": "2023-10-03T15:15:39.463",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T16:05:59.697",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -329,7 +329,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0185.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0185.json
index c192596c37c..f4f4cb1e221 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0185.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0185.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0185",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:07.927",
- "lastModified": "2023-10-03T15:15:39.583",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:28:05.460",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -140,7 +140,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0187.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0187.json
index 9e54e49a950..8195ff2266e 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0187.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0187.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0187",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:08.053",
- "lastModified": "2023-10-03T15:15:39.667",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:15:44.197",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -130,7 +130,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0188.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0188.json
index 3d26c18158a..31f9c9f64a6 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0188.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0188.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0188",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:08.110",
- "lastModified": "2023-10-03T15:15:39.743",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:16:24.017",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -150,7 +150,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0189.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0189.json
index 54f7803000d..e13fd0f93d7 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0189.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0189.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0189",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:08.163",
- "lastModified": "2023-10-03T15:15:39.823",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:20:17.937",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -130,7 +130,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0190.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0190.json
index 91be0d7cb8f..42e30c4c340 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0190.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0190.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0190",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-22T03:15:08.897",
- "lastModified": "2023-10-03T15:15:39.907",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T16:06:03.947",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -182,7 +182,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0191.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0191.json
index f0af3b292e4..1be09c8d693 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0191.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0191.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0191",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:08.240",
- "lastModified": "2023-10-03T15:15:39.990",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T16:04:16.197",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -150,7 +150,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0194.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0194.json
index 8fb66505595..f4603903bda 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0194.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0194.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0194",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:08.367",
- "lastModified": "2023-10-03T15:15:40.077",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T16:05:28.927",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -135,7 +135,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0195.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0195.json
index 9f85ddcac26..73de28eb779 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0195.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0195.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0195",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:08.440",
- "lastModified": "2023-10-03T15:15:40.170",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T16:05:34.450",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -130,7 +130,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0198.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0198.json
index 9b8af4e16e7..81dd3b44237 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0198.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0198.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0198",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-01T05:15:08.557",
- "lastModified": "2023-10-03T15:15:40.257",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T16:05:38.477",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -145,7 +145,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-02",
- "source": "psirt@nvidia.com"
+ "source": "psirt@nvidia.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0377.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0377.json
index 503bf13321b..947a329a9af 100644
--- a/CVE-2023/CVE-2023-03xx/CVE-2023-0377.json
+++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0377.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0377",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-03-06T14:15:10.663",
- "lastModified": "2023-03-13T18:16:02.967",
+ "lastModified": "2023-10-26T20:00:45.420",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -65,9 +65,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:scriptless_social_sharing_project:scriptless_social_sharing:*:*:*:*:*:wordpress:*:*",
+ "criteria": "cpe:2.3:a:robincornett:scriptless_social_sharing:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.2.2",
- "matchCriteriaId": "8F2C498D-2056-4138-B82A-C646ED0955FA"
+ "matchCriteriaId": "A68EA896-CBC6-42B6-881E-5B0CD183E2CD"
}
]
}
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0527.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0527.json
index 34fd90ce213..1929764a0a9 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0527.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0527.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0527",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T11:15:12.240",
- "lastModified": "2023-06-01T17:15:09.777",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:15:09.010",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -111,10 +111,6 @@
}
],
"references": [
- {
- "url": "http://packetstormsecurity.com/files/172667/Online-Security-Guards-Hiring-System-1.0-Cross-Site-Scripting.html",
- "source": "cna@vuldb.com"
- },
{
"url": "https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0549.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0549.json
index 87a5c59fa5c..762fd5d4dcc 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0549.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0549.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0549",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T19:15:10.457",
- "lastModified": "2023-02-06T19:30:52.323",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T20:15:09.170",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in YAFNET up to 3.1.10. This issue affects some unknown processing of the file /forum/PostPrivateMessage of the component Private Message Handler. The manipulation of the argument subject/message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.11 is able to address this issue. The name of the patch is 2237a9d552e258a43570bb478a92a5505e7c8797. It is recommended to upgrade the affected component. The identifier VDB-219665 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in YAFNET up to 3.1.10. This issue affects some unknown processing of the file /forum/PostPrivateMessage of the component Private Message Handler. The manipulation of the argument subject/message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.11 is able to address this issue. The identifier of the patch is 2237a9d552e258a43570bb478a92a5505e7c8797. It is recommended to upgrade the affected component. The identifier VDB-219665 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0641.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0641.json
index a2f583c04fe..b4903499f8e 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0641.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0641.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0641",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T09:15:08.953",
- "lastModified": "2023-02-08T21:08:52.640",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T21:15:08.633",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in PHPGurukul Employee Leaves Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file changepassword.php. The manipulation of the argument newpassword/confirmpassword leads to weak password requirements. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220021 was assigned to this vulnerability."
+ "value": "A vulnerability was found in PHPGurukul Employee Leaves Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file changepassword.php. The manipulation of the argument newpassword/confirmpassword leads to weak password requirements. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-220021 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0650.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0650.json
index f22300670c3..9f2b32df416 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0650.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0650.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0650",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T15:17:42.503",
- "lastModified": "2023-02-09T20:03:12.647",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T21:15:08.890",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The name of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability."
+ "value": "A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The identifier of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0666.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0666.json
index 91a5f5198bc..c90e6fb016a 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0666.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0666.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0666",
"sourceIdentifier": "cve@takeonme.org",
"published": "2023-06-07T03:15:09.000",
- "lastModified": "2023-09-17T07:15:08.307",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:53:33.607",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -77,6 +77,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -90,7 +105,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@takeonme.org"
+ "source": "cve@takeonme.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://takeonme.org/cves/CVE-2023-0666.html",
@@ -101,7 +119,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@takeonme.org"
+ "source": "cve@takeonme.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html",
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0667.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0667.json
index 10f72fedea5..80cdb38ebff 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0667.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0667.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0667",
"sourceIdentifier": "cve@takeonme.org",
"published": "2023-06-07T03:15:09.117",
- "lastModified": "2023-09-17T07:15:08.420",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:55:29.700",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -67,12 +67,6 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
- "versionEndExcluding": "3.6.14",
- "matchCriteriaId": "39738E11-AD14-4332-BC9F-0FF028EF6EC2"
- },
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
@@ -96,7 +90,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@takeonme.org"
+ "source": "cve@takeonme.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://takeonme.org/cves/CVE-2023-0667.html",
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0668.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0668.json
index 83c59098a7b..9dcbaed7498 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0668.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0668.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0668",
"sourceIdentifier": "cve@takeonme.org",
"published": "2023-06-07T03:15:09.193",
- "lastModified": "2023-09-17T07:15:08.517",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:56:32.827",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -84,6 +84,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -97,7 +112,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@takeonme.org"
+ "source": "cve@takeonme.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://takeonme.org/cves/CVE-2023-0668.html",
@@ -108,7 +126,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@takeonme.org"
+ "source": "cve@takeonme.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html",
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0673.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0673.json
index d7261256ff2..fd89334a601 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0673.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0673.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0673",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T08:15:08.147",
- "lastModified": "2023-02-12T04:49:33.997",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T21:15:09.000",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file oews/?p=products/view_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-220195."
+ "value": "A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file oews/?p=products/view_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The associated identifier of this vulnerability is VDB-220195."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json
index ca6420d907b..692ff3921c6 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0679",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T13:15:09.377",
- "lastModified": "2023-02-13T17:31:48.113",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T21:15:09.090",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file removeUser.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220220."
+ "value": "A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file removeUser.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220220."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0686.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0686.json
index d1b5258b8ab..39eb64615c9 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0686.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0686.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0686",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T20:15:14.367",
- "lastModified": "2023-02-14T17:06:57.460",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T21:15:09.167",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects the function update_cart of the file /oews/classes/Master.php?f=update_cart of the component HTTP POST Request Handler. The manipulation of the argument cart_id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-220245 was assigned to this vulnerability."
+ "value": "A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects the function update_cart of the file /oews/classes/Master.php?f=update_cart of the component HTTP POST Request Handler. The manipulation of the argument cart_id leads to sql injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The identifier VDB-220245 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0696.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0696.json
index 117463c539c..8db018aef39 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0696.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0696.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0696",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-07T21:15:09.300",
- "lastModified": "2023-09-30T11:15:10.407",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:57:37.487",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -81,7 +81,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0697.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0697.json
index 9918b12ea62..b6d54371614 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0697.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0697.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0697",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-07T21:15:09.360",
- "lastModified": "2023-09-30T11:15:10.483",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:55:45.593",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -94,7 +94,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0698.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0698.json
index 5ff3e4cc34a..9cc3da33171 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0698.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0698.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0698",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-07T21:15:09.417",
- "lastModified": "2023-09-30T11:15:10.553",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:57:33.757",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -81,11 +81,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1693",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0699.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0699.json
index b9e6d78cb24..e975ea02c4b 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0699.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0699.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0699",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-07T21:15:09.470",
- "lastModified": "2023-09-30T11:15:10.623",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:57:19.977",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0700.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0700.json
index 12fae938bb1..5ba4631c717 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0700.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0700.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0700",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-07T21:15:09.523",
- "lastModified": "2023-09-30T11:15:10.683",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:57:15.477",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0701.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0701.json
index d5da3cccdf7..d7d992786f3 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0701.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0701.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0701",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-07T21:15:09.577",
- "lastModified": "2023-09-30T11:15:10.737",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:57:05.993",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0702.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0702.json
index be17aaaf417..dacad516818 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0702.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0702.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0702",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-07T21:15:09.630",
- "lastModified": "2023-09-30T11:15:10.793",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:56:59.957",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0703.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0703.json
index 62bf2f0985d..0c64effc741 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0703.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0703.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0703",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-07T21:15:09.683",
- "lastModified": "2023-09-30T11:15:10.850",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:56:53.793",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0704.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0704.json
index 99b4ddacb12..63586444ef5 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0704.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0704.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0704",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-07T21:15:09.733",
- "lastModified": "2023-09-30T11:15:10.907",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:56:31.580",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0705.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0705.json
index 668c8307ed6..b2f37fb9f46 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0705.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0705.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0705",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-07T21:15:09.787",
- "lastModified": "2023-09-30T11:15:10.967",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:58:13.187",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0748.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0748.json
index 242a0ab97f5..3e4e806c27a 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0748.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0748.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0748",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-02-08T15:15:13.467",
- "lastModified": "2023-10-10T08:15:10.033",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:09:55.293",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -56,7 +56,7 @@
},
"weaknesses": [
{
- "source": "security@huntr.dev",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -64,6 +64,16 @@
"value": "CWE-601"
}
]
+ },
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-601"
+ }
+ ]
}
],
"configurations": [
@@ -87,7 +97,10 @@
"references": [
{
"url": "https://github.com/btcpayserver/btcpayserver/pull/4575/commits/c2cfa17e9619046b43987627b8429541d2834109",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/1a0403b6-9ec9-4587-b559-b1afba798c86",
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0785.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0785.json
index 91a39bbbe93..a42f0f29c4c 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0785.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0785.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0785",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T08:15:10.310",
- "lastModified": "2023-02-21T21:29:21.757",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T22:15:09.230",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as problematic was found in SourceCodester Best Online News Portal 1.0. Affected by this vulnerability is an unknown functionality of the file check_availability.php. The manipulation of the argument username leads to exposure of sensitive information through data queries. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220645 was assigned to this vulnerability."
+ "value": "A vulnerability classified as problematic was found in SourceCodester Best Online News Portal 1.0. Affected by this vulnerability is an unknown functionality of the file check_availability.php. The manipulation of the argument username leads to exposure of sensitive information through data queries. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-220645 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0808.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0808.json
index 63e18fb296e..b965721f4ea 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0808.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0808.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0808",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-13T12:15:11.467",
- "lastModified": "2023-02-23T05:09:56.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T22:15:09.747",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Deye/Revolt/Bosswerk Inverter MW3_15U_5406_1.47/MW3_15U_5406_1.471. It has been rated as problematic. This issue affects some unknown processing of the component Access Point Setting Handler. The manipulation with the input 12345678 leads to use of hard-coded password. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. Upgrading to version MW3_16U_5406_1.53 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-220769 was assigned to this vulnerability."
+ "value": "A vulnerability was found in Deye/Revolt/Bosswerk Inverter MW3_15U_5406_1.47/MW3_15U_5406_1.471. It has been rated as problematic. This issue affects some unknown processing of the component Access Point Setting Handler. The manipulation with the input 12345678 leads to use of hard-coded password. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version MW3_16U_5406_1.53 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-220769 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0879.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0879.json
index bad89de0480..677ef7317cb 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0879.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0879.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0879",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-02-17T02:15:10.680",
- "lastModified": "2023-10-10T08:15:10.137",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:09:37.217",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -87,7 +87,10 @@
"references": [
{
"url": "https://github.com/btcpayserver/btcpayserver/pull/4635/commits/f2f3b245c4d8980d8e54e4708c796df82332c3d7",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/9464e3c6-961d-4e23-8b3d-07cbb31de541",
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0887.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0887.json
index 440b98f460f..ae1eb96291f 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0887.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0887.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0887",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-17T09:15:15.007",
- "lastModified": "2023-03-07T15:39:30.880",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T22:15:09.913",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in phjounin TFTPD64-SE 4.64 and classified as critical. This issue affects some unknown processing of the file tftpd64_svc.exe. The manipulation leads to unquoted search path. An attack has to be approached locally. The associated identifier of this vulnerability is VDB-221351."
+ "value": "A vulnerability was found in phjounin TFTPD64-SE 4.64 and classified as critical. This issue affects some unknown processing of the file tftpd64_svc.exe. The manipulation leads to unquoted search path. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The associated identifier of this vulnerability is VDB-221351."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0897.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0897.json
new file mode 100644
index 00000000000..e84296fe90f
--- /dev/null
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0897.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-0897",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T20:15:08.417",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nSielco PolyEco1000 is vulnerable to a session hijack vulnerability due to the cookie being vulnerable to a brute force attack, lack of SSL, and the session being visible in requests.\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Sielco PolyEco1000 es afectada por una vulnerabilidad de secuestro de sesi\u00f3n debido a que la cookie es vulnerable a un ataque de fuerza bruta, falta de SSL y la sesi\u00f3n es visible en las solicitudes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-384"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0903.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0903.json
index 0e5846bb3fa..d509b6ce8c8 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0903.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0903.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0903",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T08:15:42.240",
- "lastModified": "2023-03-01T17:09:50.750",
+ "lastModified": "2023-10-25T12:55:04.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file edit-task.php. The manipulation of the argument task_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221452."
+ "value": "A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file edit-task.php. The manipulation of the argument task_id leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221452."
}
],
"metrics": {
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -91,6 +91,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0919.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0919.json
index 34eab5e87c7..fda418c06ef 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0919.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0919.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0919",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-02-19T15:15:10.433",
- "lastModified": "2023-10-10T08:15:10.243",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-27T14:57:54.647",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -87,7 +87,10 @@
"references": [
{
"url": "https://github.com/Kareadita/Kavita/pull/1748/commits/6648b79e1b2f92449d5816d0722b7a3d72f259d5",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/3c514923-473f-4c50-ae0d-d002a41fe70f",
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0927.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0927.json
index db184fe25b9..dbd708c75a1 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0927.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0927.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0927",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-22T20:15:12.010",
- "lastModified": "2023-09-30T11:15:11.030",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:58:09.573",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -94,7 +94,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0928.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0928.json
index 3ca905b35b1..4d1c87d4578 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0928.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0928.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0928",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-22T20:15:12.070",
- "lastModified": "2023-09-30T11:15:11.107",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:58:05.803",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0929.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0929.json
index 52a4147cd74..f4356fd4eb4 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0929.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0929.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0929",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-22T20:15:12.123",
- "lastModified": "2023-09-30T11:15:11.180",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:40:15.977",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0930.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0930.json
index a095d67f91a..e54f47d12a7 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0930.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0930.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0930",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-22T20:15:12.177",
- "lastModified": "2023-09-30T11:15:11.237",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:31:01.733",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0931.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0931.json
index 0769a4eb752..26449e80ebe 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0931.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0931.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0931",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-22T20:15:12.230",
- "lastModified": "2023-09-30T11:15:11.297",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:31:06.507",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0932.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0932.json
index 6f598143cec..4e14ceae91e 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0932.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0932.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0932",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-22T20:15:12.280",
- "lastModified": "2023-09-30T11:15:11.433",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:31:10.280",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -94,7 +94,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0933.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0933.json
index a5c8a4a453f..855daf66996 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0933.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0933.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0933",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-22T20:15:12.343",
- "lastModified": "2023-09-30T11:15:11.487",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:33:30.673",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0941.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0941.json
index 2e7d8639d04..9ae1ff837e1 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0941.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0941.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0941",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-02-22T20:15:12.410",
- "lastModified": "2023-09-30T11:15:11.543",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:33:35.087",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0964.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0964.json
index 96b80ffa805..bd3c3b9922b 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0964.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0964.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-0964",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-22T19:15:11.450",
- "lastModified": "2023-03-02T17:22:01.890",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T22:15:10.263",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in SourceCodester Sales Tracker Management System 1.0. Affected is an unknown function of the file admin/products/view_product.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. VDB-221634 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability classified as critical has been found in SourceCodester Sales Tracker Management System 1.0. Affected is an unknown function of the file admin/products/view_product.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. VDB-221634 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1003.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1003.json
index b3ea417cd7d..c395750520b 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1003.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1003.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-07T20:15:09.010",
- "lastModified": "2023-03-23T17:17:23.310",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T22:15:10.407",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in Typora up to 1.5.5. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.8 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221736."
+ "value": "A vulnerability, which was classified as critical, was found in Typora up to 1.5.5 on Windows. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.8 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221736."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1004.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1004.json
index ad65db37632..6f294fc7da4 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1004.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1004.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T08:15:11.337",
- "lastModified": "2023-03-03T16:43:11.650",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T23:15:08.393",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in MarkText up to 0.17.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component WSH JScript Handler. The manipulation leads to code injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221737 was assigned to this vulnerability."
+ "value": "A vulnerability has been found in MarkText up to 0.17.1 on Windows and classified as critical. Affected by this vulnerability is an unknown functionality of the component WSH JScript Handler. The manipulation leads to code injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221737 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1108.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1108.json
index 6ba4553329a..a92ea202f74 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1108.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1108.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1108",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-14T15:15:08.293",
- "lastModified": "2023-09-20T20:16:37.027",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:11.137",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -381,6 +381,10 @@
"tags": [
"Issue Tracking"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0002/",
+ "source": "secalert@redhat.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1112.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1112.json
index 380d9faa479..8159eb3331f 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1112.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1112.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1112",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-01T10:15:09.700",
- "lastModified": "2023-03-09T14:36:53.873",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T08:15:08.217",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Drag and Drop Multiple File Upload Contact Form 7 5.0.6.1. It has been classified as critical. Affected is an unknown function of the file admin-ajax.php. The manipulation of the argument upload_name leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222072."
+ "value": "A vulnerability was found in Drag and Drop Multiple File Upload Contact Form 7 5.0.6.1 on WordPress. It has been classified as critical. Affected is an unknown function of the file admin-ajax.php. The manipulation of the argument upload_name leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222072."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1161.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1161.json
index fa68befcd09..98b4dd3f8ec 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1161.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1161.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-1161",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-03-06T21:15:10.990",
- "lastModified": "2023-09-17T07:15:08.607",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T18:23:56.467",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "El fallo del disector ISO 15765 e ISO 10681 en Wireshark 4.0.0 a 4.0.3 y 3.6.0 a 3.6.11 permite la denegaci\u00f3n de servicio mediante la inyecci\u00f3n de paquetes o un archivo de captura manipulado."
}
],
"metrics": {
@@ -90,6 +94,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -110,15 +134,25 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-08.html",
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json
index cab80be7f99..0fea875362b 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1164",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-03T07:15:09.370",
- "lastModified": "2023-03-10T19:03:05.207",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T08:15:08.463",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in KylinSoft kylin-activation and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260."
+ "value": "A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1177.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1177.json
index 0c515c8df08..ccf9a222f0e 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1177.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1177.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1177",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-03-24T15:15:10.193",
- "lastModified": "2023-10-10T08:15:10.367",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T20:30:10.547",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -56,8 +56,18 @@
},
"weaknesses": [
{
- "source": "security@huntr.dev",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -87,7 +97,10 @@
"references": [
{
"url": "https://github.com/mlflow/mlflow/pull/7891/commits/7162a50c654792c21f3e4a160eb1a0e6a34f6e6e",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/1fe8f21a-c438-4cba-9add-e8a5dab94e28",
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1206.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1206.json
index 37254d4bbdd..5f3d42edc85 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1206.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1206.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1206",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-30T22:15:09.747",
- "lastModified": "2023-09-29T22:15:10.777",
+ "lastModified": "2023-10-20T00:15:11.257",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -118,6 +118,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20230929-0006/",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1259.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1259.json
index 8418219f889..be962ea5a6b 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1259.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1259.json
@@ -2,19 +2,43 @@
"id": "CVE-2023-1259",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-10-14T12:15:09.897",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:33:28.457",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Hotjar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the hotjar_site_id in versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Hotjar para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s de hotjar_site_id en versiones hasta la 1.0.15 incluida debido a una sanitizaci\u00f3n de entrada y un escape de la salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html."
}
],
"metrics": {
"cvssMetricV31": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
@@ -36,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,16 +68,50 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hotjar:hotjar:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "1.0.15",
+ "matchCriteriaId": "191AB952-5D4B-447B-AB93-8E271F84E3EF"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/hotjar/tags/1.0.14/includes/class-hotjar.php#L40",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9c640bcb-b6bf-4865-b713-32ca846e4ed9?source=cve",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1260.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1260.json
index 81aeb53b56f..9ce0bbf7ab4 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1260.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1260.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1260",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-24T01:15:42.707",
- "lastModified": "2023-09-26T16:21:06.823",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:11.233",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -160,6 +160,10 @@
"Issue Tracking",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0010/",
+ "source": "secalert@redhat.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json
index 4eeb69092b4..d4f6babf095 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1277",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-08T19:15:10.760",
- "lastModified": "2023-03-14T19:29:08.297",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T08:15:08.663",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in kylin-system-updater up to 1.4.20kord. Affected is the function InstallSnap of the component Update Handler. The manipulation leads to command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222600."
+ "value": "A vulnerability, which was classified as critical, was found in kylin-system-updater up to 1.4.20kord on Ubuntu Kylin. Affected is the function InstallSnap of the component Update Handler. The manipulation leads to command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222600."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1283.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1283.json
index b30f3313d1c..baed2e48f3b 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1283.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1283.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1283",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-03-08T22:15:09.683",
- "lastModified": "2023-10-10T08:15:10.477",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T20:30:23.583",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -87,7 +87,10 @@
"references": [
{
"url": "https://github.com/BuilderIO/qwik/pull/3249/commits/4d9ba6e098ae6e537aa55abb6b8369bb670ffe66",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/63f1ff91-48f3-4886-a179-103f1ddd8ff8",
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json
index a1e40e1b76f..a8d6b52808f 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1293",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-09T15:15:09.403",
- "lastModified": "2023-03-15T18:35:48.707",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T08:15:08.773",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. This issue affects the function mysqli_query of the file admin_cs.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222647."
+ "value": "A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. This issue affects the function mysqli_query of the file admin_cs.php. The manipulation leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222647."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1352.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1352.json
index f69468fcea4..55a7e712e51 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1352.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1352.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1352",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-11T18:15:43.603",
- "lastModified": "2023-03-15T17:37:12.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T09:15:08.570",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851."
+ "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1356.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1356.json
new file mode 100644
index 00000000000..1cf59875698
--- /dev/null
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1356.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-1356",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:22.873",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Reflected cross-site scripting in the StudentSearch component in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows hijacking of a user\u2019s browsing session by attackers who have convinced the said user to click on a malicious link."
+ },
+ {
+ "lang": "es",
+ "value": "Cross-Site Scripting (XSS) Reflejado en el componente StudentSearch en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permiten el secuestro de la sesi\u00f3n de navegaci\u00f3n de un usuario por parte de atacantes que han convencido a dicho usuario de hacer clic en un enlace malicioso."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-1356",
+ "source": "vdp@themissinglink.com.au"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1380.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1380.json
index 84fa8acc24d..7458239fd05 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1380.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1380.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1380",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-03-27T21:15:10.623",
- "lastModified": "2023-08-19T18:15:21.967",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:11.347",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -339,6 +339,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "secalert@redhat.com"
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang@yonsei.ac.kr/T/#u",
"source": "secalert@redhat.com",
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json
index e207e7c68e9..42fe95b5514 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1448",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:12.093",
- "lastModified": "2023-05-27T04:15:24.037",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-21T09:15:09.937",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -143,10 +143,6 @@
"Third Party Advisory",
"VDB Entry"
]
- },
- {
- "url": "https://www.debian.org/security/2023/dsa-5411",
- "source": "cna@vuldb.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json
index d2b026cf7bf..be960d6bf27 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1449",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:12.347",
- "lastModified": "2023-05-27T04:15:24.177",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-21T09:15:10.137",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -144,10 +144,6 @@
"Third Party Advisory",
"VDB Entry"
]
- },
- {
- "url": "https://www.debian.org/security/2023/dsa-5411",
- "source": "cna@vuldb.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json
index 843af7a276b..70df333f8d9 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1452",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:12.947",
- "lastModified": "2023-05-27T04:15:24.287",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-21T10:15:08.863",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -144,10 +144,6 @@
"Third Party Advisory",
"VDB Entry"
]
- },
- {
- "url": "https://www.debian.org/security/2023/dsa-5411",
- "source": "cna@vuldb.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1455.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1455.json
index 74cd73ff0f7..0ce28a25fc5 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1455.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1455.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1455",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:13.767",
- "lastModified": "2023-03-23T14:48:08.043",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T10:15:09.127",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. This vulnerability affects unknown code of the file admin/ajax.php?action=login2 of the component Login Page. The manipulation of the argument email with the input abc%40qq.com' AND (SELECT 9110 FROM (SELECT(SLEEP(5)))XSlc) AND 'jFNl'='jFNl leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223300."
+ "value": "A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. This vulnerability affects unknown code of the file admin/ajax.php?action=login2 of the component Login Page. The manipulation of the argument email with the input abc%40qq.com' AND (SELECT 9110 FROM (SELECT(SLEEP(5)))XSlc) AND 'jFNl'='jFNl leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223300."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1495.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1495.json
index ac3f13f4486..78049a87ca8 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1495.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1495.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1495",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-19T00:15:12.677",
- "lastModified": "2023-03-23T14:04:04.467",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T10:15:09.367",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in Rebuild up to 3.2.3. Affected by this vulnerability is the function queryListOfConfig of the file /admin/robot/approval/list. The manipulation of the argument q leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is c9474f84e5f376dd2ade2078e3039961a9425da7. It is recommended to apply a patch to fix this issue. The identifier VDB-223381 was assigned to this vulnerability."
+ "value": "A vulnerability classified as critical was found in Rebuild up to 3.2.3. Affected by this vulnerability is the function queryListOfConfig of the file /admin/robot/approval/list. The manipulation of the argument q leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c9474f84e5f376dd2ade2078e3039961a9425da7. It is recommended to apply a patch to fix this issue. The identifier VDB-223381 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1502.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1502.json
index f31fb50c5ca..b7700325e77 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1502.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1502.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1502",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T09:15:12.103",
- "lastModified": "2023-03-23T13:36:08.220",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T10:15:09.477",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in SourceCodester Alphaware Simple E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file function/edit_customer.php. The manipulation of the argument firstname/mi/lastname with the input a' RLIKE SLEEP(5) AND 'dAbu'='dAbu leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-223406 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in SourceCodester Alphaware Simple E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file function/edit_customer.php. The manipulation of the argument firstname/mi/lastname with the input a' RLIKE SLEEP(5) AND 'dAbu'='dAbu leads to sql injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-223406 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json
index 0e326a417d7..a1659db1cf9 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1503",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T09:15:12.267",
- "lastModified": "2023-03-23T13:36:16.783",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T10:15:09.543",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in SourceCodester Alphaware Simple E-Commerce System 1.0. This affects an unknown part of the file admin/admin_index.php. The manipulation of the argument username/password with the input admin' AND (SELECT 8062 FROM (SELECT(SLEEP(5)))meUD)-- hLiX leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223407."
+ "value": "A vulnerability classified as critical has been found in SourceCodester Alphaware Simple E-Commerce System 1.0. This affects an unknown part of the file admin/admin_index.php. The manipulation of the argument username/password with the input admin' AND (SELECT 8062 FROM (SELECT(SLEEP(5)))meUD)-- hLiX leads to sql injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223407."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json
index add20f04906..c84a40cc590 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1504",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T09:15:12.410",
- "lastModified": "2023-03-23T13:40:29.107",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T10:15:09.607",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in SourceCodester Alphaware Simple E-Commerce System 1.0. This vulnerability affects unknown code. The manipulation of the argument email/password with the input test1%40test.com ' AND (SELECT 6077 FROM (SELECT(SLEEP(5)))dltn) AND 'PhRa'='PhRa leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223408."
+ "value": "A vulnerability classified as critical was found in SourceCodester Alphaware Simple E-Commerce System 1.0. This vulnerability affects unknown code. The manipulation of the argument email/password with the input test1%40test.com ' AND (SELECT 6077 FROM (SELECT(SLEEP(5)))dltn) AND 'PhRa'='PhRa leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223408."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1505.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1505.json
index fc18a2a6067..a18b6d4cda3 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1505.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1505.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1505",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T09:15:12.540",
- "lastModified": "2023-03-23T13:40:37.387",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T10:15:09.677",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, has been found in SourceCodester E-Commerce System 1.0. This issue affects some unknown processing of the file /ecommerce/admin/settings/setDiscount.php. The manipulation of the argument id with the input 201737 AND (SELECT 8973 FROM (SELECT(SLEEP(5)))OoAD) leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223409 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, has been found in SourceCodester E-Commerce System 1.0. This issue affects some unknown processing of the file /ecommerce/admin/settings/setDiscount.php. The manipulation of the argument id with the input 201737 AND (SELECT 8973 FROM (SELECT(SLEEP(5)))OoAD) leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-223409 was assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1506.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1506.json
index 7c149009b72..c3ec5a28c3c 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1506.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1506.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-1506",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T10:15:11.543",
- "lastModified": "2023-03-23T13:40:56.973",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T10:15:09.743",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in SourceCodester E-Commerce System 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument U_USERNAME leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223410 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, was found in SourceCodester E-Commerce System 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument U_USERNAME leads to sql injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-223410 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1528.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1528.json
index 640de980f31..04df2b01f96 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1528.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1528.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1528",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-21T21:15:12.297",
- "lastModified": "2023-09-30T11:15:11.603",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:33:42.933",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -62,6 +62,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -82,19 +107,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1529.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1529.json
index b2f503ae6b9..8474ac890ba 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1529.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1529.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1529",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-21T21:15:12.357",
- "lastModified": "2023-09-30T11:15:11.693",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:43:13.867",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-119"
+ "value": "CWE-787"
}
]
}
@@ -62,6 +62,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -82,19 +107,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1530.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1530.json
index 6a72a4b5242..65035891689 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1530.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1530.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1530",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-21T21:15:12.413",
- "lastModified": "2023-09-30T11:15:11.753",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:46:04.377",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -62,6 +62,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -82,19 +107,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1531.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1531.json
index 7b430354952..890d7041358 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1531.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1531.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1531",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-21T21:15:12.527",
- "lastModified": "2023-09-30T11:15:11.817",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:47:03.977",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -62,6 +62,46 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:chromium:chromium:112.0.5592.0:*:*:*:*:*:x64:*",
+ "matchCriteriaId": "3FEF925E-AEE4-445A-90D4-3C10E218EB9A"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -82,23 +122,38 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1724",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1532.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1532.json
index dfd339bee6a..08a8be1db88 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1532.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1532.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1532",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-21T21:15:12.613",
- "lastModified": "2023-09-30T11:15:11.897",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:47:08.577",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -62,12 +62,41 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/171959/Chrome-media-mojom-VideoFrame-Missing-Validation.html",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html",
@@ -86,19 +115,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1533.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1533.json
index 45109131ef8..6b5cb9bb2bc 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1533.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1533.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1533",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-21T21:15:12.690",
- "lastModified": "2023-09-30T11:15:11.970",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:47:12.877",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -62,6 +62,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -82,19 +107,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1534.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1534.json
index 328df435478..12deb9bb757 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1534.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1534.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1534",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-21T21:15:12.747",
- "lastModified": "2023-09-30T11:15:12.150",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:48:37.073",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-416"
+ "value": "CWE-125"
}
]
}
@@ -62,16 +62,49 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/171961/Chrome-GL_ShaderBinary-Untrusted-Process-Exposure.html",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://packetstormsecurity.com/files/171965/Chrome-SpvGetMappedSamplerName-Out-Of-Bounds-String-Copy.html",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html",
@@ -90,19 +123,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NGWWGQULJ7QRNP4GY57HE7OO7VMRWMPN/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1638.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1638.json
index 68a94c809ce..e2694026e24 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1638.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1638.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1638",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T21:15:06.817",
- "lastModified": "2023-03-31T00:11:02.010",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T14:15:08.577",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -130,11 +130,8 @@
]
},
{
- "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned32",
- "source": "cna@vuldb.com",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638",
+ "source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.224018",
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1639.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1639.json
index 7dde479b77a..8b85129e2f4 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1639.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1639.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1639",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T21:15:06.887",
- "lastModified": "2023-03-31T00:12:48.603",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T14:15:08.710",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -130,11 +130,8 @@
]
},
{
- "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned33",
- "source": "cna@vuldb.com",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639",
+ "source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.224019",
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1640.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1640.json
index 8ca223f7cc9..9343e07d156 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1640.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1640.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1640",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T22:15:06.893",
- "lastModified": "2023-03-30T16:30:57.850",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T14:15:08.780",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -130,11 +130,8 @@
]
},
{
- "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned34",
- "source": "cna@vuldb.com",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640",
+ "source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.224020",
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1641.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1641.json
index dcf4bdbe890..9b871c49cfe 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1641.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1641.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1641",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T22:15:06.960",
- "lastModified": "2023-03-30T16:34:40.600",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T14:15:08.850",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -130,11 +130,8 @@
]
},
{
- "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned35",
- "source": "cna@vuldb.com",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641",
+ "source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.224021",
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1642.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1642.json
index 941da587a93..c8dbfba460d 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1642.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1642.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1642",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T22:15:07.017",
- "lastModified": "2023-03-30T17:09:39.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T14:15:08.920",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -130,11 +130,8 @@
]
},
{
- "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned36",
- "source": "cna@vuldb.com",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642",
+ "source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.224022",
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1643.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1643.json
index 8952e8a7180..c030247adc4 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1643.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1643.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1643",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T22:15:07.077",
- "lastModified": "2023-03-30T17:18:34.817",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T14:15:08.987",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -130,11 +130,8 @@
]
},
{
- "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned37",
- "source": "cna@vuldb.com",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643",
+ "source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.224023",
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1644.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1644.json
index 6cfd8b8bcf4..0a4bac2319b 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1644.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1644.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1644",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T23:15:07.807",
- "lastModified": "2023-03-30T15:56:38.213",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T14:15:09.057",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -130,11 +130,8 @@
]
},
{
- "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned40",
- "source": "cna@vuldb.com",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644",
+ "source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.224024",
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1645.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1645.json
index 005882c8fb3..a962825cdd4 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1645.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1645.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1645",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T23:15:07.880",
- "lastModified": "2023-03-30T16:20:10.103",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T14:15:09.167",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -131,11 +131,8 @@
]
},
{
- "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned41",
- "source": "cna@vuldb.com",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645",
+ "source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.224025",
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1646.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1646.json
index 29a7a66c1bc..8ab5dce9e1a 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1646.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1646.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1646",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T23:15:07.940",
- "lastModified": "2023-03-30T16:22:10.323",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T14:15:09.337",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -130,11 +130,8 @@
]
},
{
- "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned42",
- "source": "cna@vuldb.com",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646",
+ "source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.224026",
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1647.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1647.json
index 9cfe3b0d8e3..1da02968a3e 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1647.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1647.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1647",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-03-27T01:15:07.223",
- "lastModified": "2023-10-10T08:15:10.580",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T20:29:34.070",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -97,7 +97,10 @@
"references": [
{
"url": "https://github.com/sbs20/scanservjs/pull/606/commits/d51fd52c1569813990b8f74e64ae6979c665dca1",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/d6de3d6e-9551-47d1-b28c-7e965c1b82b6",
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1810.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1810.json
index b865c8b80a0..0007622d95f 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1810.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1810.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1810",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.317",
- "lastModified": "2023-09-30T11:15:12.207",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:49:28.777",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1811.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1811.json
index 7a79da159e0..7a1412525ab 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1811.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1811.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1811",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.363",
- "lastModified": "2023-09-30T11:15:12.280",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:49:33.660",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1812.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1812.json
index 08cb3d92913..e47f6de0fe0 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1812.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1812.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1812",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.400",
- "lastModified": "2023-09-30T11:15:12.333",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:29:48.640",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-119"
+ "value": "CWE-787"
}
]
}
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1813.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1813.json
index 0c7bb9be489..43bc9230a3e 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1813.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1813.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1813",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.440",
- "lastModified": "2023-09-30T11:15:12.390",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:29:52.570",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1814.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1814.json
index 16cc2753735..2b5bd3996ae 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1814.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1814.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1814",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.477",
- "lastModified": "2023-09-30T11:15:12.450",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:30:13.407",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "NVD-CWE-noinfo"
}
]
}
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1815.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1815.json
index f738ccb47dc..7ebcee4d6e1 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1815.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1815.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1815",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.517",
- "lastModified": "2023-09-30T11:15:12.510",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:30:16.747",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1816.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1816.json
index 677aafbc8b1..015a8178eec 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1816.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1816.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1816",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.553",
- "lastModified": "2023-09-30T11:15:12.570",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:30:20.167",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1817.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1817.json
index 0f8adadaa9f..97926b87629 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1817.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1817.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1817",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.587",
- "lastModified": "2023-09-30T11:15:12.633",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:30:55.957",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1818.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1818.json
index 44faea83291..35f1c007b69 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1818.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1818.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1818",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.623",
- "lastModified": "2023-09-30T11:15:12.697",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:30:59.503",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1819.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1819.json
index 03a01f7a63c..2ecce10dd24 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1819.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1819.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1819",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.663",
- "lastModified": "2023-09-30T11:15:12.757",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:03:35.727",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1820.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1820.json
index 797b3ad8588..3bcf7318258 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1820.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1820.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1820",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.697",
- "lastModified": "2023-09-30T11:15:12.817",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:03:40.307",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1821.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1821.json
index 8ec927c7fab..cb59ae74fa3 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1821.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1821.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1821",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.733",
- "lastModified": "2023-09-30T11:15:12.873",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:03:44.550",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1822.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1822.json
index aad5220d168..8aa902771aa 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1822.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1822.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1822",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.770",
- "lastModified": "2023-09-30T11:15:12.953",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:03:48.813",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1823.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1823.json
index 2ed3e5b17e9..7168872913a 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1823.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1823.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1823",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.810",
- "lastModified": "2023-09-30T11:15:13.017",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:03:53.323",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -77,6 +82,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,20 +121,29 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5386",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1826.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1826.json
index 2fcf4e066fb..dd7b7e1213f 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1826.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1826.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1826",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-04T09:15:07.977",
- "lastModified": "2023-10-04T15:07:27.313",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T18:07:21.960",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -123,7 +123,12 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/171790/Online-Computer-And-Laptop-Store-1.0-Shell-Upload.html",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.224841",
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1943.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1943.json
index 2d7a7709acf..7777d28b90e 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1943.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1943.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-1943",
"sourceIdentifier": "jordan@liggitt.net",
"published": "2023-10-12T00:15:10.067",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T14:55:16.960",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Privilege Escalation in kOps using GCE/GCP Provider in Gossip Mode.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Escalada de privilegios en kOps utilizando el proveedor GCE/GCP en modo Gossip."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "jordan@liggitt.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "jordan@liggitt.net",
"type": "Secondary",
@@ -46,14 +80,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:kubernetes:operations:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.25.4",
+ "matchCriteriaId": "5488C983-38DD-4787-9956-C68D528D5ED1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:kubernetes:operations:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.26.0",
+ "versionEndExcluding": "1.26.2",
+ "matchCriteriaId": "763C648A-9C2F-4697-AC4A-5897EDA1966E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/kubernetes/kops/issues/15539",
- "source": "jordan@liggitt.net"
+ "source": "jordan@liggitt.net",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://groups.google.com/g/kubernetes-security-announce/c/yrCE1x89oaU",
- "source": "jordan@liggitt.net"
+ "source": "jordan@liggitt.net",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1992.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1992.json
index 700b40789ae..ad449613c45 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1992.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1992.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-1992",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-04-12T21:15:15.147",
- "lastModified": "2023-09-17T07:15:08.717",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T18:23:48.543",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "El fallo del disector RPCoRDMA en Wireshark 4.0.0 a 4.0.4 y 3.6.0 a 3.6.12 permite la denegaci\u00f3n de servicio mediante la inyecci\u00f3n de paquetes o un archivo de captura manipulado."
}
],
"metrics": {
@@ -90,6 +94,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,27 +161,46 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-09.html",
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1993.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1993.json
index 757bed6255a..fcc9508db0d 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1993.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1993.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-1993",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-04-12T21:15:16.183",
- "lastModified": "2023-09-17T07:15:08.827",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T18:23:43.390",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "El bucle grande del disector LISP en Wireshark 4.0.0 a 4.0.4 y 3.6.0 a 3.6.12 permite la denegaci\u00f3n de servicio mediante inyecci\u00f3n de paquetes o archivo de captura manipulado"
}
],
"metrics": {
@@ -90,6 +94,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,27 +161,46 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-10.html",
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1994.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1994.json
index 3420e5f7e47..aa9d70251d3 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1994.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1994.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-1994",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-04-12T22:15:13.987",
- "lastModified": "2023-09-17T07:15:08.937",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T18:07:43.257",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "El fallo del disector GQUIC en Wireshark 4.0.0 a 4.0.4 y 3.6.0 a 3.6.12 permite la denegaci\u00f3n de servicio mediante la inyecci\u00f3n de paquetes o un archivo de captura manipulado."
}
],
"metrics": {
@@ -90,6 +94,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -111,27 +160,46 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00029.html",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EHLTD25WNQSPQNELX52UH6YLP4TBLKTT/",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZA7IMATNNQPLIM6WMRPM3T5ZY24NRR2/",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFJERBHVWYLYWXO2B3V47QH66IEB6EZ3/",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-11.html",
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20135.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20135.json
index a8c6daa7033..f83fa0de712 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20135.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20135.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-20135",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-09-13T17:15:09.253",
- "lastModified": "2023-09-19T14:35:29.487",
+ "lastModified": "2023-10-26T13:45:10.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -79,17 +79,17 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:h:cisco:ios_xr:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.5.2",
"versionEndExcluding": "7.6",
- "matchCriteriaId": "1D0FA627-590F-4E92-880A-6E006CF63D71"
+ "matchCriteriaId": "93148C76-2970-48D4-942A-D67B68352EA9"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:h:cisco:ios_xr:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.7",
"versionEndExcluding": "7.10.1",
- "matchCriteriaId": "2DD39E73-3E40-4716-8ABB-2CF8D58AF25B"
+ "matchCriteriaId": "75317BEF-7612-49E8-A4B2-9C90AADE3BB0"
}
]
}
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20190.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20190.json
index 54682b4173b..bf2308ee957 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20190.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20190.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-20190",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-09-13T17:15:09.357",
- "lastModified": "2023-09-19T15:45:04.047",
+ "lastModified": "2023-10-25T20:42:54.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -11,7 +11,7 @@
},
{
"lang": "es",
- "value": "Una vulnerabilidad en la caracter\u00edstica de compresi\u00f3n de la cl\u00e1sica lista de control de acceso (ACL) del software Cisco IOS XR podr\u00eda permitir que un atacante remoto no autenticado evite la protecci\u00f3n que ofrece una ACL configurada en un dispositivo afectado. Esta vulnerabilidad se debe a una codificaci\u00f3n incorrecta del rango de direcciones de destino en el m\u00f3dulo de compresi\u00f3n de una ACL que se aplica a una interfaz de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico a trav\u00e9s del dispositivo afectado que la ACL configurada deber\u00eda denegar. Una explotaci\u00f3n existosa exitoso podr\u00eda permitir al atacante eludir las protecciones ACL configuradas en el dispositivo afectado, permiti\u00e9ndole acceder a redes confiables que el dispositivo podr\u00eda estar protegiendo. Existen soluciones que abordan esta vulnerabilidad. Este aviso es parte de la publicaci\u00f3n de septiembre de 2023 del paquete de avisos de seguridad del software Cisco IOS XR."
+ "value": "Una vulnerabilidad en la caracter\u00edstica de compresi\u00f3n de la cl\u00e1sica lista de control de acceso (ACL) del software Cisco IOS XR podr\u00eda permitir que un atacante remoto no autenticado evite la protecci\u00f3n que ofrece una ACL configurada en un dispositivo afectado. Esta vulnerabilidad se debe a una codificaci\u00f3n incorrecta del rango de direcciones de destino en el m\u00f3dulo de compresi\u00f3n de una ACL que se aplica a una interfaz de un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando tr\u00e1fico a trav\u00e9s del dispositivo afectado que la ACL configurada deber\u00eda denegar. Una explotaci\u00f3n existosa exitoso podr\u00eda permitir al atacante eludir las protecciones ACL configuradas en el dispositivo afectado, permiti\u00e9ndole acceder a redes confiables que el dispositivo podr\u00eda estar protegiendo. Existen workarounds que abordan esta vulnerabilidad. Este aviso es parte de la publicaci\u00f3n de septiembre de 2023 del paquete de avisos de seguridad del software Cisco IOS XR."
}
],
"metrics": {
@@ -79,28 +79,28 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:h:cisco:ios_xr:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.3.5",
- "matchCriteriaId": "5C9E87A2-289F-413D-AC06-6162141FB1F4"
+ "matchCriteriaId": "2149246C-67F1-442E-82B3-A2FD61096A3C"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:h:cisco:ios_xr:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.5",
"versionEndExcluding": "7.5.4",
- "matchCriteriaId": "94EC85D1-7AE9-4F89-82EC-5FC227044BEA"
+ "matchCriteriaId": "ED7F47DA-4B58-47D2-B913-82A5C415818B"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:h:cisco:ios_xr:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6",
"versionEndExcluding": "7.8.2",
- "matchCriteriaId": "E1244647-6336-41CB-8F2D-665FB76F44D6"
+ "matchCriteriaId": "0130B9F9-A333-4C3A-A92B-139CE276F6EA"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:h:cisco:ios_xr:7.9:*:*:*:*:*:*:*",
- "matchCriteriaId": "66AEB63B-0A8B-40E7-966C-B7EE01F70E2A"
+ "criteria": "cpe:2.3:o:cisco:ios_xr:7.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD280E00-7BAC-4160-926A-09D87719585F"
}
]
}
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20191.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20191.json
index 1005465a0f6..0f3595351a1 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20191.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20191.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-20191",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-09-13T17:15:09.440",
- "lastModified": "2023-09-19T15:50:22.317",
+ "lastModified": "2023-10-25T20:42:54.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -11,7 +11,7 @@
},
{
"lang": "es",
- "value": "Una vulnerabilidad en el procesamiento de la lista de control de acceso (ACL) en las interfaces MPLS en la direcci\u00f3n de ingreso del software Cisco IOS XR podr\u00eda permitir que un atacante remoto no autenticado omita una ACL configurada. Esta vulnerabilidad se debe a la compatibilidad incompleta con esta caracter\u00edstica. Un atacante podr\u00eda aprovechar esta vulnerabilidad intentando enviar tr\u00e1fico a trav\u00e9s de un dispositivo afectado. Una explotaci\u00f3n existosa podr\u00eda permitir al atacante eludir una ACL en el dispositivo afectado. Existen soluciones que abordan esta vulnerabilidad. Este aviso es parte de la publicaci\u00f3n de septiembre de 2023 del paquete de avisos de seguridad del software Cisco IOS XR."
+ "value": "Una vulnerabilidad en el procesamiento de la lista de control de acceso (ACL) en las interfaces MPLS en la direcci\u00f3n de ingreso del software Cisco IOS XR podr\u00eda permitir que un atacante remoto no autenticado omita una ACL configurada. Esta vulnerabilidad se debe a la compatibilidad incompleta con esta caracter\u00edstica. Un atacante podr\u00eda aprovechar esta vulnerabilidad intentando enviar tr\u00e1fico a trav\u00e9s de un dispositivo afectado. Una explotaci\u00f3n existosa podr\u00eda permitir al atacante eludir una ACL en el dispositivo afectado. Existen workarounds que abordan esta vulnerabilidad. Este aviso es parte de la publicaci\u00f3n de septiembre de 2023 del paquete de avisos de seguridad del software Cisco IOS XR."
}
],
"metrics": {
@@ -79,21 +79,21 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:h:cisco:ios_xr:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.7.21",
- "matchCriteriaId": "A1278815-CDE6-471B-A51F-3E0066D5A5EE"
+ "matchCriteriaId": "0F752BFA-5ADB-4331-8997-B51611C07F57"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:h:cisco:ios_xr:*:*:*:*:*:*:*:*",
+ "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.8",
"versionEndExcluding": "7.9.2",
- "matchCriteriaId": "5770983C-0EB9-4AC7-91FB-BF9AA4A9AE52"
+ "matchCriteriaId": "CCE5AC34-B919-44FC-928C-13CD466C9EDA"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:h:cisco:ios_xr:7.10:*:*:*:*:*:*:*",
- "matchCriteriaId": "F12D609A-06F4-44BE-9455-F28C1ECB4DE8"
+ "criteria": "cpe:2.3:o:cisco:ios_xr:7.10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15136625-5385-4B82-AC99-B71D3608BBF3"
}
]
}
diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20198.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20198.json
index a1a265519b3..cf4d5534e98 100644
--- a/CVE-2023/CVE-2023-201xx/CVE-2023-20198.json
+++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20198.json
@@ -2,16 +2,44 @@
"id": "CVE-2023-20198",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-10-16T16:15:10.023",
- "lastModified": "2023-10-16T22:15:11.833",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-25T18:17:22.940",
+ "vulnStatus": "Undergoing Analysis",
+ "cisaExploitAdd": "2023-10-16",
+ "cisaActionDue": "2023-10-20",
+ "cisaRequiredAction": "Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.",
+ "cisaVulnerabilityName": "Cisco IOS XE Web UI Privilege Escalation Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system.\r\n\r For steps to close the attack vector for this vulnerability, see the Recommendations section of this advisory\u00a0\r\n\r Cisco will provide updates on the status of this investigation and when a software patch is available."
+ },
+ {
+ "lang": "es",
+ "value": "Cisco tiene conocimiento de la explotaci\u00f3n activa de una vulnerabilidad previamente desconocida en la funci\u00f3n de interfaz de usuario web del software Cisco IOS XE cuando se expone a Internet o a redes que no son de confianza. Esta vulnerabilidad permite a un atacante remoto no autenticado crear una cuenta en un sistema afectado con acceso de nivel de privilegio 15. Luego, el atacante puede usar esa cuenta para hacerse con el control del sistema afectado. Para conocer los pasos para cerrar el vector de ataque de esta vulnerabilidad, consulte la secci\u00f3n Recomendaciones de este aviso. Cisco proporcionar\u00e1 actualizaciones sobre el estado de esta investigaci\u00f3n y cu\u00e1ndo estar\u00e1 disponible un parche de software."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 10.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 6.0
+ },
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@@ -34,18 +62,63 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "17.9.4a",
+ "matchCriteriaId": "57A434FD-E06D-4D3D-B394-DFBC46FF6420"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://arstechnica.com/security/2023/10/actively-exploited-cisco-0-day-with-maximum-10-severity-gives-full-network-control/",
- "source": "ykramarz@cisco.com"
+ "source": "ykramarz@cisco.com",
+ "tags": [
+ "Press/Media Coverage",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z",
+ "source": "ykramarz@cisco.com",
+ "tags": [
+ "Mitigation",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.cisa.gov/guidance-addressing-cisco-ios-xe-web-ui-vulnerabilities",
"source": "ykramarz@cisco.com"
},
{
"url": "https://www.darkreading.com/vulnerabilities-threats/critical-unpatched-cisco-zero-day-bug-active-exploit",
- "source": "ykramarz@cisco.com"
+ "source": "ykramarz@cisco.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20259.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20259.json
index a503c43cf20..ddd85aec16a 100644
--- a/CVE-2023/CVE-2023-202xx/CVE-2023-20259.json
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20259.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-20259",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-10-04T17:15:09.990",
- "lastModified": "2023-10-04T18:14:55.483",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T16:13:08.310",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface and cause delays with call processing. This API is not used for device management and is unlikely to be used in normal operations of the device.\r\n\r This vulnerability is due to improper API authentication and incomplete validation of the API request. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to high CPU utilization, which could negatively impact user traffic and management access. When the attack stops, the device will recover without manual intervention."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en un endpoint de la API de m\u00faltiples productos de Comunicaciones Unificadas de Cisco podr\u00eda permitir que un atacante remoto no autenticado provoque una alta utilizaci\u00f3n de la CPU, lo que podr\u00eda afectar el acceso a la interfaz de administraci\u00f3n basada en web y causar retrasos en el procesamiento de llamadas. Esta API no se utiliza para la administraci\u00f3n de dispositivos y es poco probable que se utilice en las operaciones normales del dispositivo. Esta vulnerabilidad se debe a una autenticaci\u00f3n de API incorrecta y a una validaci\u00f3n incompleta de la solicitud. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada a una API espec\u00edfica en el dispositivo. Un exploit exitoso podr\u00eda permitir que el atacante cause una condici\u00f3n de denegaci\u00f3n de servicio (DoS) debido a una alta utilizaci\u00f3n de la CPU, lo que podr\u00eda afectar negativamente al tr\u00e1fico de usuarios y al acceso de administraci\u00f3n. Cuando el ataque cese, el dispositivo se recuperar\u00e1 sin intervenci\u00f3n manual."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@@ -34,10 +58,82 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:emergency_responder:14su3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF848485-44D0-4354-852A-8E859E050A07"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:prime_collaboration_deployment:14su3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9399AD59-4F8E-4B8E-AF9B-F2785993DBC8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "397E6105-7508-4DEB-AD6D-1E702E31C875"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1\\)su7:*:*:*:session_management:*:*:*",
+ "matchCriteriaId": "94FFAF94-86EC-468C-A7F9-D85D3DE86A85"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:unified_communications_manager:14su3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D4FFC030-F8FD-486F-83C5-4C8F2932CE5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:unified_communications_manager:14su3:*:*:*:session_management:*:*:*",
+ "matchCriteriaId": "EB4AF502-94FF-4CCF-B99F-A4AEDE032128"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:unified_communications_manager_im_\\&_presence_service:12.5\\(1\\)su7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0B6DA5E-39BB-40B5-8BB6-30E77F89DE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:unified_communications_manager_im_\\&_presence_service:14su3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CD16AB0-3BB8-4ECF-B0F8-B7AE8B41BF87"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:unity_connection:14su3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "181866CE-6279-4422-8EF8-7A12DB5B21F6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-apidos-PGsDcdNF",
- "source": "ykramarz@cisco.com"
+ "source": "ykramarz@cisco.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20261.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20261.json
new file mode 100644
index 00000000000..92821a5839b
--- /dev/null
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20261.json
@@ -0,0 +1,589 @@
+{
+ "id": "CVE-2023-20261",
+ "sourceIdentifier": "ykramarz@cisco.com",
+ "published": "2023-10-18T17:15:08.467",
+ "lastModified": "2023-10-25T01:24:28.263",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to retrieve arbitrary files from an affected system.\r\n\r This vulnerability is due to improper validation of parameters that are sent to the web UI. An attacker could exploit this vulnerability by logging in to Cisco Catalyst SD-WAN Manager and issuing crafted requests using the web UI. A successful exploit could allow the attacker to obtain arbitrary files from the underlying Linux file system of an affected system. To exploit this vulnerability, the attacker must be an authenticated user."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en la interfaz de usuario web de Cisco Catalyst SD-WAN Manager podr\u00eda permitir que un atacante remoto autenticado recupere archivos arbitrarios de un sistema afectado. Esta vulnerabilidad se debe a una validaci\u00f3n incorrecta de los par\u00e1metros que se env\u00edan a la interfaz de usuario web. Un atacante podr\u00eda aprovechar esta vulnerabilidad iniciando sesi\u00f3n en Cisco Catalyst SD-WAN Manager y emitiendo solicitudes manipuladas mediante la interfaz de usuario web. Un exploit exitoso podr\u00eda permitir al atacante obtener archivos arbitrarios del sistema de archivos Linux subyacente de un sistema afectado. Para aprovechar esta vulnerabilidad, el atacante debe ser un usuario autenticado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "ykramarz@cisco.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A0D5F32C-BFC1-49CC-BE96-920FCBE567B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F621202C-3851-4D7E-BFA2-DABB08E73DB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38132BE5-528B-472E-9249-B226C0DE1C80"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37C817B2-DDB9-4CAF-96C9-776482A8597D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC5D29FD-0917-4C1F-AE75-2D63F5C9C58D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1E3090C4-15E6-4746-B0D2-27665AB91B08"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04E924CC-3161-436D-93F0-066F76172F55"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ED059CD-AD0A-4748-8390-8CDCF4C4D1CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6990E97D-30E9-42A9-AE6A-CC597DF75B0B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15B60BA4-EA02-4D0D-82C3-1B08016EF5AE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E9DC51F7-72D4-4593-8DDE-8AA3955BB826"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B047A011-1C27-4D86-99C1-BFCDC7F04A9B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DADEA8FB-3298-4534-B65E-81060E3DB45A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4C6DF1F-4995-4486-8F90-9EFD6417ABA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D249954-93E0-4124-B9BA-84B9F34D7CB1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7F20EBE-DFDF-4996-93D1-28EE776BC777"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3DF09CAB-CA1B-428E-9A0B-AADACE9201A0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D99ED480-C206-48DD-9DF3-FC60D91B98A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DC515B6-27A3-4723-9792-2BA42EF63E44"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DEC0BBDA-FAE5-4AF7-81C8-83041A58E8E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A066E28-31B0-46C7-ABB8-F5D1F3A303C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8F536CC-29D6-401E-92C5-964FDBDCCE65"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9139593A-9414-488D-AA3A-5560C643587D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07BFB47E-F456-4782-98D7-68D02500FDD3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57F0D358-54BE-4A47-8B76-D23B5CCC4BE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.302:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33BEBE47-AF47-4994-871D-5969270EE5AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.303:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A27094E7-E6F3-47CA-A90A-86FEA2F1BE33"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D6D47A0-43A2-4F9F-830B-B2FB79E779A5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87E7B932-950A-4573-832F-8477FABA5929"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1711A70-5931-4C1F-B522-46AD2E5D7C51"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE41B8AE-8F1E-4116-BDDC-65B913AD448E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7EC80219-C760-4CA8-B360-7B6545F502C2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA93E21E-4D61-4CA5-ACF2-50C2A4F2C62C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.31:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F9E425CF-5773-4C17-B284-588DDCE8DE43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.097:*:*:*:*:*:*:*",
+ "matchCriteriaId": "34886EDF-1C10-4F57-A82D-FF1AF668E2C1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.099:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D7B3B10-6936-4352-9EE7-561BB1918769"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.929:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EB69F8B-67CB-4296-893A-7A35B155EBEA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.3.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "491BD04C-85BE-4766-9965-59744D2639CE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "545F75A3-451C-4993-98AE-51C23EF49927"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1BB0DD6B-6C4D-4FF4-97AB-815A4566320F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D144CB1-0AD1-4C8A-A709-52C26965675F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1038B545-CD2F-4338-AFE0-35D7ED6D20BB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "482DC851-7E33-4487-8219-6675091FD7C7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAFBFE36-6913-4122-A537-F2AA1562FE69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16DB9C4B-F828-482B-90BB-6633B2CD3393"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19F4011C-DB20-4866-8BE6-F539677E4C48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A693E125-8027-4482-AF78-5A4342D61274"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E8292733-EC96-4B99-8E56-7236D5320109"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCE6E7CD-856D-410E-A061-8CD9F0EA4791"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "039687D4-7A7C-464D-8011-FD66E651C297"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6475000-D552-4118-8C91-F999D4A67A4A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDBE88C-F71A-49FF-A6E6-9318BAEC4D2B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1598FA0A-1EAB-4588-9DD0-9F8F0C821189"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E44EDDB-3809-4192-BC7C-1D6B23B9F580"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97411227-9FCA-41AB-AB10-44525AC2D7E9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95B4A27A-B281-4850-9790-ADB31FC37C69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB09AD3E-07B1-4DE7-BA75-882D3CA47ACB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE0784F3-A3C2-486F-AE4A-8A5733D5B0E8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D2A6AD-E35E-4284-91E8-AA4FAFA790D5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08D7BAEC-18A0-4BA3-BA5A-3149A2656806"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AB8B95FD-A5B2-4EF9-AE89-05A6417DDD33"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "231EA8DA-4BD6-4ECD-B4BE-6C8AA286E3F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "434DD059-F5DF-487F-A3FF-A417ABF950EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D2A148EC-9137-4FE4-B363-9FEEE954D606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9EE297A8-4E64-48ED-AA3A-4BA798C4DA11"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DC362BA-6A95-485C-8B49-AA12898E6FFF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AF5A260-FB47-4C5C-AF74-7AB8B71F429E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8E5922B-DDD5-4A8A-A725-BBFB09D19AE0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94FE6BDD-1E18-455D-8237-06969516D04F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4683477E-D6BB-4369-AFC2-782FD8F3F28B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D2AA663C-B4CB-4804-A0A3-34673266D9D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "672F8B07-AC0A-429D-A9CF-5A95EB495A24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DE2B3AF-B15C-460E-B5E7-787AD499E1DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8A584DA-1488-466D-AF16-95C254179ABC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8D93607A-99AE-4DC1-9314-5425C2A335FB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F5F1CA43-C924-4419-91DB-F24D450CF630"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.45:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D9DC5F95-2B2C-4539-ADB2-AA73031A4128"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.46:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CE54844-715B-4492-B9A0-DA1D0A5981CB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.47:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4366495B-9D70-416A-A033-1379C24A690A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "310EAB40-8AEE-4E1E-BF0B-05F6F04E0B48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "329E2793-6824-48E9-8878-5D17E4B97358"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4628A095-15DD-4307-ADAE-08C10D9008C2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41084A4F-B8DA-4D33-820D-0992CD03C1ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50D93C58-0ABF-4D57-99CB-95AB4805CD9C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.21:*:*:*:*:*:*:*",
+ "matchCriteriaId": "40D45591-93DC-4EF0-9E0A-2F7F270E2403"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD78F8C-B1D3-49ED-8017-2E906C332D82"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7EBF7D1-0C77-4F95-84FD-56EFD7524463"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4790622C-6D8A-4D2B-9E9E-6AC60AA4FB1A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "685C7CB4-9536-4112-B08D-25B7C026521F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E84754C7-6517-4E68-A1FB-A49E9B1AB001"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "41E6E2A7-B36F-4722-A1F9-42D377548F96"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47CEC7FB-2AFD-4520-B0D2-BC453CFED93F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.11:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4878A80-9403-44EA-95E8-B5A550867DFE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.13:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD6C1648-7F63-47C3-A3C0-989E575DD20C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55B99428-019F-4AE8-AEE6-91E52AE62AD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6DC1BC44-F0A7-4C51-88FE-014BBFEDCFD7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "48A5780D-610E-4EED-A80D-4D17C2360CA0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6F38AB7-00C9-4AFF-B254-9EE5CE29C21B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7768FC87-5FEC-445B-9BA7-7EB80AF6346D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-lfi-OWLbKUGe",
+ "source": "ykramarz@cisco.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20273.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20273.json
new file mode 100644
index 00000000000..81110aeeb85
--- /dev/null
+++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20273.json
@@ -0,0 +1,51 @@
+{
+ "id": "CVE-2023-20273",
+ "sourceIdentifier": "ykramarz@cisco.com",
+ "published": "2023-10-25T18:17:23.017",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "cisaExploitAdd": "2023-10-23",
+ "cisaActionDue": "2023-10-27",
+ "cisaRequiredAction": "Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instructions. For affected products (Cisco IOS XE Web UI exposed to the internet or to untrusted networks), follow vendor instructions to determine if a system may have been compromised and immediately report positive findings to CISA.",
+ "cisaVulnerabilityName": "Cisco IOS XE Web UI Command Injection Vulnerability",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands with the privileges of root.\r\n\r This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en la funci\u00f3n de interfaz de usuario web del software Cisco IOS XE podr\u00eda permitir que un atacante remoto autenticado inyecte comandos con privilegios de root. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando datos manipulados a la interfaz de usuario web. Un exploit exitoso podr\u00eda permitir al atacante inyectar comandos al sistema operativo subyacente con privilegios de root."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ykramarz@cisco.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z",
+ "source": "ykramarz@cisco.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json
index ade21881a43..cd270cdc19c 100644
--- a/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json
+++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-20588",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-08-08T18:15:11.653",
- "lastModified": "2023-10-12T03:15:09.277",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:11.817",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -990,6 +990,10 @@
"url": "http://xenbits.xen.org/xsa/advisory-439.html",
"source": "psirt@amd.com"
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "psirt@amd.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/",
"source": "psirt@amd.com"
diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20598.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20598.json
new file mode 100644
index 00000000000..d5c7924203b
--- /dev/null
+++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20598.json
@@ -0,0 +1,669 @@
+{
+ "id": "CVE-2023-20598",
+ "sourceIdentifier": "psirt@amd.com",
+ "published": "2023-10-17T14:15:09.813",
+ "lastModified": "2023-10-28T03:31:07.843",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una gesti\u00f3n de privilegios inadecuada en el controlador de gr\u00e1ficos AMD Radeon\u2122 puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones f\u00edsicas arbitrarias, lo que resulta en una posible ejecuci\u00f3n de c\u00f3digo arbitrario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
+ "versionEndExcluding": "23.9.2",
+ "matchCriteriaId": "7162DB91-6B5C-4575-A8D0-B83B34908BE5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2BB37AAC-3957-4840-B47E-ED678F0B6044"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA1DA067-DE94-4663-91CD-A70CC386D45A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
+ "versionEndExcluding": "23.q4",
+ "matchCriteriaId": "2841E9B4-728C-4201-AAF1-3250A1DC08F3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CFF5CD86-64D3-4F02-9971-AC50E8052986"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
+ "versionEndExcluding": "23.9.2",
+ "matchCriteriaId": "7162DB91-6B5C-4575-A8D0-B83B34908BE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
+ "versionEndExcluding": "23.q4",
+ "matchCriteriaId": "2841E9B4-728C-4201-AAF1-3250A1DC08F3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "48F04B9F-8C65-476B-B5D8-18CC96E3B712"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "495E436C-B0EE-4B72-AB49-332F4752C140"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C4FDE72-050C-4A72-A4F4-9C1D5273CADD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1232B034-1214-4F9A-823D-DC76D5C5956B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0870FBE4-92B4-4717-88B0-EC1094268034"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE36D471-57BF-4385-A825-029F7313E4DB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "082BE536-F29C-4A73-B030-A19DD3A448B3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6740A06F-4512-427D-9CB9-A4A6DB046BA3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C05D51F-469D-487D-9FC8-E1AD699A6F74"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BC5E111-A7AA-4A45-A2E3-47013F9135D4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB5D5B25-F32A-493E-BD54-57098981E15A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E3657C6-1047-4CA9-8D44-C7143F7D877D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D2787C72-42D5-42B0-BE5B-E548B319BCF4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76121981-8DC2-4779-833E-4B15CFCF7FC3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "225E8405-04FF-4885-92C8-8581ACC66E06"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D50E8EA-ECB2-463D-BA51-D13CF5A02266"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69289284-2ED2-4D8B-8AE2-B835AAF31EAD"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA6CD984-A8C7-4B23-8FF9-896C503EBA37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D2D0429F-F186-4F78-9AE0-574E3A39926D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8480A7E0-882C-4B03-ADBC-697304B0B7C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD27234D-ACFC-4144-8980-2B706822C579"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5602B902-9FDB-4946-BE4C-236262285F2F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA666DF3-C5F3-4127-A8EE-B784DD41F642"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86CAA682-9666-4929-B1AC-D9DB3109DB1A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A7E6806-A7AC-4C96-960B-B8934CEA2439"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74DD4A40-B712-4B54-9CC7-0BFD79E917BA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82CCEE11-392D-4486-A6AD-CB64FB8B7081"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F05C8669-6348-4A1B-B1D4-D22022E1F67E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "018A02C9-2A5C-43E2-8CCD-4D03C119C22B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3DE32CA-168F-4812-AEAE-D771EB01E15D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009",
+ "source": "psirt@amd.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json
index 3b4eb44e8d2..42c2c982406 100644
--- a/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json
+++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-20900",
"sourceIdentifier": "security@vmware.com",
"published": "2023-08-31T10:15:08.247",
- "lastModified": "2023-10-13T22:15:09.960",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-27T12:15:08.507",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -168,6 +168,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/27/1",
+ "source": "security@vmware.com"
+ },
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00000.html",
"source": "security@vmware.com"
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2002.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2002.json
index 895e78487a4..bf457947823 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2002.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2002.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2002",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-26T17:15:14.113",
- "lastModified": "2023-08-19T18:15:25.257",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:12.393",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -79,6 +79,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "secalert@redhat.com"
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2007.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2007.json
index 0364366d811..3bea702cc1a 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2007.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2007.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2007",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-04-24T23:15:18.877",
- "lastModified": "2023-08-19T18:15:40.893",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:12.483",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -86,6 +86,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "secalert@redhat.com"
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2033.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2033.json
index 1eb5120c6df..f5d666326ed 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2033.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2033.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2033",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-14T19:15:09.453",
- "lastModified": "2023-09-30T11:15:13.787",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:51:57.363",
+ "vulnStatus": "Analyzed",
"cisaExploitAdd": "2023-04-17",
"cisaActionDue": "2023-05-08",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@@ -81,6 +81,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,31 +126,52 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5390",
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json
index 805055a6b4f..c83aa47a5b4 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2091",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T09:15:07.683",
- "lastModified": "2023-04-24T17:25:24.283",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-22T15:15:08.277",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in KylinSoft youker-assistant. Affected by this vulnerability is the function adjust_cpufreq_scaling_governer. The manipulation leads to os command injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.4.13 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226099."
+ "value": "A vulnerability classified as critical was found in KylinSoft youker-assistant on KylinOS. Affected by this vulnerability is the function adjust_cpufreq_scaling_governer. The manipulation leads to os command injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.4.13 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226099."
}
],
"metrics": {
@@ -39,20 +39,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.0",
- "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
- "confidentialityImpact": "LOW",
- "integrityImpact": "LOW",
- "availabilityImpact": "LOW",
- "baseScore": 5.3,
- "baseSeverity": "MEDIUM"
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
- "impactScore": 3.4
+ "impactScore": 5.9
}
],
"cvssMetricV2": [
@@ -61,18 +61,18 @@
"type": "Secondary",
"cvssData": {
"version": "2.0",
- "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
+ "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
- "confidentialityImpact": "PARTIAL",
- "integrityImpact": "PARTIAL",
- "availabilityImpact": "PARTIAL",
- "baseScore": 4.3
+ "confidentialityImpact": "COMPLETE",
+ "integrityImpact": "COMPLETE",
+ "availabilityImpact": "COMPLETE",
+ "baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
- "impactScore": 6.4,
+ "impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
@@ -120,6 +120,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://kylinos.cn/support/loophole/patch/3375.html",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://vuldb.com/?ctiid.226099",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2098.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2098.json
index 2e290b48f83..e8100dc53a0 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2098.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2098.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T12:15:07.337",
- "lastModified": "2023-04-24T18:19:32.117",
+ "lastModified": "2023-10-18T15:58:38.623",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -102,8 +102,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "B71872FF-70AC-422D-9FA4-3EB30246660F"
+ "criteria": "cpe:2.3:a:oretnom23:vehicle_service_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49085F69-097C-4C7A-A470-9B946EBE8123"
}
]
}
diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21255.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21255.json
index 901a970115a..3b7b309461a 100644
--- a/CVE-2023/CVE-2023-212xx/CVE-2023-21255.json
+++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21255.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-21255",
"sourceIdentifier": "security@android.com",
"published": "2023-07-13T00:15:24.053",
- "lastModified": "2023-08-19T18:15:23.347",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:12.217",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -75,6 +75,10 @@
"Patch"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "security@android.com"
+ },
{
"url": "https://source.android.com/security/bulletin/2023-07-01",
"source": "security@android.com",
diff --git a/CVE-2023/CVE-2023-214xx/CVE-2023-21400.json b/CVE-2023/CVE-2023-214xx/CVE-2023-21400.json
index 76ab9837262..86847c2c92e 100644
--- a/CVE-2023/CVE-2023-214xx/CVE-2023-21400.json
+++ b/CVE-2023/CVE-2023-214xx/CVE-2023-21400.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-21400",
"sourceIdentifier": "security@android.com",
"published": "2023-07-13T00:15:24.340",
- "lastModified": "2023-10-11T19:15:09.927",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-26T18:20:32.370",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -61,12 +61,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
- "source": "security@android.com"
+ "source": "security@android.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/07/14/2",
@@ -95,7 +119,18 @@
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/07/25/7",
- "source": "security@android.com"
+ "source": "security@android.com",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "security@android.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2023-07-01",
@@ -106,7 +141,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "security@android.com"
+ "source": "security@android.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-214xx/CVE-2023-21413.json b/CVE-2023/CVE-2023-214xx/CVE-2023-21413.json
index 7f00812aaee..ed5f623d2b1 100644
--- a/CVE-2023/CVE-2023-214xx/CVE-2023-21413.json
+++ b/CVE-2023/CVE-2023-214xx/CVE-2023-21413.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-21413",
"sourceIdentifier": "product-security@axis.com",
"published": "2023-10-16T07:15:08.503",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:29:36.640",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "GoSecure on behalf of Genetec Inc. has found a flaw that allows for a remote code execution during the installation of ACAP applications on the Axis device. The application handling service in AXIS OS was vulnerable to command injection allowing an attacker to run arbitrary code. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.\n"
+ },
+ {
+ "lang": "es",
+ "value": "GoSecure en nombre de Genetec Inc. ha encontrado una falla que permite la ejecuci\u00f3n remota de c\u00f3digo durante la instalaci\u00f3n de aplicaciones ACAP en el dispositivo Axis. El servicio de manejo de aplicaciones en AXIS OS era vulnerable a la inyecci\u00f3n de comandos, lo que permit\u00eda a un atacante ejecutar c\u00f3digo arbitrario. Axis ha lanzado versiones parcheadas del sistema operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener m\u00e1s informaci\u00f3n y soluciones."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ },
{
"source": "product-security@axis.com",
"type": "Secondary",
@@ -34,10 +58,51 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-77"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:lts:*:*:*",
+ "versionStartIncluding": "10.5.0",
+ "versionEndExcluding": "10.12.199",
+ "matchCriteriaId": "52104F8A-D15A-4D29-BFA6-8AC4761B2808"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*",
+ "versionStartIncluding": "11.0.89",
+ "versionEndExcluding": "11.6.94",
+ "matchCriteriaId": "90BE6B96-8C89-4EAC-BAA8-A1D5C1D51648"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.axis.com/dam/public/ad/ff/83/cve-2023-21413pdf-en-US-412755.pdf",
- "source": "product-security@axis.com"
+ "source": "product-security@axis.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-214xx/CVE-2023-21414.json b/CVE-2023/CVE-2023-214xx/CVE-2023-21414.json
index 799b9179306..aa687150416 100644
--- a/CVE-2023/CVE-2023-214xx/CVE-2023-21414.json
+++ b/CVE-2023/CVE-2023-214xx/CVE-2023-21414.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-21414",
"sourceIdentifier": "product-security@axis.com",
"published": "2023-10-16T07:15:08.680",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:31:53.573",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "NCC Group has found a flaw during the annual internal penetration test ordered by Axis Communications. The protection for device tampering (commonly known as Secure Boot) contains a flaw which provides an opportunity for a sophisticated attack to bypass this protection. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
+ },
+ {
+ "lang": "es",
+ "value": "NCC Group ha encontrado una falla durante la prueba de penetraci\u00f3n interna anual solicitada por Axis Communications. La protecci\u00f3n contra la manipulaci\u00f3n de dispositivos (com\u00fanmente conocida como Arranque Seguro) contiene una falla que brinda la oportunidad de que un ataque sofisticado eluda esta protecci\u00f3n. Axis ha lanzado versiones parcheadas del Sistema Operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener m\u00e1s informaci\u00f3n y soluciones."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
+ },
{
"source": "product-security@axis.com",
"type": "Secondary",
@@ -34,10 +58,282 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.11.55",
+ "versionEndExcluding": "10.12.206",
+ "matchCriteriaId": "A57EAA0B-F777-491D-8CA0-3946AE128F8A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*",
+ "versionStartIncluding": "11.0.89",
+ "versionEndExcluding": "11.6.94",
+ "matchCriteriaId": "90BE6B96-8C89-4EAC-BAA8-A1D5C1D51648"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:m3215:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CCF92600-C422-4EAD-9832-59940D509E35"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:m3216:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FD56A2A-788C-4168-AFF8-403D0CDEB056"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:m4317-plve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FF3E4C56-DF16-4954-BFAB-B877B417DC67"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:m4318-plve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CEBA6BAB-84F8-4990-9F69-D2164AA41413"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:m4327-p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D2A8EB07-E3C5-4752-ACF1-42A34CF8481C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:m4328-p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CD842CE-5408-4DC3-8047-4E3A55B1253C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p1467-le:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A678D824-2504-4C95-910D-3EE27F71278B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p1468-le:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33BA6000-C024-4B45-8449-ADE57233B593"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p1468-xle:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6313E41C-6087-437D-9AE9-73A853EE4C48"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p3265-lv:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52E2F23C-D61D-4A40-B9F9-7DE0740A743D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p3265-lve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8E96AFC9-5D17-469E-A120-F8D25BA3D3A2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p3265-v:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A761F9E-DDEB-43B5-BE2D-54B1BD3207DB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p3267-lv:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4724987B-2077-4598-B179-ECAAD3646793"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p3267-lve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "68DC7D03-7348-4641-8109-A610D8F586DF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p3268-lv:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E8457180-29F6-4742-A1C8-EFB3D511B6EC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p3268-lve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B022EF0-E531-4F82-8E03-B46414555A9A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p3827-pve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8E566446-B3C7-4D03-9FA5-D999C10183B0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p4705-plve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0624855-756A-40A9-91BF-DE8C0EC355D6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:p4707-plve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E10F52AE-C6D7-4E10-B496-18CCF617FB69"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q1656:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "74D4E995-4C85-4E94-B18B-044C6D95490C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q1656-b:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "68062F65-BAF1-45CC-8515-9747C6FDF42B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q1656-be:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9D52CD5-4E62-4B7F-81B1-7A37620BEABF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q1656-ble:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "985DA048-28F6-413D-A611-297993B178BE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q1656-dle:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76D5EF68-F3F3-4ABD-A139-D1823CE0F92C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q1656-le:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1129AC4-1953-4B50-90CC-50D2E4D9AB39"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q1961-te:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BBDE1252-B9A9-4876-9BA3-5D1AFB5B2E72"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q2101-te:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5C9586E-9B12-4C45-9F89-A6116493D4DE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q3536-lve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86575D32-774E-4611-87B3-5B3A3A4B59AA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q3538-lve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9EF429DC-1F90-4942-9A97-F93AEF866B0B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q3626-ve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "989BC60B-79F9-4650-AAA2-4787D6477B1C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q3628-ve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0374F956-C9D1-4D9B-AEEA-4F1103EAA9CA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:xfq1656:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C60CBB3A-0242-4AE7-909E-37EF99C6E136"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*",
+ "versionEndExcluding": "11.6.94",
+ "matchCriteriaId": "1F2CD512-C82D-454A-B322-BBD93EF7E85C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:a8207-ve_mk_ii:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB61500A-D634-436C-8BE9-00CEEC301B55"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.11.55",
+ "versionEndExcluding": "10.12.206",
+ "matchCriteriaId": "A57EAA0B-F777-491D-8CA0-3946AE128F8A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*",
+ "versionStartIncluding": "11.0.89",
+ "versionEndExcluding": "11.6.94",
+ "matchCriteriaId": "90BE6B96-8C89-4EAC-BAA8-A1D5C1D51648"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:axis:q3527-lve:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7C7601D7-8413-49DF-AFCC-1C7851A1B41A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.axis.com/dam/public/45/3c/a1/cve-2023-21414pdf-en-US-412758.pdf",
- "source": "product-security@axis.com"
+ "source": "product-security@axis.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-214xx/CVE-2023-21415.json b/CVE-2023/CVE-2023-214xx/CVE-2023-21415.json
index 1569a4b57f4..e6b04138543 100644
--- a/CVE-2023/CVE-2023-214xx/CVE-2023-21415.json
+++ b/CVE-2023/CVE-2023-214xx/CVE-2023-21415.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-21415",
"sourceIdentifier": "product-security@axis.com",
"published": "2023-10-16T07:15:08.760",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:19:06.067",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API overlay_del.cgi is vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. \n"
+ },
+ {
+ "lang": "es",
+ "value": "Sandro Poppi, miembro del programa AXIS OS Bug Bounty, descubri\u00f3 que la API VAPIX overlay_del.cgi es vulnerable a ataques de Path Traversal que permiten la eliminaci\u00f3n de archivos. Esta falla solo puede explotarse despu\u00e9s de autenticarse con una cuenta de servicio con privilegios de operador o administrador. Axis ha lanzado versiones parcheadas del Sistema Operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener m\u00e1s informaci\u00f3n y soluciones."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ },
{
"source": "product-security@axis.com",
"type": "Secondary",
@@ -34,10 +58,76 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:-:*:*:*",
+ "versionStartIncluding": "6.50.5.3",
+ "versionEndExcluding": "6.50.5.14",
+ "matchCriteriaId": "F0C843A9-2BA5-4E3F-85D9-D9D2C65B7BAA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*",
+ "versionStartIncluding": "11.0.81",
+ "versionEndExcluding": "11.6.94",
+ "matchCriteriaId": "09CFB55B-2098-478D-A6AE-A200F2EC42BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os_2016:*:*:*:*:lts:*:*:*",
+ "versionStartIncluding": "6.50.2",
+ "versionEndExcluding": "6.50.5.2",
+ "matchCriteriaId": "0E3843E2-4943-440F-99E9-8026C9818596"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os_2018:*:*:*:*:lts:*:*:*",
+ "versionEndExcluding": "8.40.35",
+ "matchCriteriaId": "A714346C-6398-46ED-81F0-5546B00A2DEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:*",
+ "versionEndExcluding": "9.80.47",
+ "matchCriteriaId": "8AFCB4A6-3BFD-48CF-A84B-0D83DB101BBC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:*",
+ "versionEndExcluding": "10.12.206",
+ "matchCriteriaId": "4E686725-735A-47FC-87F1-A1899A916315"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
- "url": "https://www.axis.com/dam/public/58/0b/36/cve-2023-21415pdf-en-US-412759.pdf",
- "source": "product-security@axis.com"
+ "url": "https://www.axis.com/dam/public/b6/55/e2/cve-2023-21415pdf-en-US-416245.pdf",
+ "source": "product-security@axis.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21720.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21720.json
index 8935fbe75d1..40f89af2c18 100644
--- a/CVE-2023/CVE-2023-217xx/CVE-2023-21720.json
+++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21720.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-21720",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-02-14T20:15:14.590",
- "lastModified": "2023-09-30T11:15:13.077",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:52:56.590",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -75,7 +75,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21739.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21739.json
index db8a8969846..ed146901803 100644
--- a/CVE-2023/CVE-2023-217xx/CVE-2023-21739.json
+++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21739.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-21739",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-01-10T22:15:17.727",
- "lastModified": "2023-04-27T19:15:14.513",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T18:30:09.020",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -123,36 +123,6 @@
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.2486:*:*:*:*:*:x86:*",
"matchCriteriaId": "730D9CA9-A32B-4F27-97C8-1286100FB23A"
},
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19044.2486:*:*:*:*:*:arm64:*",
- "matchCriteriaId": "BC00AF07-310F-4EDC-A045-CF24804C28A3"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19044.2486:*:*:*:*:*:x64:*",
- "matchCriteriaId": "A836BB66-835B-4518-9B4A-C220B5749CB4"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19044.2486:*:*:*:*:*:x86:*",
- "matchCriteriaId": "A33694E0-10DE-4836-B3FC-25C38C793C4E"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19045.2486:*:*:*:*:*:arm64:*",
- "matchCriteriaId": "F6B88FE3-7E5F-4928-8801-227A040A168D"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19045.2486:*:*:*:*:*:x64:*",
- "matchCriteriaId": "32200A4E-5E11-4CF8-9916-514365FD91D5"
- },
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19045.2486:*:*:*:*:*:x86:*",
- "matchCriteriaId": "A1693F27-C4C6-49C5-978E-3608D0A0404F"
- },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:10.0.19042.2486:*:*:*:*:*:arm64:*",
@@ -223,6 +193,11 @@
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2486:*:*:*:*:*:arm64:*",
"matchCriteriaId": "EBF07ADF-112F-4BE6-9F76-8720A3325316"
},
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2486:*:*:*:*:*:x64:*",
+ "matchCriteriaId": "20B9E184-BF28-4BCD-B05E-29C53953184D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2486:*:*:*:*:*:x86:*",
diff --git a/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json b/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json
index fe86971434c..e7dade64956 100644
--- a/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json
+++ b/CVE-2023/CVE-2023-217xx/CVE-2023-21794.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-21794",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-02-14T20:15:14.950",
- "lastModified": "2023-09-30T11:15:13.207",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:53:40.490",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -75,7 +75,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21920.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21920.json
index fd216d8ec6c..d7930fc4583 100644
--- a/CVE-2023/CVE-2023-219xx/CVE-2023-21920.json
+++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21920.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-21920",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2023-04-18T20:15:13.160",
- "lastModified": "2023-09-16T04:15:21.113",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-29T02:35:08.027",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Servidor: Optimizador). Las versiones compatibles que se ven afectadas son la 8.0.32 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
}
],
"metrics": {
@@ -63,24 +67,99 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
+ "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
+ "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/",
- "source": "secalert_us@oracle.com"
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/",
- "source": "secalert_us@oracle.com"
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/",
- "source": "secalert_us@oracle.com"
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
- "source": "secalert_us@oracle.com"
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21967.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21967.json
index 098c41ad8fe..bfb49adbf61 100644
--- a/CVE-2023/CVE-2023-219xx/CVE-2023-21967.json
+++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21967.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-21967",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2023-04-18T20:15:16.397",
- "lastModified": "2023-09-19T11:16:02.327",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:22:35.987",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -111,24 +111,97 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7EF6650C-558D-45C8-AE7D-136EE70CB6D7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25FA7A4D-B0E2-423E-8146-E221AE2D6120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B199052-5732-4726-B06B-A12C70DFB891"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html",
- "source": "secalert_us@oracle.com"
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230427-0008/",
- "source": "secalert_us@oracle.com"
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5430",
- "source": "secalert_us@oracle.com"
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5478",
- "source": "secalert_us@oracle.com"
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2023.html",
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2100.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2100.json
index 2a24559abdb..58bdf5b1582 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2100.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2100.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T13:15:45.033",
- "lastModified": "2023-04-24T18:19:04.477",
+ "lastModified": "2023-10-18T15:58:16.407",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -102,8 +102,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "B71872FF-70AC-422D-9FA4-3EB30246660F"
+ "criteria": "cpe:2.3:a:oretnom23:vehicle_service_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49085F69-097C-4C7A-A470-9B946EBE8123"
}
]
}
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json
index 3d85aedc0e4..cfb5df6aec4 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2124",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-15T22:15:12.150",
- "lastModified": "2023-08-19T18:15:45.500",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:12.810",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -83,6 +83,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20230622-0010/",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2133.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2133.json
index c5322c16acf..7f47c852d4b 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2133.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2133.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2133",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-19T04:15:31.360",
- "lastModified": "2023-09-30T11:15:13.873",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:52:37.440",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -73,7 +73,17 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
- },
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
@@ -120,7 +130,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/",
@@ -133,8 +146,7 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Mailing List",
- "Third Party Advisory"
+ "Mailing List"
]
},
{
@@ -146,11 +158,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5393",
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2134.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2134.json
index da9b716a3eb..bcfcd169bdb 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2134.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2134.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2134",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-19T04:15:31.473",
- "lastModified": "2023-09-30T11:15:13.953",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:52:47.177",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -73,7 +73,17 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
- },
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
@@ -120,7 +130,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/",
@@ -133,8 +146,7 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Mailing List",
- "Third Party Advisory"
+ "Mailing List"
]
},
{
@@ -146,11 +158,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5393",
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2135.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2135.json
index d7a183c28a9..86e99f315b5 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2135.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2135.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2135",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-19T04:15:31.533",
- "lastModified": "2023-09-30T11:15:14.033",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:53:18.983",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -73,7 +73,17 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
- },
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
@@ -120,7 +130,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/",
@@ -133,8 +146,7 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Mailing List",
- "Third Party Advisory"
+ "Mailing List"
]
},
{
@@ -146,11 +158,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5393",
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2136.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2136.json
index c1846093c06..5739018d62c 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2136.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2136.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2136",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-19T04:15:31.607",
- "lastModified": "2023-09-30T11:15:14.107",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:54:42.007",
+ "vulnStatus": "Analyzed",
"cisaExploitAdd": "2023-04-21",
"cisaActionDue": "2023-05-12",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@@ -77,7 +77,17 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
- },
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
@@ -124,7 +134,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/",
@@ -137,8 +150,7 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Mailing List",
- "Third Party Advisory"
+ "Mailing List"
]
},
{
@@ -150,11 +162,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5393",
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2137.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2137.json
index 1366392dfe3..0d6305bb3d4 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2137.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2137.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2137",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-19T04:15:31.667",
- "lastModified": "2023-09-30T11:15:14.170",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:54:45.597",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -73,7 +73,17 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
- },
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
@@ -120,7 +130,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/",
@@ -133,7 +146,7 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/",
"source": "chrome-cve-admin@google.com",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
@@ -145,11 +158,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5393",
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22015.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22015.json
new file mode 100644
index 00000000000..bdb9ba06061
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22015.json
@@ -0,0 +1,92 @@
+{
+ "id": "CVE-2023-22015",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:11.587",
+ "lastModified": "2023-10-27T15:15:09.723",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.42 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles que se ven afectadas son la 5.7.42 y anteriores y la 8.0.31 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.0.0",
+ "versionEndIncluding": "5.7.42",
+ "matchCriteriaId": "C5FC5A8D-D1AC-4F6F-AA01-F6244DC44785"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.31",
+ "matchCriteriaId": "3BC9BB67-519D-4F2D-8E50-BB58B08824A8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22019.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22019.json
new file mode 100644
index 00000000000..acfde120792
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22019.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-22019",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:11.747",
+ "lastModified": "2023-10-23T18:19:21.580",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle HTTP Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle HTTP Server de Oracle Fusion Middleware (componente: Web Listener). La versi\u00f3n compatible afectada es 12.2.1.4.0. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP comprometer Oracle HTTP Server. Los ataques exitosos de esta vulnerabilidad pueden resultar en un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle HTTP Server. CVSS 3.1 Puntaje base 7.5 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AD04BEE5-E9A8-4584-A68C-0195CE9C402C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22025.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22025.json
new file mode 100644
index 00000000000..5fecd15367b
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22025.json
@@ -0,0 +1,119 @@
+{
+ "id": "CVE-2023-22025",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:11.837",
+ "lastModified": "2023-10-27T15:15:09.823",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u381-perf, 17.0.8, 21; Oracle GraalVM for JDK: 17.0.8 and 21. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM para JDK de Oracle Java SE (componente: Hotspot). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u381-perf, 17.0.8, 21; Oracle GraalVM para JDK: 17.0.8 y 21. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle Java SE, Oracle GraalVM Enterprise Edition y Oracle GraalVM para JDK. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado una actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada del acceso a algunos de los datos accesibles de Oracle Java SE, Oracle GraalVM Enterprise Edition y Oracle GraalVM para JDK. Nota: Esta vulnerabilidad se puede aprovechar utilizando API en el componente especificado, por ejemplo, a trav\u00e9s de un servicio web que proporciona datos a las API. Esta vulnerabilidad tambi\u00e9n se aplica a las implementaciones de Java, generalmente en clientes que ejecutan aplicaciones Java Web Start en un espacio aislado o subprogramas de Java en un espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. CVSS 3.1 Puntaje base 3.7 (Impactos en la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.7,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5A01042-97E8-483B-BBE2-C9A968423FCD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:21:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3DAC838A-1E97-4D12-9CA9-4593D61CF9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update381:*:*:enterprise_performance_pack:*:*:*",
+ "matchCriteriaId": "1280B8AA-B341-42DC-BA23-4DD970970570"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jdk:17.0.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D07E25C0-81ED-4DA9-85D3-CF2C758D25D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jdk:21.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89511E56-D9E1-46D2-A591-EEC11A4194B2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update381:*:*:enterprise_performance_pack:*:*:*",
+ "matchCriteriaId": "54EEB032-9164-49FB-97CB-728A64C43495"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jre:17.0.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25D40D36-9C91-49AB-9120-97A867715E20"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jre:21.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B331904-AF1B-4C47-A664-A257CB16DDEB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0006/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22026.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22026.json
new file mode 100644
index 00000000000..bccfc444054
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22026.json
@@ -0,0 +1,93 @@
+{
+ "id": "CVE-2023-22026",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:11.927",
+ "lastModified": "2023-10-27T15:15:09.937",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.42 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles que se ven afectadas son la 5.7.42 y anteriores y la 8.0.31 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.0.0",
+ "versionEndIncluding": "5.7.42",
+ "matchCriteriaId": "C5FC5A8D-D1AC-4F6F-AA01-F6244DC44785"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.31",
+ "matchCriteriaId": "3BC9BB67-519D-4F2D-8E50-BB58B08824A8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22028.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22028.json
new file mode 100644
index 00000000000..f8996ffb534
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22028.json
@@ -0,0 +1,93 @@
+{
+ "id": "CVE-2023-22028",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.003",
+ "lastModified": "2023-10-27T15:15:10.027",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.43 and prior and 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles que se ven afectadas son la 5.7.43 y anteriores y la 8.0.31 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.0.0",
+ "versionEndIncluding": "5.7.43",
+ "matchCriteriaId": "37480528-9BD2-4EBE-8F1D-D12CC919982A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.31",
+ "matchCriteriaId": "3BC9BB67-519D-4F2D-8E50-BB58B08824A8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22029.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22029.json
new file mode 100644
index 00000000000..dcea177d930
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22029.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-22029",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.087",
+ "lastModified": "2023-10-23T18:53:16.700",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Commerce Guided Search product of Oracle Commerce (component: Workbench). The supported version that is affected is 11.3.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Guided Search. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Commerce Guided Search, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Commerce Guided Search accessible data as well as unauthorized read access to a subset of Oracle Commerce Guided Search accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Commerce Guided Search de Oracle Commerce (componente: Workbench). La versi\u00f3n compatible afectada es la 11.3.2. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP comprometa la b\u00fasqueda guiada de Oracle Commerce. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en la b\u00fasqueda guiada de Oracle Commerce, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado una actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada del acceso a algunos de los datos accesibles de Oracle Commerce Guided Search, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Commerce Guided Search. CVSS 3.1 Puntaje base 6.1 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A3622F5-5976-4BBC-A147-FC8A6431EA79"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22032.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22032.json
new file mode 100644
index 00000000000..417df3134fa
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22032.json
@@ -0,0 +1,91 @@
+{
+ "id": "CVE-2023-22032",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.173",
+ "lastModified": "2023-10-27T15:15:10.117",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores y la 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22059.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22059.json
new file mode 100644
index 00000000000..c08fe9b2bc3
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22059.json
@@ -0,0 +1,91 @@
+{
+ "id": "CVE-2023-22059",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.243",
+ "lastModified": "2023-10-27T15:15:10.203",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores y la 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntaje base 6.5 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22064.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22064.json
new file mode 100644
index 00000000000..0121eac7863
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22064.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-22064",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.320",
+ "lastModified": "2023-10-27T15:15:10.293",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22065.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22065.json
new file mode 100644
index 00000000000..bc3b4795f68
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22065.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-22065",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.397",
+ "lastModified": "2023-10-27T15:15:10.367",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles que se ven afectadas son la 8.0.33 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.33",
+ "matchCriteriaId": "44F51EF6-9993-4D49-AB0C-7D8D8FB65A98"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22066.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22066.json
new file mode 100644
index 00000000000..3b3051cbccf
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22066.json
@@ -0,0 +1,91 @@
+{
+ "id": "CVE-2023-22066",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.467",
+ "lastModified": "2023-10-27T15:15:10.447",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores y la 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22067.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22067.json
new file mode 100644
index 00000000000..cfbfb3e8e53
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22067.json
@@ -0,0 +1,103 @@
+{
+ "id": "CVE-2023-22067",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.540",
+ "lastModified": "2023-10-28T03:15:08.010",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in Oracle Java SE (component: CORBA). Supported versions that are affected are Oracle Java SE: 8u381 and 8u381-perf. Easily exploitable vulnerability allows unauthenticated attacker with network access via CORBA to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en Oracle Java SE (componente: CORBA). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u381 y 8u381-perf. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante no autenticado con acceso a la red a trav\u00e9s de CORBA comprometer Oracle Java SE. Los ataques exitosos a esta vulnerabilidad pueden resultar en una actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada del acceso a algunos de los datos accesibles de Oracle Java SE. Nota: Esta vulnerabilidad solo se puede aprovechar proporcionando datos a las API en el componente especificado sin utilizar aplicaciones Java Web Start que no son de confianza o subprogramas de Java que no son de confianza, como a trav\u00e9s de un servicio web. CVSS 3.1 Puntaje base 5.3 (Impactos en la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update381:*:*:-:*:*:*",
+ "matchCriteriaId": "2950AC81-A9E7-4CC8-A20D-10AEAAD672D1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update381:*:*:enterprise_performance_pack:*:*:*",
+ "matchCriteriaId": "1280B8AA-B341-42DC-BA23-4DD970970570"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update381:*:*:-:*:*:*",
+ "matchCriteriaId": "9B5F1CAA-26EA-4558-BA69-51D0EB0726DE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update381:*:*:enterprise_performance_pack:*:*:*",
+ "matchCriteriaId": "54EEB032-9164-49FB-97CB-728A64C43495"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0006/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.debian.org/security/2023/dsa-5537",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22068.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22068.json
new file mode 100644
index 00000000000..e8e9e42c763
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22068.json
@@ -0,0 +1,90 @@
+{
+ "id": "CVE-2023-22068",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.617",
+ "lastModified": "2023-10-27T15:15:10.617",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores y la 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json
new file mode 100644
index 00000000000..05b16095ac9
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22069.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22069",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.687",
+ "lastModified": "2023-10-23T18:19:30.997",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware (componente: Core). Las versiones compatibles que se ven afectadas son 12.2.1.4.0 y 14.1.1.0.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante no autenticado con acceso a la red a trav\u00e9s de T3, IIOP comprometa Oracle WebLogic Server. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Oracle WebLogic Server. CVSS 3.1 Puntuaci\u00f3n base 9,8 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22070.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22070.json
new file mode 100644
index 00000000000..dd357c1a64f
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22070.json
@@ -0,0 +1,91 @@
+{
+ "id": "CVE-2023-22070",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.763",
+ "lastModified": "2023-10-27T15:15:10.697",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Servidor: Optimizador). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores y la 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22071.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22071.json
new file mode 100644
index 00000000000..44131261364
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22071.json
@@ -0,0 +1,89 @@
+{
+ "id": "CVE-2023-22071",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.837",
+ "lastModified": "2023-10-23T18:20:32.617",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the PL/SQL component of Oracle Database Server. Supported versions that are affected are 19.3-19.20 and 21.3-21.11. Easily exploitable vulnerability allows high privileged attacker having Create Session, Execute on sys.utl_http privilege with network access via Oracle Net to compromise PL/SQL. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PL/SQL, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PL/SQL accessible data as well as unauthorized read access to a subset of PL/SQL accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PL/SQL. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el componente PL/SQL de Oracle Database Server. Las versiones compatibles que se ven afectadas son 19.3-19.20 y 21.3-21.11. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con privilegios elevados que tenga privilegios de Create Session y ejecutar en sys.utl_http con acceso a la red a trav\u00e9s de Oracle Net comprometa PL/SQL. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en PL/SQL, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado una actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada de algunos datos accesibles de PL/SQL, as\u00ed como un acceso de lectura no autorizado a un subconjunto de datos accesibles de PL/SQL y la capacidad no autorizada de causar una denegaci\u00f3n parcial de servicio (parcial). DOS) de PL/SQL. CVSS 3.1 Puntuaci\u00f3n base 5,9 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "19.3",
+ "versionEndIncluding": "19.20",
+ "matchCriteriaId": "32E02E1D-EF08-47A1-9095-06F9F2D8D268"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "21.3",
+ "versionEndIncluding": "21.11",
+ "matchCriteriaId": "84088F94-42E8-4553-AE33-A5C4E954C83F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json
new file mode 100644
index 00000000000..16871d0b998
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22072.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-22072",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.910",
+ "lastModified": "2023-10-23T18:19:37.450",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware (componente: Core). La versi\u00f3n compatible afectada es 12.2.1.3.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante no autenticado con acceso a la red a trav\u00e9s de T3, IIOP comprometa Oracle WebLogic Server. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Oracle WebLogic Server. CVSS 3.1 Puntuaci\u00f3n base 9,8 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22073.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22073.json
new file mode 100644
index 00000000000..99606912571
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22073.json
@@ -0,0 +1,89 @@
+{
+ "id": "CVE-2023-22073",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:12.987",
+ "lastModified": "2023-10-23T18:20:40.147",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Notification Server component of Oracle Database Server. Supported versions that are affected are 19.3-19.20 and 21.3-21.11. Easily exploitable vulnerability allows unauthenticated attacker with access to the physical communication segment attached to the hardware where the Oracle Notification Server executes to compromise Oracle Notification Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Notification Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el componente Oracle Notification Server de Oracle Database Server. Las versiones compatibles que se ven afectadas son 19.3-19.20 y 21.3-21.11. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante no autenticado acceder al segmento de comunicaci\u00f3n f\u00edsica conectado al hardware donde se ejecuta Oracle Notification Server para comprometer Oracle Notification Server. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Notification Server. CVSS 3.1 Puntaje base 4.3 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "19.3",
+ "versionEndIncluding": "19.20",
+ "matchCriteriaId": "32E02E1D-EF08-47A1-9095-06F9F2D8D268"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "21.3",
+ "versionEndIncluding": "21.11",
+ "matchCriteriaId": "84088F94-42E8-4553-AE33-A5C4E954C83F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22074.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22074.json
new file mode 100644
index 00000000000..02d6aa7dcb4
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22074.json
@@ -0,0 +1,93 @@
+{
+ "id": "CVE-2023-22074",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.067",
+ "lastModified": "2023-10-26T17:15:08.393",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Database Sharding component of Oracle Database Server. Supported versions that are affected are 19.3-19.20 and 21.3-21.11. Easily exploitable vulnerability allows high privileged attacker having Create Session, Select Any Dictionary privilege with network access via Oracle Net to compromise Oracle Database Sharding. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Database Sharding. CVSS 3.1 Base Score 2.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el componente Oracle Database Sharding de Oracle Database Server. Las versiones compatibles que se ven afectadas son 19.3-19.20 y 21.3-21.11. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con altos privilegios tener privilegios de Create Session y seleccionar cualquier diccionario con acceso a la red a trav\u00e9s de Oracle Net para comprometer Oracle Database Sharding. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para causar una denegaci\u00f3n de servicio parcial (DOS parcial) de Oracle Database Sharding. CVSS 3.1 Puntuaci\u00f3n base 2.4 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 2.4,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "19.3",
+ "versionEndIncluding": "19.20",
+ "matchCriteriaId": "32E02E1D-EF08-47A1-9095-06F9F2D8D268"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "21.3",
+ "versionEndIncluding": "21.11",
+ "matchCriteriaId": "84088F94-42E8-4553-AE33-A5C4E954C83F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://packetstormsecurity.com/files/175352/Oracle-19c-21c-Sharding-Component-Password-Hash-Exposure.html",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22075.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22075.json
new file mode 100644
index 00000000000..4cb509c0626
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22075.json
@@ -0,0 +1,89 @@
+{
+ "id": "CVE-2023-22075",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.140",
+ "lastModified": "2023-10-23T18:23:12.413",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Database Sharding component of Oracle Database Server. Supported versions that are affected are 19.3-19.20 and 21.3-21.11. Easily exploitable vulnerability allows high privileged attacker having Create Session, Create Any View, Select Any Table privilege with network access via Oracle Net to compromise Oracle Database Sharding. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Database Sharding. CVSS 3.1 Base Score 2.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el componente Oracle Database Sharding de Oracle Database Server. Las versiones compatibles que se ven afectadas son 19.3-19.20 y 21.3-21.11. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios que tenga privilegios de Crear sesi\u00f3n, Crear cualquier vista, Seleccionar cualquier tabla con acceso a la red a trav\u00e9s de Oracle Net comprometa la fragmentaci\u00f3n de la base de datos de Oracle. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para causar una denegaci\u00f3n de servicio parcial (DOS parcial) de Oracle Database Sharding. CVSS 3.1 Puntuaci\u00f3n base 2.4 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 2.4,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "19.3",
+ "versionEndIncluding": "19.20",
+ "matchCriteriaId": "32E02E1D-EF08-47A1-9095-06F9F2D8D268"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "21.3",
+ "versionEndIncluding": "21.11",
+ "matchCriteriaId": "84088F94-42E8-4553-AE33-A5C4E954C83F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22076.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22076.json
new file mode 100644
index 00000000000..1070738c8b7
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22076.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22076",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.210",
+ "lastModified": "2023-10-23T18:21:06.347",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Personalization). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Applications Framework de Oracle E-Business Suite (componente: Personalization). Las versiones compatibles que se ven afectadas son 12.2.3-12.2.12. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP comprometa Oracle Applications Framework. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en Oracle Applications Framework, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle Applications Framework, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Applications Framework. CVSS 3.1 Puntaje base 6.1 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "12.2.3",
+ "versionEndIncluding": "12.2.12",
+ "matchCriteriaId": "A83DB7D1-1B29-4FFB-B11B-4BC0915AAB6D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22077.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22077.json
new file mode 100644
index 00000000000..c040d073382
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22077.json
@@ -0,0 +1,89 @@
+{
+ "id": "CVE-2023-22077",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.283",
+ "lastModified": "2023-10-23T18:20:48.253",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Database Recovery Manager component of Oracle Database Server. Supported versions that are affected are 19.3-19.20 and 21.3-21.11. Easily exploitable vulnerability allows high privileged attacker having DBA account privilege with network access via Oracle Net to compromise Oracle Database Recovery Manager. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Database Recovery Manager. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el componente Oracle Database Recovery Manager de Oracle Database Server. Las versiones compatibles que se ven afectadas son 19.3-19.20 y 21.3-21.11. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con privilegios elevados que tiene privilegios de cuenta DBA con acceso a la red a trav\u00e9s de Oracle Net comprometer Oracle Database Recovery Manager. Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para provocar un bloqueo o una falla frecuente (DOS completo) de Oracle Database Recovery Manager. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "19.3",
+ "versionEndIncluding": "19.20",
+ "matchCriteriaId": "32E02E1D-EF08-47A1-9095-06F9F2D8D268"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "21.3",
+ "versionEndIncluding": "21.11",
+ "matchCriteriaId": "84088F94-42E8-4553-AE33-A5C4E954C83F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22078.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22078.json
new file mode 100644
index 00000000000..364e504462e
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22078.json
@@ -0,0 +1,90 @@
+{
+ "id": "CVE-2023-22078",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.357",
+ "lastModified": "2023-10-27T15:15:10.787",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Servidor: Optimizer). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores y la 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22079.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22079.json
new file mode 100644
index 00000000000..804c954b410
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22079.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-22079",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.430",
+ "lastModified": "2023-10-27T15:15:10.873",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Servidor: Optimizer). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntaje base 6.5 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22080.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22080.json
new file mode 100644
index 00000000000..2932730a086
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22080.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22080",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.503",
+ "lastModified": "2023-10-23T18:51:20.057",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto PeopleSoft Enterprise PeopleTools de Oracle PeopleSoft (componente: PIA Core Technology). Las versiones compatibles que se ven afectadas son 8.59 y 8.60. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP comprometer PeopleSoft Enterprise PeopleTools. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en PeopleSoft Enterprise PeopleTools, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos a esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de PeopleSoft Enterprise PeopleTools, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de PeopleSoft Enterprise PeopleTools. CVSS 3.1 Puntaje base 6.1 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8AF00C6-B97F-414D-A8DF-057E6BFD8597"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.60:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF191D4F-3D54-4525-AAF5-B70D3FD2F818"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22081.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22081.json
new file mode 100644
index 00000000000..1302f97d73b
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22081.json
@@ -0,0 +1,143 @@
+{
+ "id": "CVE-2023-22081",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.573",
+ "lastModified": "2023-10-28T03:15:08.107",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf, 11.0.20, 17.0.8, 21; Oracle GraalVM for JDK: 17.0.8 and 21. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM para JDK de Oracle Java SE (componente: JSSE). Las versiones compatibles que se ven afectadas son Oracle Java SE: 8u381, 8u381-perf, 11.0.20, 17.0.8, 21; Oracle GraalVM para JDK: 17.0.8 y 21. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante no autenticado con acceso a la red a trav\u00e9s de HTTPS comprometer Oracle Java SE y Oracle GraalVM para JDK. Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para causar una Denegaci\u00f3n de Servicio parcial (DOS parcial) de Oracle Java SE, Oracle GraalVM para JDK. Nota: Esta vulnerabilidad se aplica a implementaciones de Java, generalmente en clientes que ejecutan aplicaciones Java Web Start en espacio aislado o subprogramas de Java en espacio aislado, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y dependen del entorno limitado de Java para su seguridad. Esta vulnerabilidad no se aplica a implementaciones de Java, normalmente en servidores, que cargan y ejecutan s\u00f3lo c\u00f3digo confiable (por ejemplo, c\u00f3digo instalado por un administrador). CVSS 3.1 Puntuaci\u00f3n base 5.3 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5A01042-97E8-483B-BBE2-C9A968423FCD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:21:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3DAC838A-1E97-4D12-9CA9-4593D61CF9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update381:*:*:-:*:*:*",
+ "matchCriteriaId": "2950AC81-A9E7-4CC8-A20D-10AEAAD672D1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update381:*:*:enterprise_performance_pack:*:*:*",
+ "matchCriteriaId": "1280B8AA-B341-42DC-BA23-4DD970970570"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jdk:11.0.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "40C0CB6C-5A35-45E8-A481-F437360F6B7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jdk:17.0.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D07E25C0-81ED-4DA9-85D3-CF2C758D25D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jdk:21.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89511E56-D9E1-46D2-A591-EEC11A4194B2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update381:*:*:-:*:*:*",
+ "matchCriteriaId": "9B5F1CAA-26EA-4558-BA69-51D0EB0726DE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update381:*:*:enterprise_performance_pack:*:*:*",
+ "matchCriteriaId": "54EEB032-9164-49FB-97CB-728A64C43495"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jre:11.0.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A824CA38-74B2-43FC-9C72-6CE37B97D59F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jre:17.0.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25D40D36-9C91-49AB-9120-97A867715E20"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:jre:21.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B331904-AF1B-4C47-A664-A257CB16DDEB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0006/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.debian.org/security/2023/dsa-5537",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22082.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22082.json
new file mode 100644
index 00000000000..451cec98aea
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22082.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22082",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.647",
+ "lastModified": "2023-10-25T14:29:30.697",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Pod Admin). Supported versions that are affected are 6.4.0.0.0 and 7.0.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Business Intelligence Enterprise Edition de Oracle Analytics (componente: Pod Admin). Las versiones compatibles que se ven afectadas son 6.4.0.0.0 y 7.0.0.0.0. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer Oracle Business Intelligence Enterprise Edition. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en Oracle Business Intelligence Enterprise Edition, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos a esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle Business Intelligence Enterprise Edition, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Puntaje base 5.4 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:business_intelligence:6.4.0.0.0:*:*:*:enterprise:*:*:*",
+ "matchCriteriaId": "EDBC994D-3FE6-4DEF-AE5C-26D2E3AD45BF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:enterprise:*:*:*",
+ "matchCriteriaId": "5412263F-C075-4D94-9807-CB895A63708D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22083.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22083.json
new file mode 100644
index 00000000000..b18d935d826
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22083.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22083",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.717",
+ "lastModified": "2023-10-23T18:50:28.727",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Enterprise Session Border Controller product of Oracle Communications (component: Web UI). Supported versions that are affected are 9.0-9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Enterprise Session Border Controller. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Session Border Controller accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Enterprise Session Border Controller de Oracle Communications (componente: Web UI). Las versiones compatibles que se ven afectadas son 9.0-9.2. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTPS comprometa Oracle Enterprise Session Border Controller. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Enterprise Session Border Controller. CVSS 3.1 Puntaje base 4.3 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:enterprise_session_border_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.0",
+ "versionEndIncluding": "9.2",
+ "matchCriteriaId": "DB36CC65-35A9-4DA7-963F-0E78B8D5A118"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22084.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22084.json
new file mode 100644
index 00000000000..4536cbbe0a9
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22084.json
@@ -0,0 +1,98 @@
+{
+ "id": "CVE-2023-22084",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.793",
+ "lastModified": "2023-10-27T15:15:11.270",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.43 and prior, 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles que se ven afectadas son 5.7.43 y anteriores, 8.0.34 y anteriores y 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.7.0",
+ "versionEndIncluding": "5.7.43",
+ "matchCriteriaId": "0789F881-2109-4DFF-8BE7-D5AAC10FCBA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22085.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22085.json
new file mode 100644
index 00000000000..93448bc49df
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22085.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-22085",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.863",
+ "lastModified": "2023-10-23T18:24:06.827",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: Opera). The supported version that is affected is 5.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in takeover of Hospitality OPERA 5 Property Services. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Hospitality OPERA 5 Property Services de Oracle Hospitality Applications (componente: Opera). La versi\u00f3n soportada afectada es la 5.6. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer los servicios de propiedad de Hospitality OPERA 5. Los ataques exitosos a esta vulnerabilidad pueden resultar en la adquisici\u00f3n de Hospitality OPERA 5 Property Services. CVSS 3.1 Puntuaci\u00f3n base 8,8 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0C177E1-66B8-4AB7-A3F0-B6CCDCC28F75"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22086.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22086.json
new file mode 100644
index 00000000000..66dad245418
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22086.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22086",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:13.937",
+ "lastModified": "2023-10-23T18:19:42.417",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware (componente: Core). Las versiones compatibles que se ven afectadas son 12.2.1.4.0 y 14.1.1.0.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante no autenticado con acceso a la red a trav\u00e9s de T3, IIOP comprometa Oracle WebLogic Server. Los ataques exitosos a esta vulnerabilidad pueden resultar en un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle WebLogic Server. CVSS 3.1 Puntaje base 7.5 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22087.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22087.json
new file mode 100644
index 00000000000..283ef397c34
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22087.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-22087",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.007",
+ "lastModified": "2023-10-23T18:24:12.803",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: Opera). The supported version that is affected is 5.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in takeover of Hospitality OPERA 5 Property Services. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Hospitality OPERA 5 Property Services de Oracle Hospitality Applications (componente: Opera). La versi\u00f3n soportada afectada es la 5.6. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer los servicios de propiedad de Hospitality OPERA 5. Los ataques exitosos a esta vulnerabilidad pueden resultar en la adquisici\u00f3n de Hospitality OPERA 5 Property Services. CVSS 3.1 Puntuaci\u00f3n base 8,8 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:hospitality_opera_5_property_services:5.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0C177E1-66B8-4AB7-A3F0-B6CCDCC28F75"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22088.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22088.json
new file mode 100644
index 00000000000..038e8a85632
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22088.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22088",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.080",
+ "lastModified": "2023-10-23T18:50:42.360",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: User Management). Supported versions that are affected are 7.4.0 and 7.4.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Communications Order and Service Management de Oracle Communications Applications (componente: User Management). Las versiones compatibles que se ven afectadas son 7.4.0 y 7.4.1. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometa la gesti\u00f3n de pedidos y servicios de Oracle Communications. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Communications Order and Service Management. CVSS 3.1 Puntaje base 4.3 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD876393-080D-4C24-B28D-EF1AE476EDD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6DD496A6-ED56-4356-B1ED-FC9D7F88A7B6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22089.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22089.json
new file mode 100644
index 00000000000..8e5c2ee0d16
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22089.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22089",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.150",
+ "lastModified": "2023-10-23T18:19:47.447",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware (componente: Core). Las versiones compatibles que se ven afectadas son 12.2.1.4.0 y 14.1.1.0.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante no autenticado con acceso a la red a trav\u00e9s de T3, IIOP comprometa Oracle WebLogic Server. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Oracle WebLogic Server. CVSS 3.1 Puntuaci\u00f3n base 9,8 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22090.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22090.json
new file mode 100644
index 00000000000..cd8de8ab7a9
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22090.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-22090",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.227",
+ "lastModified": "2023-10-23T18:50:10.933",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Events & Notifications). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto PeopleSoft Enterprise CC Common Application Objects de Oracle PeopleSoft (componente: Eventos y notificaciones). La versi\u00f3n compatible que se ve afectada es la 9.2. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer los objetos de aplicaci\u00f3n comunes de PeopleSoft Enterprise CC. Los ataques exitosos a esta vulnerabilidad pueden resultar en un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de los Objetos de Aplicaci\u00f3n Comunes de PeopleSoft Enterprise CC. CVSS 3.1 Puntaje base 6.5 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_cost_center_common_application_objects:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D30BE00A-198B-4398-9404-BEA9D255B554"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22091.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22091.json
new file mode 100644
index 00000000000..00a25a74acd
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22091.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22091",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.297",
+ "lastModified": "2023-10-25T14:24:38.267",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle GraalVM for JDK product of Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle GraalVM for JDK: 17.0.8 and 21. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle GraalVM for JDK accessible data as well as unauthorized read access to a subset of Oracle GraalVM for JDK accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle GraalVM para JDK de Oracle Java SE (componente: Compilador). Las versiones compatibles que se ven afectadas son Oracle GraalVM para JDK: 17.0.8 y 21. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa Oracle GraalVM para JDK. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle GraalVM para JDK, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle GraalVM para JDK. CVSS 3.1 Puntaje base 4.8 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5A01042-97E8-483B-BBE2-C9A968423FCD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:graalvm_for_jdk:21:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3DAC838A-1E97-4D12-9CA9-4593D61CF9FD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22092.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22092.json
new file mode 100644
index 00000000000..f7638b975a1
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22092.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-22092",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.370",
+ "lastModified": "2023-10-27T15:15:11.590",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Servidor: Optimizador). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22093.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22093.json
new file mode 100644
index 00000000000..1bb0e9bcf1c
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22093.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22093",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.443",
+ "lastModified": "2023-10-23T18:23:37.693",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle iRecruitment product of Oracle E-Business Suite (component: Requisition and Vacancy). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iRecruitment. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle iRecruitment accessible data as well as unauthorized read access to a subset of Oracle iRecruitment accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle iRecruitment de Oracle E-Business Suite (componente: Requisition and Vacancy). Las versiones compatibles que se ven afectadas son 12.2.3-12.2.12. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP comprometer Oracle iRecruitment. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle iRecruitment, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle iRecruitment. CVSS 3.1 Puntaje base 6.5 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "12.2.3",
+ "versionEndIncluding": "12.2.12",
+ "matchCriteriaId": "A83DB7D1-1B29-4FFB-B11B-4BC0915AAB6D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22094.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22094.json
new file mode 100644
index 00000000000..3bdb5e789c4
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22094.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-22094",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.513",
+ "lastModified": "2023-10-24T23:46:20.363",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Installer product of Oracle MySQL (component: Installer: General). Supported versions that are affected are Prior to 1.6.8. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Installer executes to compromise MySQL Installer. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Installer, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Installer accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Installer. Note: This patch is used in MySQL Server bundled version 8.0.35 and 5.7.44. CVSS 3.1 Base Score 7.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Installer de Oracle MySQL (componente: Instalador: General). Las versiones compatibles que se ven afectadas son anteriores a 1.6.8. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios iniciar sesi\u00f3n en la infraestructura donde se ejecuta MySQL Installer para comprometer MySQL Installer. Los ataques exitosos requieren la interacci\u00f3n humana de una persona que no sea el atacante y, si bien la vulnerabilidad est\u00e1 en MySQL Installer, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a la creaci\u00f3n, eliminaci\u00f3n o modificaci\u00f3n de datos cr\u00edticos o a todos los datos accesibles del instalador de MySQL y la capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del instalador de MySQL. Nota: Este parche se utiliza en las versiones 8.0.35 y 5.7.44 incluidas en MySQL Server. CVSS 3.1 Puntaje base 7.9 (impactos en integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.9,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 5.8
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql_installer:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.8",
+ "matchCriteriaId": "A67BC22B-D2F9-4B84-8183-604B67BA1367"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22095.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22095.json
new file mode 100644
index 00000000000..77b8c9657c4
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22095.json
@@ -0,0 +1,84 @@
+{
+ "id": "CVE-2023-22095",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.590",
+ "lastModified": "2023-10-27T15:15:11.957",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). The supported version that is affected is 8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Servidor: Optimizer). La versi\u00f3n compatible afectada es la 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntaje base 6.5 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22096.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22096.json
new file mode 100644
index 00000000000..8ba33e1afd4
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22096.json
@@ -0,0 +1,89 @@
+{
+ "id": "CVE-2023-22096",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.663",
+ "lastModified": "2023-10-23T18:20:55.877",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.20 and 21.3-21.11. Easily exploitable vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java VM accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el componente Java VM de Oracle Database Server. Las versiones compatibles que se ven afectadas son 19.3-19.20 y 21.3-21.11. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con pocos privilegios que tenga privilegios de Crear sesi\u00f3n y Crear procedimiento con acceso a la red a trav\u00e9s de Oracle Net comprometa la m\u00e1quina virtual Java. Los ataques exitosos a esta vulnerabilidad pueden resultar en actualizaciones no autorizadas, inserci\u00f3n o eliminaci\u00f3n del acceso a algunos de los datos accesibles de Java VM. CVSS 3.1 Puntaje base 4.3 (Impactos en la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "19.3",
+ "versionEndIncluding": "19.20",
+ "matchCriteriaId": "32E02E1D-EF08-47A1-9095-06F9F2D8D268"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:database_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "21.3",
+ "versionEndIncluding": "21.11",
+ "matchCriteriaId": "84088F94-42E8-4553-AE33-A5C4E954C83F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22097.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22097.json
new file mode 100644
index 00000000000..97beb7cdee5
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22097.json
@@ -0,0 +1,91 @@
+{
+ "id": "CVE-2023-22097",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.740",
+ "lastModified": "2023-10-27T15:15:12.057",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores y la 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22098.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22098.json
new file mode 100644
index 00000000000..e533285296c
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22098.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22098",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.813",
+ "lastModified": "2023-10-23T18:20:14.763",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: Only applicable to 7.0.x platform. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle VM VirtualBox de Oracle Virtualization (componente: Core). Las versiones compatibles que se ven afectadas son anteriores a la 7.0.12. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con altos privilegios iniciar sesi\u00f3n en la infraestructura donde se ejecuta Oracle VM VirtualBox para comprometer Oracle VM VirtualBox. Si bien la vulnerabilidad est\u00e1 en Oracle VM VirtualBox, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para provocar un bloqueo o un bloqueo frecuente (DOS completo) de Oracle VM VirtualBox, as\u00ed como acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle VM VirtualBox y acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle VM VirtualBox. Nota: Solo aplicable a la plataforma 7.0.x. CVSS 3.1 Puntuaci\u00f3n base 7.3 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 5.3
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.0.0",
+ "versionEndExcluding": "7.0.12",
+ "matchCriteriaId": "D8A5BD79-BD2B-483D-B14F-0F2E525E56D6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-220xx/CVE-2023-22099.json b/CVE-2023/CVE-2023-220xx/CVE-2023-22099.json
new file mode 100644
index 00000000000..266975e469a
--- /dev/null
+++ b/CVE-2023/CVE-2023-220xx/CVE-2023-22099.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22099",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.893",
+ "lastModified": "2023-10-23T18:20:27.083",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: Only applicable to 7.0.x platform. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle VM VirtualBox de Oracle Virtualization (componente: Core). Las versiones compatibles que se ven afectadas son anteriores a la 7.0.12. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con altos privilegios iniciar sesi\u00f3n en la infraestructura donde se ejecuta Oracle VM VirtualBox para comprometer Oracle VM VirtualBox. Si bien la vulnerabilidad est\u00e1 en Oracle VM VirtualBox, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden resultar en una capacidad no autorizada para provocar un bloqueo o un bloqueo frecuente (DOS completo) de Oracle VM VirtualBox, as\u00ed como acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle VM VirtualBox y acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle VM VirtualBox. Nota: Solo aplicable a la plataforma 7.0.x. CVSS 3.1 Puntuaci\u00f3n base 7.3 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 5.3
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.0.0",
+ "versionEndExcluding": "7.0.12",
+ "matchCriteriaId": "D8A5BD79-BD2B-483D-B14F-0F2E525E56D6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22100.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22100.json
new file mode 100644
index 00000000000..a91a11231d7
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22100.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22100",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:14.963",
+ "lastModified": "2023-10-23T18:20:21.120",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. Note: Only applicable to 7.0.x platform. CVSS 3.1 Base Score 7.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle VM VirtualBox de Oracle Virtualization (componente: Core). Las versiones compatibles que se ven afectadas son anteriores a la 7.0.12. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con altos privilegios iniciar sesi\u00f3n en la infraestructura donde se ejecuta Oracle VM VirtualBox para comprometer Oracle VM VirtualBox. Si bien la vulnerabilidad est\u00e1 en Oracle VM VirtualBox, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden resultar en un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle VM VirtualBox y la capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) de Oracle VM VirtualBox. Nota: Solo aplicable a la plataforma 7.0.x. CVSS 3.1 Puntuaci\u00f3n base 7,9 (impactos en la confidencialidad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.9,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 5.8
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.0.0",
+ "versionEndExcluding": "7.0.12",
+ "matchCriteriaId": "D8A5BD79-BD2B-483D-B14F-0F2E525E56D6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json
new file mode 100644
index 00000000000..6ebba29dc9a
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22101.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22101",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.033",
+ "lastModified": "2023-10-23T18:19:52.673",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware (componente: Core). Las versiones compatibles que se ven afectadas son 12.2.1.4.0 y 14.1.1.0.0. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de T3, IIOP comprometa Oracle WebLogic Server. Los ataques exitosos a esta vulnerabilidad pueden resultar en la toma de control de Oracle WebLogic Server. CVSS 3.1 Puntuaci\u00f3n base 8.1 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json
new file mode 100644
index 00000000000..349ac27c627
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22102.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22102",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.100",
+ "lastModified": "2023-10-27T15:15:12.167",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Connectors de Oracle MySQL (componente: Connector/J). Las versiones compatibles que se ven afectadas son la 8.1.0 y anteriores. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa los conectores MySQL. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en los conectores MySQL, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos a esta vulnerabilidad pueden resultar en la adquisici\u00f3n de MySQL Connectors. CVSS 3.1 Puntuaci\u00f3n base 8.3 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "8.1.0",
+ "matchCriteriaId": "1C8D087A-01CE-42A3-9A33-3E424C2D0258"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0007/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22103.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22103.json
new file mode 100644
index 00000000000..76605b6af8e
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22103.json
@@ -0,0 +1,91 @@
+{
+ "id": "CVE-2023-22103",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.173",
+ "lastModified": "2023-10-27T15:15:12.283",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Servidor: Optimizer). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores y la 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22104.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22104.json
new file mode 100644
index 00000000000..1933d21ade7
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22104.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22104",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.243",
+ "lastModified": "2023-10-27T15:15:12.410",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles que se ven afectadas son la 8.0.32 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0.0",
+ "versionEndIncluding": "8.0.32",
+ "matchCriteriaId": "9B03E711-1254-4CBD-B2B5-F947248C2A53"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22105.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22105.json
new file mode 100644
index 00000000000..9dfc9c666a9
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22105.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22105",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.307",
+ "lastModified": "2023-10-23T18:49:55.443",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the BI Publisher product of Oracle Analytics (component: Web Server). Supported versions that are affected are 6.4.0.0.0 and 7.0.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher accessible data as well as unauthorized read access to a subset of BI Publisher accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto BI Publisher de Oracle Analytics (componente: Web Server). Las versiones compatibles que se ven afectadas son 6.4.0.0.0 y 7.0.0.0.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometa BI Publisher. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, mientras la vulnerabilidad est\u00e9 en BI Publisher, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de BI Publisher, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de BI Publisher. CVSS 3.1 Puntaje base 5.4 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:bi_publisher:6.4.0.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F6CEFA51-E2C5-4F07-952D-F8F46C928092"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:bi_publisher:7.0.0.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F59017DC-0258-45BD-89E4-DC8EBA922107"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22106.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22106.json
new file mode 100644
index 00000000000..60eebcb9e67
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22106.json
@@ -0,0 +1,90 @@
+{
+ "id": "CVE-2023-22106",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.377",
+ "lastModified": "2023-10-23T18:21:13.897",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Enterprise Command Center Framework product of Oracle E-Business Suite (component: API). Supported versions that are affected are ECC: 8, 9 and 10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Command Center Framework. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Command Center Framework accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Enterprise Command Center Framework de Oracle E-Business Suite (componente: API). Las versiones compatibles que se ven afectadas son ECC: 8, 9 y 10. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer Oracle Enterprise Command Center Framework. Los ataques exitosos a esta vulnerabilidad pueden resultar en un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle Enterprise Command Center Framework. CVSS 3.1 Puntaje base 6.5 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:enterprise_command_center_framework:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BFFA86D-F43E-4329-A58A-75052BE3A03F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:enterprise_command_center_framework:9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8D2F1A03-9F1A-4F3A-885F-9F1640CEF9ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:enterprise_command_center_framework:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93D67729-C882-4D4D-9D43-C9EA9DE59CA8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22107.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22107.json
new file mode 100644
index 00000000000..bae09794cce
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22107.json
@@ -0,0 +1,90 @@
+{
+ "id": "CVE-2023-22107",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.440",
+ "lastModified": "2023-10-23T18:23:53.740",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Enterprise Command Center Framework product of Oracle E-Business Suite (component: UI Components). Supported versions that are affected are ECC: 8, 9 and 10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Command Center Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Command Center Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Enterprise Command Center Framework accessible data as well as unauthorized read access to a subset of Oracle Enterprise Command Center Framework accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Enterprise Command Center Framework de Oracle E-Business Suite (componente: UI Components). Las versiones compatibles que se ven afectadas son ECC: 8, 9 y 10. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP comprometer Oracle Enterprise Command Center Framework. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en Oracle Enterprise Command Center Framework, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle Enterprise Command Center Framework, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Enterprise Command Center Framework. CVSS 3.1 Puntaje base 6.1 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:enterprise_command_center_framework:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BFFA86D-F43E-4329-A58A-75052BE3A03F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:enterprise_command_center_framework:9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8D2F1A03-9F1A-4F3A-885F-9F1640CEF9ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:enterprise_command_center_framework:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93D67729-C882-4D4D-9D43-C9EA9DE59CA8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22108.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22108.json
new file mode 100644
index 00000000000..94e35b2ece8
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22108.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22108",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.507",
+ "lastModified": "2023-10-23T18:19:57.627",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware (componente: Core). Las versiones compatibles que se ven afectadas son 12.2.1.4.0 y 14.1.1.0.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante no autenticado con acceso a la red a trav\u00e9s de T3, IIOP comprometa Oracle WebLogic Server. Los ataques exitosos a esta vulnerabilidad pueden resultar en un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle WebLogic Server. CVSS 3.1 Puntaje base 7.5 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22109.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22109.json
new file mode 100644
index 00000000000..f2e07533426
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22109.json
@@ -0,0 +1,90 @@
+{
+ "id": "CVE-2023-22109",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.573",
+ "lastModified": "2023-10-25T14:17:48.507",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Web Dashboards). Supported versions that are affected are 6.4.0.0.0, 7.0.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Business Intelligence Enterprise Edition de Oracle Analytics (componente: Analytics Web Dashboards). Las versiones compatibles que se ven afectadas son 6.4.0.0.0, 7.0.0.0.0 y 12.2.1.4.0. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer Oracle Business Intelligence Enterprise Edition. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos a esta vulnerabilidad pueden resultar en acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle Business Intelligence Enterprise Edition, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Business Intelligence Enterprise Edition. CVSS 3.1 Puntaje base 4.6 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.6,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:business_intelligence:6.4.0.0.0:*:*:*:enterprise:*:*:*",
+ "matchCriteriaId": "EDBC994D-3FE6-4DEF-AE5C-26D2E3AD45BF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:enterprise:*:*:*",
+ "matchCriteriaId": "5412263F-C075-4D94-9807-CB895A63708D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*",
+ "matchCriteriaId": "81DAC8C0-D342-44B5-9432-6B88D389584F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22110.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22110.json
new file mode 100644
index 00000000000..2530b3006ee
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22110.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-22110",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.643",
+ "lastModified": "2023-10-27T15:15:12.510",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles que se ven afectadas son la 8.0.33 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.33",
+ "matchCriteriaId": "44F51EF6-9993-4D49-AB0C-7D8D8FB65A98"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22111.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22111.json
new file mode 100644
index 00000000000..f59af5a8dd5
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22111.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-22111",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.717",
+ "lastModified": "2023-10-27T15:15:12.600",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: UDF). Las versiones compatibles que se ven afectadas son la 8.0.33 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.33",
+ "matchCriteriaId": "44F51EF6-9993-4D49-AB0C-7D8D8FB65A98"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22112.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22112.json
new file mode 100644
index 00000000000..e6161017e5e
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22112.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-22112",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.793",
+ "lastModified": "2023-10-27T15:15:12.693",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Servidor: Optimizer). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22113.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22113.json
new file mode 100644
index 00000000000..f3ddb3a6e25
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22113.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-22113",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.873",
+ "lastModified": "2023-10-27T15:15:12.787",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Security: Encryption). Las versiones compatibles que se ven afectadas son la 8.0.33 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en acceso de lectura no autorizado a un subconjunto de datos accesibles del servidor MySQL. CVSS 3.1 Puntaje base 2.7 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 2.7,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.33",
+ "matchCriteriaId": "44F51EF6-9993-4D49-AB0C-7D8D8FB65A98"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22114.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22114.json
new file mode 100644
index 00000000000..e69bef43f25
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22114.json
@@ -0,0 +1,91 @@
+{
+ "id": "CVE-2023-22114",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:15.950",
+ "lastModified": "2023-10-27T15:15:12.873",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles que se ven afectadas son la 8.0.34 y anteriores y la 8.1.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.34",
+ "matchCriteriaId": "F5D3C348-07C4-4E6E-9E47-CECBEBA4223B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16FFE86C-A164-406B-93DA-A6A75D380FDF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22115.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22115.json
new file mode 100644
index 00000000000..3d0a478649f
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22115.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-22115",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.033",
+ "lastModified": "2023-10-27T15:15:12.967",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Servidor: DML). Las versiones compatibles que se ven afectadas son la 8.0.33 y anteriores. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0",
+ "versionEndIncluding": "8.0.33",
+ "matchCriteriaId": "44F51EF6-9993-4D49-AB0C-7D8D8FB65A98"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "secalert_us@oracle.com"
+ },
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22117.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22117.json
new file mode 100644
index 00000000000..cee753a6768
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22117.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-22117",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.107",
+ "lastModified": "2023-10-23T18:21:51.067",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3, 12.4, 14.0-14.3 and 14.5-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle FLEXCUBE Universal Banking de Oracle Financial Services Applications (componente: Infrastructure). Las versiones compatibles que se ven afectadas son 12.3, 12.4, 14.0-14.3 y 14.5-14.7. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer Oracle FLEXCUBE Universal Banking. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en Oracle FLEXCUBE Universal Banking, los ataques pueden afectar significativamente productos adicionales (cambio de alcance). Los ataques exitosos a esta vulnerabilidad pueden dar como resultado una actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada del acceso a algunos de los datos accesibles de Oracle FLEXCUBE Universal Banking, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle FLEXCUBE Universal Banking. CVSS 3.1 Puntaje base 5.4 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.0.0",
+ "versionEndIncluding": "14.3.0",
+ "matchCriteriaId": "54BE0CCE-8216-4CCF-96E1-38EF76124368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.5.0",
+ "versionEndIncluding": "14.7.0",
+ "matchCriteriaId": "789A462F-9133-4624-8D25-D34E7AEDFBEC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "77DAFCA5-2BAD-4382-8AEB-862E10B87161"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3D55FB5-8ED8-4797-B5BC-545477AF7347"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22118.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22118.json
new file mode 100644
index 00000000000..cda80e12bc1
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22118.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-22118",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.177",
+ "lastModified": "2023-10-23T18:22:03.180",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3, 12.4, 14.0-14.3 and 14.5-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Universal Banking, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle FLEXCUBE Universal Banking de Oracle Financial Services Applications (componente: Infrastructure). Las versiones compatibles que se ven afectadas son 12.3, 12.4, 14.0-14.3 y 14.5-14.7. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer Oracle FLEXCUBE Universal Banking. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en Oracle FLEXCUBE Universal Banking, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado una actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada del acceso a algunos de los datos accesibles de Oracle FLEXCUBE Universal Banking, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle FLEXCUBE Universal Banking y la capacidad no autorizada de causar una denegaci\u00f3n parcial de servicio. (DOS parcial) de Oracle FLEXCUBE Universal Banking. CVSS 3.1 Puntuaci\u00f3n base 6,5 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.0.0",
+ "versionEndIncluding": "14.3.0",
+ "matchCriteriaId": "54BE0CCE-8216-4CCF-96E1-38EF76124368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.5.0",
+ "versionEndIncluding": "14.7.0",
+ "matchCriteriaId": "789A462F-9133-4624-8D25-D34E7AEDFBEC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "77DAFCA5-2BAD-4382-8AEB-862E10B87161"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3D55FB5-8ED8-4797-B5BC-545477AF7347"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22119.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22119.json
new file mode 100644
index 00000000000..b832bf6ed63
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22119.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-22119",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.247",
+ "lastModified": "2023-10-23T18:22:14.563",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3, 12.4, 14.0-14.3 and 14.5-14.7. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle FLEXCUBE Universal Banking. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle FLEXCUBE Universal Banking de Oracle Financial Services Applications (componente: Infrastructure). Las versiones compatibles que se ven afectadas son 12.3, 12.4, 14.0-14.3 y 14.5-14.7. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometa Oracle FLEXCUBE Universal Banking. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a datos cr\u00edticos o acceso completo a todos los datos accesibles de Oracle FLEXCUBE Universal Banking, as\u00ed como acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle FLEXCUBE Universal Banking y la capacidad no autorizada de causar una denegaci\u00f3n parcial de servicio (DOS parcial) de Oracle FLEXCUBE Universal Banking. CVSS 3.1 Puntuaci\u00f3n base 5,9 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.0.0",
+ "versionEndIncluding": "14.3.0",
+ "matchCriteriaId": "54BE0CCE-8216-4CCF-96E1-38EF76124368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.5.0",
+ "versionEndIncluding": "14.7.0",
+ "matchCriteriaId": "789A462F-9133-4624-8D25-D34E7AEDFBEC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "77DAFCA5-2BAD-4382-8AEB-862E10B87161"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3D55FB5-8ED8-4797-B5BC-545477AF7347"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22121.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22121.json
new file mode 100644
index 00000000000..832b121673a
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22121.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22121",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.323",
+ "lastModified": "2023-10-23T18:22:22.633",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 14.5-14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Trade Finance accessible data as well as unauthorized read access to a subset of Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Banking Trade Finance de Oracle Financial Services Applications (componente: Infraestructura). Las versiones compatibles que se ven afectadas son 14.5-14.7. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP comprometa Oracle Banking Trade Finance. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos a esta vulnerabilidad pueden resultar en actualizaciones no autorizadas, inserci\u00f3n o eliminaci\u00f3n de acceso a algunos de los datos accesibles de Oracle Banking Trade Finance, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Banking Trade Finance. CVSS 3.1 Puntaje base 5.4 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).x\u00ba"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:banking_trade_finance:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.5",
+ "versionEndIncluding": "14.7",
+ "matchCriteriaId": "F1668AD8-FA32-4F95-A417-BDE83156C396"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22122.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22122.json
new file mode 100644
index 00000000000..8a6ea24d058
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22122.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22122",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.397",
+ "lastModified": "2023-10-23T18:22:32.107",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 14.5-14.7. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data as well as unauthorized update, insert or delete access to some of Oracle Banking Trade Finance accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Trade Finance. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Banking Trade Finance de Oracle Financial Services Applications (componente: Infraestructura). Las versiones compatibles que se ven afectadas son 14.5-14.7. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometa Oracle Banking Trade Finance. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso no autorizado a datos cr\u00edticos o acceso completo a todos los datos accesibles de Oracle Banking Trade Finance, as\u00ed como acceso no autorizado a actualizaciones, inserci\u00f3n o eliminaci\u00f3n de algunos de los datos accesibles de Oracle Banking Trade Finance y la capacidad no autorizada de causar una vulnerabilidad parcial. denegaci\u00f3n de servicio (DOS parcial) de Oracle Banking Trade Finance. CVSS 3.1 Puntuaci\u00f3n base 5,9 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:banking_trade_finance:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.5",
+ "versionEndIncluding": "14.7",
+ "matchCriteriaId": "F1668AD8-FA32-4F95-A417-BDE83156C396"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22123.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22123.json
new file mode 100644
index 00000000000..656e2f80768
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22123.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22123",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.467",
+ "lastModified": "2023-10-23T18:22:38.917",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 14.5-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Trade Finance, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Trade Finance accessible data as well as unauthorized read access to a subset of Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Banking Trade Finance de Oracle Financial Services Applications (componente: Infrastructure). Las versiones compatibles que se ven afectadas son 14.5-14.7. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer Oracle Banking Trade Finance. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en Oracle Banking Trade Finance, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos a esta vulnerabilidad pueden resultar en actualizaciones no autorizadas, inserci\u00f3n o eliminaci\u00f3n de acceso a algunos de los datos accesibles de Oracle Banking Trade Finance, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Banking Trade Finance. CVSS 3.1 Puntaje base 5.4 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:banking_trade_finance:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.5",
+ "versionEndIncluding": "14.7",
+ "matchCriteriaId": "F1668AD8-FA32-4F95-A417-BDE83156C396"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22124.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22124.json
new file mode 100644
index 00000000000..da4ecb79cef
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22124.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22124",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.540",
+ "lastModified": "2023-10-23T18:22:45.570",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 14.5-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Trade Finance, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Trade Finance accessible data as well as unauthorized read access to a subset of Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Banking Trade Finance de Oracle Financial Services Applications (componente: Infrastructure). Las versiones compatibles que se ven afectadas son 14.5-14.7. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer Oracle Banking Trade Finance. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en Oracle Banking Trade Finance, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos a esta vulnerabilidad pueden resultar en actualizaciones no autorizadas, inserci\u00f3n o eliminaci\u00f3n de acceso a algunos de los datos accesibles de Oracle Banking Trade Finance, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Banking Trade Finance. CVSS 3.1 Puntaje base 5.4 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:banking_trade_finance:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.5",
+ "versionEndIncluding": "14.7",
+ "matchCriteriaId": "F1668AD8-FA32-4F95-A417-BDE83156C396"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22125.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22125.json
new file mode 100644
index 00000000000..3fc6196a290
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22125.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-22125",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.607",
+ "lastModified": "2023-10-23T18:22:57.883",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 14.5-14.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Trade Finance, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Trade Finance accessible data as well as unauthorized read access to a subset of Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Banking Trade Finance de Oracle Financial Services Applications (componente: Infrastructure). Las versiones compatibles que se ven afectadas son 14.5-14.7. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer Oracle Banking Trade Finance. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad est\u00e1 en Oracle Banking Trade Finance, los ataques pueden afectar significativamente a productos adicionales (cambio de alcance). Los ataques exitosos a esta vulnerabilidad pueden resultar en actualizaciones no autorizadas, inserci\u00f3n o eliminaci\u00f3n de acceso a algunos de los datos accesibles de Oracle Banking Trade Finance, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Banking Trade Finance. CVSS 3.1 Puntaje base 5.4 (Impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:banking_trade_finance:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.5",
+ "versionEndIncluding": "14.7",
+ "matchCriteriaId": "F1668AD8-FA32-4F95-A417-BDE83156C396"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22126.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22126.json
new file mode 100644
index 00000000000..e7fc6af5cff
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22126.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-22126",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.677",
+ "lastModified": "2023-10-23T18:20:04.377",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle WebCenter Content product of Oracle Fusion Middleware (component: Content Server). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Content. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebCenter Content accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle WebCenter Content de Oracle Fusion Middleware (componente: Content Server). La versi\u00f3n compatible afectada es 12.2.1.4.0. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP comprometer Oracle WebCenter Content. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle WebCenter Content. CVSS 3.1 Puntaje base 5.3 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:webcenter_content:12.2.1.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC6BB89E-DCA0-4453-A043-1987EB657451"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22127.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22127.json
new file mode 100644
index 00000000000..78705b1199e
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22127.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-22127",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.750",
+ "lastModified": "2023-10-23T18:49:47.720",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Content Access SDK, Image Export SDK, PDF Export SDK, HTML Export SDK). The supported version that is affected is 8.5.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Outside In Technology de Oracle Fusion Middleware (componente: SDK de acceso a contenido, SDK de exportaci\u00f3n de im\u00e1genes, SDK de exportaci\u00f3n de PDF, SDK de exportaci\u00f3n HTML). La versi\u00f3n compatible afectada es la 8.5.6. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometer la tecnolog\u00eda Oracle Outside In. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado una actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada del acceso a algunos de los datos accesibles de Oracle Outside In Technology, as\u00ed como acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Outside In Technology y la capacidad no autorizada de causar una denegaci\u00f3n parcial de servicio. (DOS parcial) de Oracle Outside In Technology. CVSS 3.1 Puntuaci\u00f3n base 6.3 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:outside_in_technology:8.5.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76D6D900-3178-4FB2-980C-5E806933F059"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22128.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22128.json
new file mode 100644
index 00000000000..6a88453fe4b
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22128.json
@@ -0,0 +1,105 @@
+{
+ "id": "CVE-2023-22128",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.823",
+ "lastModified": "2023-10-23T18:49:29.657",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via rquota to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Solaris de Oracle Systems (componente: Filesystem). Las versiones compatibles que se ven afectadas son la 10 y la 11. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de rquota comprometa Oracle Solaris. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos de esta vulnerabilidad pueden resultar en acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Solaris. CVSS 3.1 Puntaje base 3.1 (Impactos en la confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.1,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 1.4
+ },
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.1,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "964B57CD-CB8A-4520-B358-1C93EC5EF2DC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22129.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22129.json
new file mode 100644
index 00000000000..2ec9f52f79c
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22129.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-22129",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.900",
+ "lastModified": "2023-10-23T18:55:51.797",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. Note: This vunlerability only affects SPARC Systems. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Oracle Solaris de Oracle Systems (componente: Kernel). La versi\u00f3n compatible que se ve afectada es la 11. Una vulnerabilidad f\u00e1cilmente explotable permite a un atacante con pocos privilegios iniciar sesi\u00f3n en la infraestructura donde se ejecuta Oracle Solaris para comprometer Oracle Solaris. Los ataques exitosos de esta vulnerabilidad pueden tener como resultado una capacidad no autorizada para causar un bloqueo o una falla frecuentemente repetible (DOS completo) de Oracle Solaris. Nota: Esta vulnerabilidad solo afecta a los sistemas SPARC. CVSS 3.1 Puntuaci\u00f3n base 5.5 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:sparc:*",
+ "matchCriteriaId": "EB70B299-0A40-401F-ADDD-5D34F1E04052"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-221xx/CVE-2023-22130.json b/CVE-2023/CVE-2023-221xx/CVE-2023-22130.json
new file mode 100644
index 00000000000..da98233eee4
--- /dev/null
+++ b/CVE-2023/CVE-2023-221xx/CVE-2023-22130.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-22130",
+ "sourceIdentifier": "secalert_us@oracle.com",
+ "published": "2023-10-17T22:15:16.973",
+ "lastModified": "2023-10-23T18:48:43.810",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad en el producto Sun ZFS Storage Appliance de Oracle Systems (componente: Core). La versi\u00f3n compatible afectada es la 8.8.60. Una vulnerabilidad dif\u00edcil de explotar permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP comprometa Sun ZFS Storage Appliance. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada para provocar un bloqueo o un bloqueo frecuente (DOS completo) de Sun ZFS Storage Appliance. CVSS 3.1 Puntuaci\u00f3n base 5.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert_us@oracle.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.60:*:*:*:*:*:*:*",
+ "matchCriteriaId": "94E7D50C-4ED6-481C-A804-550CFD85423B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.oracle.com/security-alerts/cpuoct2023.html",
+ "source": "secalert_us@oracle.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22308.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22308.json
index 52b1e9a0328..6e2e323972a 100644
--- a/CVE-2023/CVE-2023-223xx/CVE-2023-22308.json
+++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22308.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-22308",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-12T16:15:09.967",
- "lastModified": "2023-10-12T16:52:07.503",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T02:43:42.797",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An integer underflow vulnerability exists in the vpnserver OvsProcessData functionality of SoftEther VPN 5.01.9674 and 5.02. A specially crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de desbordamiento de enteros en la funcionalidad vpnserver OvsProcessData de SoftEther VPN 5.01.9674 y 5.02. Un paquete de red especialmente manipulado puede provocar una Denegaci\u00f3n de Servicio (DoS). Un atacante puede enviar un paquete malicioso para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-191"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,10 +80,36 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CF5CF13-B22F-494B-BDC0-B59371979251"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.02:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D21F370B-D9F2-43E8-8E45-0EA74A3C9D4B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1737",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22325.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22325.json
index 08bdb85bb58..fa9becb8266 100644
--- a/CVE-2023/CVE-2023-223xx/CVE-2023-22325.json
+++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22325.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-22325",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-12T16:15:10.283",
- "lastModified": "2023-10-12T16:52:07.503",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T17:12:38.933",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability exists in the DCRegister DDNS_RPC_MAX_RECV_SIZE functionality of SoftEther VPN 4.41-9782-beta, 5.01.9674 and 5.02. A specially crafted network packet can lead to denial of service. An attacker can perform a man-in-the-middle attack to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en la funcionalidad DCRegister DDNS_RPC_MAX_RECV_SIZE de SoftEther VPN 4.41-9782-beta, 5.01.9674 y 5.02. Un paquete de red especialmente manipulado puede provocar una Denegaci\u00f3n de Servicio (DoS). Un atacante puede realizar un ataque de intermediario para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-835"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,14 +80,49 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:4.41-9782:beta:*:*:*:*:*:*",
+ "matchCriteriaId": "79C47EE5-1B55-4FDD-A5B5-E10FF3337100"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CF5CF13-B22F-494B-BDC0-B59371979251"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.02:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D21F370B-D9F2-43E8-8E45-0EA74A3C9D4B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1736",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.softether.org/9-about/News/904-SEVPN202301",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22392.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22392.json
index a2812e6dd9d..2a17e8d2d50 100644
--- a/CVE-2023/CVE-2023-223xx/CVE-2023-22392.json
+++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22392.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-22392",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-12T23:15:10.680",
- "lastModified": "2023-10-13T12:47:48.873",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T20:15:08.700",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "\nA Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).\n\nPTX3000, PTX5000, QFX10000, PTX1000, PTX10002, and PTX10004, PTX10008 and PTX10016 with LC110x FPCs do not support certain flow-routes. Once a flow-route is received over an established BGP session and an attempt is made to install the resulting filter into the PFE, FPC heap memory is leaked. The FPC heap memory can be monitored using the CLI command \"show chassis fpc\".\n\nThe following syslog messages can be observed if the respective filter derived from a flow-route cannot be installed.\n\nexpr_dfw_sfm_range_add:661 SFM packet-length Unable to get a sfm entry for updating the hw\nexpr_dfw_hw_sfm_add:750 Unable to add the filter secondarymatch to the hardware\nexpr_dfw_base_hw_add:52 Failed to add h/w sfm data.\nexpr_dfw_base_hw_create:114 Failed to add h/w data.\nexpr_dfw_base_pfe_inst_create:241 Failed to create base inst for sfilter 0 on PFE 0 for __flowspec_default_inet__\nexpr_dfw_flt_inst_change:1368 Failed to create __flowspec_default_inet__ on PFE 0\nexpr_dfw_hw_pgm_fnum:465 dfw_pfe_inst_old not found for pfe_index 0!\nexpr_dfw_bp_pgm_flt_num:548 Failed to pgm bind-point in hw: generic failure\nexpr_dfw_bp_topo_handler:1102 Failed to program fnum.\nexpr_dfw_entry_process_change:679 Failed to change instance for filter __flowspec_default_inet__.\nThis issue affects Juniper Networks Junos OS:\n\non PTX1000, PTX10002, and PTX10004, PTX10008 and PTX10016 with LC110x FPCs:\n\n\n\n * All versions prior to 20.4R3-S5;\n * 21.1 versions prior to 21.1R3-S4;\n * 21.2 versions prior to 21.2R3-S2;\n * 21.3 versions prior to 21.3R3;\n * 21.4 versions prior to 21.4R2-S2, 21.4R3;\n * 22.1 versions prior to 22.1R1-S2, 22.1R2.\n\n\n\n\non PTX3000, PTX5000, QFX10000:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.1 version 21.1R1 and later versions;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S4;\n * 22.1 versions prior to 22.1R3-S3\n * 22.2 versions prior to 22.2R3-S1\n * 22.3 versions prior to 22.3R2-S2, 22.3R3\n * 22.4 versions prior to 22.4R2.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de liberaci\u00f3n de memoria faltante despu\u00e9s de la vida \u00fatil efectiva en Packet Forwarding Engine (PFE) de Juniper Networks Junos OS permite que un atacante adyacente no autenticado provoque una Denegaci\u00f3n de Servicio (DoS). PTX3000, PTX5000, QFX10000, PTX1000, PTX10002 y PTX10004, PTX10008 y PTX10016 con FPC LC110x no admiten ciertas rutas de flujo. Una vez que se recibe una ruta de flujo a trav\u00e9s de una sesi\u00f3n BGP establecida y se intenta instalar el filtro resultante en el PFE, se pierde la memoria del mont\u00f3n de FPC. La memoria del mont\u00f3n de FPC se puede monitorizar usando el comando CLI \"show chassis fpc\". Los siguientes mensajes de syslog se pueden observar si no se puede instalar el filtro respectivo derivado de una ruta de flujo. expr_dfw_sfm_range_add:661 Longitud del paquete SFM No se puede obtener una entrada sfm para actualizar el hw expr_dfw_hw_sfm_add:750 No se puede agregar la coincidencia secundaria del filtro al hardware expr_dfw_base_hw_add:52 No se pudieron agregar datos h/w sfm. expr_dfw_base_hw_create:114 No se pudieron agregar datos h/w. expr_dfw_base_pfe_inst_create:241 No se pudo crear la base inst para sfilter 0 en PFE 0 para __flowspec_default_inet__ expr_dfw_flt_inst_change:1368 No se pudo crear __flowspec_default_inet__ en PFE 0 expr_dfw_hw_pgm_fnum:465 dfw_pfe_inst_old no encontrado para pfe_index 0!expr_dfw_bp_pgm_flt_num:548 Error al programar el punto de enlace en hw: error gen\u00e9rico expr_dfw_bp_topo_handler:1102 Error al programar fnum. expr_dfw_entry_process_change:679 No se pudo cambiar la instancia para el filtro __flowspec_default_inet__. Este problema afecta a Juniper Networks Junos OS: en PTX1000, PTX10002 y PTX10004, PTX10008 y PTX10016 con FPC LC110x: * Todas las versiones anteriores a 20.4R3-S5; * Versiones 21.1 anteriores a 21.1R3-S4; * Versiones 21.2 anteriores a 21.2R3-S2; * Versiones 21.3 anteriores a 21.3R3; * Versiones 21.4 anteriores a 21.4R2-S2, 21.4R3; * Versiones 22.1 anteriores a 22.1R1-S2, 22.1R2. en PTX3000, PTX5000, QFX10000: * Todas las versiones anteriores a 20.4R3-S8; * 21.1 versi\u00f3n 21.1R1 y versiones posteriores; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S4; * Versiones 22.1 anteriores a 22.1R3-S3 * Versiones 22.2 anteriores a 22.2R3-S1 * Versiones 22.3 anteriores a 22.3R2-S2, 22.3R3 * Versiones 22.4 anteriores a 22.4R2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-401"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,9 +80,762 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E6DF99D-E438-4943-BC32-F2821E72AE0B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx1000-72q:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B219F54A-4474-48CB-80F1-D988A719C3DA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82B22AC2-B794-4F12-9EB3-9AA6E4B19831"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10002-60c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1B5462DF-5CF1-4DF9-989B-622EA734964F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C432E543-37F5-4CA0-B239-2B97C6A16907"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65A64A26-4606-4D33-8958-5A3B7FFC4CDB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1879799F-18B2-4958-AA90-FD19348C889F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "516476F9-7D4C-494F-99AA-750F4467CD15"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "654140A0-FEC0-4DB4-83BF-ECCB000DFA4D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5AF2039C-E08C-472F-82E6-DAD3F94724B5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
- "url": "https://supportportal.juniper.net/JSA70188",
+ "url": "https://supportportal.juniper.net/JSA73530",
"source": "sirt@juniper.net"
}
]
diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22515.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22515.json
index d67ab0561bf..f40b4ca529b 100644
--- a/CVE-2023/CVE-2023-225xx/CVE-2023-22515.json
+++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22515.json
@@ -2,20 +2,20 @@
"id": "CVE-2023-22515",
"sourceIdentifier": "security@atlassian.com",
"published": "2023-10-04T14:15:10.440",
- "lastModified": "2023-10-10T19:22:02.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T16:15:19.130",
+ "vulnStatus": "Undergoing Analysis",
"cisaExploitAdd": "2023-10-05",
- "cisaActionDue": "2023-10-26",
- "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
- "cisaVulnerabilityName": "Atlassian Confluence Data Center and Server Privilege Escalation Vulnerability",
+ "cisaActionDue": "2023-10-13",
+ "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.",
+ "cisaVulnerabilityName": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability",
"descriptions": [
{
"lang": "en",
- "value": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.\n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. \n\nFor more details, please review the linked advisory on this CVE."
+ "value": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. "
},
{
"lang": "es",
- "value": "Atlassian ha sido informado de un problema por un pu\u00f1ado de clientes que atacantes externos pueden haber explotado una vulnerabilidad previamente desconocida en instancias de Confluence Data Center y Server de acceso p\u00fablico para crear cuentas de administrador de Confluence no autorizadas y acceder a instancias de Confluence. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a trav\u00e9s de un dominio atlassian.net, est\u00e1 alojado en Atlassian y no es vulnerable a este problema. Para obtener m\u00e1s detalles, revise el aviso vinculado sobre este CVE."
+ "value": "Atlassian ha sido informado de un problema informado por un pu\u00f1ado de clientes en el que atacantes externos pueden haber explotado una vulnerabilidad previamente desconocida en instancias de Confluence Data Center and Server de acceso p\u00fablico para crear cuentas de administrador de Confluence no autorizadas y acceder a instancias de Confluence. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a trav\u00e9s de un dominio atlassian.net, est\u00e1 alojado en Atlassian y no es vulnerable a este problema."
}
],
"metrics": {
@@ -131,6 +131,10 @@
}
],
"references": [
+ {
+ "url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html",
+ "source": "security@atlassian.com"
+ },
{
"url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515",
"source": "security@atlassian.com",
@@ -146,12 +150,8 @@
]
},
{
- "url": "https://jira.atlassian.com/browse/CONFSERVER-92457",
- "source": "security@atlassian.com",
- "tags": [
- "Issue Tracking",
- "Permissions Required"
- ]
+ "url": "https://jira.atlassian.com/browse/CONFSERVER-92475",
+ "source": "security@atlassian.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22812.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22812.json
index d5ecaad8370..319c8f1f656 100644
--- a/CVE-2023/CVE-2023-228xx/CVE-2023-22812.json
+++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22812.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-22812",
"sourceIdentifier": "psirt@wdc.com",
"published": "2023-03-24T20:15:15.343",
- "lastModified": "2023-03-29T15:03:46.660",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T18:15:09.740",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "SanDisk PrivateAccess versions prior to 6.4.9 support insecure TLS 1.0 and TLS 1.1 protocols which are susceptible to man-in-the-middle attacks thereby compromising confidentiality and integrity of data."
+ "value": "SanDisk PrivateAccess versions prior to 6.4.9 support insecure TLS 1.0 and TLS 1.1 protocols which are susceptible to man-in-the-middle attacks thereby compromising confidentiality and integrity of data. \n"
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22932.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22932.json
index 238b88cbd18..a534a52218e 100644
--- a/CVE-2023/CVE-2023-229xx/CVE-2023-22932.json
+++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22932.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-22932",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-02-14T18:15:12.143",
- "lastModified": "2023-02-23T14:41:12.553",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.160",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -98,6 +98,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://research.splunk.com/application/ce6e1268-e01c-4df2-a617-0f034ed49a43/",
+ "source": "prodsec@splunk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22933.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22933.json
index e7c2fc39c0e..140f32052bb 100644
--- a/CVE-2023/CVE-2023-229xx/CVE-2023-22933.json
+++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22933.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-22933",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-02-14T18:15:12.220",
- "lastModified": "2023-02-23T15:17:24.610",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.243",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a View allows for Cross-Site Scripting (XSS) in an extensible mark-up language (XML) View through the \u2018layoutPanel\u2019 attribute in the \u2018module\u2019 tag\u2019. The vulnerability affects instances with Splunk Web enabled."
+ "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a View allows for Cross-Site Scripting (XSS) in an extensible mark-up language (XML) View through the \u2018layoutPanel\u2019 attribute in the \u2018module\u2019 tag\u2019."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22934.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22934.json
index d1107cf5b2f..a36be625bd0 100644
--- a/CVE-2023/CVE-2023-229xx/CVE-2023-22934.json
+++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22934.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-22934",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-02-14T18:15:12.297",
- "lastModified": "2023-02-23T15:27:14.540",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.307",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018pivot\u2019 search processing language (SPL) command lets a search bypass [SPL safeguards for risky commands](https://docs.splunk.com/Documentation/Splunk/latest/Security/SPLsafeguards) using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser. The vulnerability affects instances with Splunk Web enabled."
+ "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018pivot\u2019 search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22935.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22935.json
index dff0736269d..89acc60ba34 100644
--- a/CVE-2023/CVE-2023-229xx/CVE-2023-22935.json
+++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22935.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-22935",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-02-14T18:15:12.377",
- "lastModified": "2023-02-23T16:51:16.563",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.370",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018display.page.search.patterns.sensitivity\u2019 search parameter lets a search bypass [SPL safeguards for risky commands](https://docs.splunk.com/Documentation/Splunk/latest/Security/SPLsafeguards). The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled."
+ "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018display.page.search.patterns.sensitivity\u2019 search parameter lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled. "
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22937.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22937.json
index d93516b9ae6..6a7a7a6524a 100644
--- a/CVE-2023/CVE-2023-229xx/CVE-2023-22937.json
+++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22937.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-22937",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-02-14T18:15:12.540",
- "lastModified": "2023-02-23T17:06:42.767",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.447",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the lookup table upload feature let a user upload lookup tables with unnecessary filename extensions. Lookup table file extensions may now be one of the following only: .csv, .csv.gz, .kmz, .kml, .mmdb, or .mmdb.gzl. For more information on lookup table files, see [About lookups](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Aboutlookupsandfieldactions)."
+ "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the lookup table upload feature let a user upload lookup tables with unnecessary filename extensions. Lookup table file extensions may now be one of the following only: .csv, .csv.gz, .kmz, .kml, .mmdb, or .mmdb.gzl."
}
],
"metrics": {
@@ -113,6 +113,10 @@
"Mitigation",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://research.splunk.com/application/b7d1293f-e78f-415e-b5f6-443df3480082/",
+ "source": "prodsec@splunk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22939.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22939.json
index a859749fa4a..4b4bb0064fe 100644
--- a/CVE-2023/CVE-2023-229xx/CVE-2023-22939.json
+++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22939.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-22939",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-02-14T18:15:12.687",
- "lastModified": "2023-02-23T15:48:40.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.517",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018map\u2019 search processing language (SPL) command lets a search [bypass SPL safeguards for risky commands](https://docs.splunk.com/Documentation/Splunk/latest/Security/SPLsafeguards). The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled."
+ "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the \u2018map\u2019 search processing language (SPL) command lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled. "
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22940.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22940.json
index d98dacd2d48..20a7552bac3 100644
--- a/CVE-2023/CVE-2023-229xx/CVE-2023-22940.json
+++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22940.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-22940",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-02-14T18:15:12.760",
- "lastModified": "2023-02-23T15:58:38.460",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.587",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, aliases of the \u2018collect\u2019 search processing language (SPL) command, including \u2018summaryindex\u2019, \u2018sumindex\u2019, \u2018stash\u2019,\u2019 mcollect\u2019, and \u2018meventcollect\u2019, were not designated as safeguarded commands. The commands could potentially allow for the exposing of data to a summary index that unprivileged users could access. The vulnerability requires a higher privileged user to initiate a request within their browser, and only affects instances with Splunk Web enabled."
+ "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, aliases of the \u2018collect\u2019 search processing language (SPL) command, including \u2018summaryindex\u2019, \u2018sumindex\u2019, \u2018stash\u2019,\u2019 mcollect\u2019, and \u2018meventcollect\u2019, were not designated as safeguarded commands. The commands could potentially allow for the exposing of data to a summary index that unprivileged users could access. The vulnerability requires a higher privileged user to initiate a request within their browser, and only affects instances with Splunk Web enabled. "
}
],
"metrics": {
@@ -114,11 +114,8 @@
]
},
{
- "url": "https://research.splunk.com/endpoint/ee69374a-d27e-4136-adac-956a96ff60fd",
- "source": "prodsec@splunk.com",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/",
+ "source": "prodsec@splunk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22941.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22941.json
index 39990f4672d..be556f25710 100644
--- a/CVE-2023/CVE-2023-229xx/CVE-2023-22941.json
+++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22941.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-22941",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-02-14T18:15:12.837",
- "lastModified": "2023-02-23T16:03:31.600",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.657",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, an improperly-formatted \u2018INGEST_EVAL\u2019 parameter in a [Field Transformation](https://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Managefieldtransforms) crashes the Splunk daemon (splunkd)."
+ "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, an improperly-formatted \u2018INGEST_EVAL\u2019 parameter in a Field Transformation crashes the Splunk daemon (splunkd)."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22942.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22942.json
index 99a2541411d..40fc3d87bbc 100644
--- a/CVE-2023/CVE-2023-229xx/CVE-2023-22942.json
+++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22942.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-22942",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-02-14T18:15:12.907",
- "lastModified": "2023-02-23T16:08:20.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.727",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the \u2018kvstore_client\u2019 REST endpoint lets a potential attacker update SSG [App Key Value Store (KV store)](https://docs.splunk.com/Documentation/Splunk/latest/Admin/AboutKVstore) collections using an HTTP GET request. SSG is a Splunk-built app that comes with Splunk Enterprise. The vulnerability affects instances with SSG and Splunk Web enabled."
+ "value": "In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, a cross-site request forgery in the Splunk Secure Gateway (SSG) app in the \u2018kvstore_client\u2019 REST endpoint lets a potential attacker update SSG KV store collections using an HTTP GET request."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22943.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22943.json
index b40f3d78397..3ecef5c8513 100644
--- a/CVE-2023/CVE-2023-229xx/CVE-2023-22943.json
+++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22943.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-22943",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-02-14T18:15:12.993",
- "lastModified": "2023-02-23T16:17:58.663",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.793",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs. The vulnerability affects AoB and apps that AoB generates when using the REST API Modular Input functionality through its user interface. The vulnerability also potentially affects third-party apps and add-ons that call the *cloudconnectlib.splunktacollectorlib.cloud_connect_mod_input* Python class directly."
+ "value": "In Splunk Add-on Builder (AoB) versions below 4.1.2 and the Splunk CloudConnect SDK versions below 3.1.3, requests to third-party APIs through the REST API Modular Input incorrectly revert to using HTTP to connect after a failure to connect over HTTPS occurs."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json
index 5778e9be3e7..315c0b4e6b8 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2241",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-22T16:15:42.050",
- "lastModified": "2023-04-29T03:03:33.527",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-22T15:15:08.713",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as critical, was found in PoDoFo 0.10.0. Affected is the function readXRefStreamEntry of the file PdfXRefStreamParserObject.cpp. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is 535a786f124b739e3c857529cecc29e4eeb79778. It is recommended to apply a patch to fix this issue. VDB-227226 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as critical, was found in PoDoFo 0.10.0. Affected is the function readXRefStreamEntry of the file PdfXRefStreamParserObject.cpp. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 535a786f124b739e3c857529cecc29e4eeb79778. It is recommended to apply a patch to fix this issue. VDB-227226 is the identifier assigned to this vulnerability."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2246.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2246.json
index e0947332788..ddb1e7b0bf0 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2246.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2246.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2246",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-23T16:15:07.107",
- "lastModified": "2023-05-05T19:15:15.603",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-22T16:15:08.283",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -83,7 +83,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -93,7 +93,7 @@
]
},
{
- "source": "nvd@nist.gov",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
@@ -121,10 +121,6 @@
}
],
"references": [
- {
- "url": "http://packetstormsecurity.com/files/172182/Online-Pizza-Ordering-System-1.0-Shell-Upload.html",
- "source": "cna@vuldb.com"
- },
{
"url": "https://docs.google.com/document/d/1Bzt1UOXHJYyNFvTUsMO4zfbiDd_cKxuEygjAww2GcZQ/edit",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2269.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2269.json
index b341a78b702..3dd7bfce7fc 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2269.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2269.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2269",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-04-25T21:15:10.627",
- "lastModified": "2023-09-29T22:15:10.877",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:13.207",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -103,6 +103,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "secalert@redhat.com"
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63AJUCJTZCII2JMAF7MGZEM66KY7IALT/",
"source": "secalert@redhat.com",
diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23373.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23373.json
new file mode 100644
index 00000000000..eb6db3ea0cf
--- /dev/null
+++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23373.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-23373",
+ "sourceIdentifier": "security@qnapsecurity.com.tw",
+ "published": "2023-10-20T17:15:08.427",
+ "lastModified": "2023-10-26T17:22:35.563",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An OS command injection vulnerability has been reported to affect QUSBCam2. If exploited, the vulnerability could allow users to execute commands via a network.\n\nWe have already fixed the vulnerability in the following version:\nQUSBCam2 2.0.3 ( 2023/06/15 ) and later\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se ha informado que una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo afecta a QUSBCam2. Si se explota, la vulnerabilidad podr\u00eda permitir a los usuarios ejecutar comandos a trav\u00e9s de una red. Ya hemos solucionado la vulnerabilidad en la siguiente versi\u00f3n: QUSBCam2 2.0.3 (2023/06/15) y posteriores"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@qnapsecurity.com.tw",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
+ {
+ "source": "security@qnapsecurity.com.tw",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:qnap:qusbcam2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.0.3",
+ "matchCriteriaId": "640A39B0-28DE-4F65-BCF8-D91334E0D071"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.qnap.com/en/security-advisory/qsa-23-43",
+ "source": "security@qnapsecurity.com.tw",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23374.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23374.json
index 188c09ec4f5..7b15c7e326d 100644
--- a/CVE-2023/CVE-2023-233xx/CVE-2023-23374.json
+++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23374.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-23374",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-02-14T20:15:16.827",
- "lastModified": "2023-09-30T11:15:13.287",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:53:36.303",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -87,7 +87,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23581.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23581.json
index 0fca8ad15af..2ebd4a31348 100644
--- a/CVE-2023/CVE-2023-235xx/CVE-2023-23581.json
+++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23581.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-23581",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-12T16:15:10.937",
- "lastModified": "2023-10-12T16:52:07.503",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T02:46:13.130",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service vulnerability exists in the vpnserver EnSafeHttpHeaderValueStr functionality of SoftEther VPN 5.01.9674 and 5.02. A specially crafted network packet can lead to denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en la funcionalidad vpnserver EnSafeHttpHeaderValueStr de SoftEther VPN 5.01.9674 y 5.02. Un paquete de red especialmente manipulado puede provocar una Denegaci\u00f3n de Servicio (DoS)."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,10 +80,36 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CF5CF13-B22F-494B-BDC0-B59371979251"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.02:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D21F370B-D9F2-43E8-8E45-0EA74A3C9D4B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1741",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23632.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23632.json
index b14468eca88..9bd5081e26d 100644
--- a/CVE-2023/CVE-2023-236xx/CVE-2023-23632.json
+++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23632.json
@@ -2,19 +2,80 @@
"id": "CVE-2023-23632",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T20:15:12.187",
- "lastModified": "2023-10-13T12:47:48.873",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:28:11.450",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BeyondTrust Privileged Remote Access (PRA) versions 22.2.x to 22.4.x are vulnerable to a local authentication bypass. Attackers can exploit a flawed secret verification process in the BYOT shell jump sessions, allowing unauthorized access to jump items by guessing only the first character of the secret."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones 22.2.x a 22.4.x de BeyondTrust Privileged Remote Access (PRA) son vulnerables a una omisi\u00f3n de autenticaci\u00f3n local. Los atacantes pueden aprovechar un proceso de verificaci\u00f3n de secretos defectuoso en las sesiones de salto del shell BYOT, lo que permite el acceso no autorizado a elementos de salto adivinando solo el primer car\u00e1cter del secreto."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:beyondtrust:privileged_remote_access:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "22.2.1",
+ "versionEndExcluding": "22.3.3",
+ "matchCriteriaId": "31A784B4-BF67-4CBC-BD67-688E05CFD037"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://www.compass-security.com/fileadmin/Research/Advisories/2023_03_CSNC-2022-018_PRA_Privilege_Escalation.txt",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23737.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23737.json
index 5bbdb018977..bd6b4692430 100644
--- a/CVE-2023/CVE-2023-237xx/CVE-2023-23737.json
+++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23737.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-23737",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-12T12:15:10.313",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T17:58:03.137",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unauth. SQL Injection (SQLi) vulnerability in MainWP MainWP Broken Links Checker Extension plugin <=\u00a04.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de inyecci\u00f3n SQL (SQLi) no autenticada en el complemento MainWP MainWP Broken Links Checker Extension en versiones <= 4.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:managewp:broken_link_checker:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "4.0",
+ "matchCriteriaId": "9902C28E-4CCB-4F8A-82F0-A73F47493A10"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mainwp-broken-links-checker-extension/wordpress-mainwp-broken-links-checker-extension-plugin-4-0-unauthenticated-sql-injection-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23767.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23767.json
new file mode 100644
index 00000000000..fa2bcfd630f
--- /dev/null
+++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23767.json
@@ -0,0 +1,71 @@
+{
+ "id": "CVE-2023-23767",
+ "sourceIdentifier": "product-cna@github.com",
+ "published": "2023-10-25T18:17:23.870",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Incorrect Permission Assignment for Critical Resource in GitHub Enterprise Server that allowed local operating system user accounts to read MySQL connection details including the MySQL password via configuration files.\u00a0This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.7.18, 3.8.11, 3.9.6, and 3.10.3.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Asignaci\u00f3n de permisos incorrecta para recursos cr\u00edticos en GitHub Enterprise Server que permit\u00eda a las cuentas de usuario del sistema operativo local leer los detalles de la conexi\u00f3n MySQL, incluida la contrase\u00f1a de MySQL, a trav\u00e9s de archivos de configuraci\u00f3n. Esta vulnerabilidad afect\u00f3 a todas las versiones de GitHub Enterprise Server y se solucion\u00f3 en las versiones 3.7.18, 3.8.11, 3.9.6 y 3.10.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "product-cna@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "product-cna@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.3",
+ "source": "product-cna@github.com"
+ },
+ {
+ "url": "https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.18",
+ "source": "product-cna@github.com"
+ },
+ {
+ "url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.11",
+ "source": "product-cna@github.com"
+ },
+ {
+ "url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.6",
+ "source": "product-cna@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23914.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23914.json
index fbe8603b8fe..8418b4498fc 100644
--- a/CVE-2023/CVE-2023-239xx/CVE-2023-23914.json
+++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23914.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-23914",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-23T20:15:13.637",
- "lastModified": "2023-10-11T11:15:10.340",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:57:11.737",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -73,6 +73,134 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
+ "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "52DE3DFE-350F-4E83-B425-1D7D47BEF6DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,11 +214,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23915.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23915.json
index 3c8913fc4aa..fad0f755d89 100644
--- a/CVE-2023/CVE-2023-239xx/CVE-2023-23915.json
+++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23915.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-23915",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-23T20:15:13.703",
- "lastModified": "2023-10-11T11:15:10.793",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:57:08.397",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -73,6 +73,134 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
+ "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "52DE3DFE-350F-4E83-B425-1D7D47BEF6DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -85,11 +213,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23916.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23916.json
index bf5a3775470..fc0cdaf9062 100644
--- a/CVE-2023/CVE-2023-239xx/CVE-2023-23916.json
+++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23916.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-23916",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-02-23T20:15:13.777",
- "lastModified": "2023-10-11T11:15:10.960",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:56:59.260",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -260,7 +260,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2307.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2307.json
index 8b91365eee5..edb3e857120 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2307.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2307.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2307",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-04-26T17:15:11.217",
- "lastModified": "2023-10-10T08:15:10.687",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T20:29:14.063",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -56,7 +56,7 @@
},
"weaknesses": [
{
- "source": "security@huntr.dev",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -64,6 +64,16 @@
"value": "CWE-352"
}
]
+ },
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
}
],
"configurations": [
@@ -87,7 +97,10 @@
"references": [
{
"url": "https://github.com/BuilderIO/qwik/pull/3862/commits/09190b70027354baf7ad3d208df9c05a87f75f57",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/204ea12e-9e5c-4166-bf0e-fd49c8836917",
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2325.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2325.json
new file mode 100644
index 00000000000..1e806b1fa37
--- /dev/null
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2325.json
@@ -0,0 +1,120 @@
+{
+ "id": "CVE-2023-2325",
+ "sourceIdentifier": "security@m-files.com",
+ "published": "2023-10-20T07:15:15.213",
+ "lastModified": "2023-10-26T17:36:35.787",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Stored XSS Vulnerability in M-Files Classic Web versions before 23.10\u00a0and LTS Service Release Versions before 23.2 LTS SR4 and 23.8 LTS SR1allows attacker to execute script on users browser via stored HTML document.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en las versiones M-Files Classic Web anteriores a 23.10 y LTS Service Release Versions anteriores a 23.2 LTS SR4 y 23.8 LTS SR1 permite al atacante ejecutar scripts en el navegador de los usuarios a trav\u00e9s de un documento HTML almacenado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@m-files.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@m-files.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:m-files:classic_web:*:*:*:*:-:*:*:*",
+ "versionEndExcluding": "23.10",
+ "matchCriteriaId": "28E12800-4297-4473-B24F-9D71897DB877"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:m-files:classic_web:23.2:-:*:*:lts:*:*:*",
+ "matchCriteriaId": "4E66A68C-65E6-48E9-97DD-621B4B73D975"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:m-files:classic_web:23.8:-:*:*:lts:*:*:*",
+ "matchCriteriaId": "B6C757FE-8BF2-4CFC-A0CF-4EDFB77C8D96"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.m-files.com/about/trust-center/security-advisories/cve-2023-2325/",
+ "source": "security@m-files.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24198.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24198.json
index 9525cb999d0..47270d9b0a0 100644
--- a/CVE-2023/CVE-2023-241xx/CVE-2023-24198.json
+++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24198.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24198",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T15:15:10.827",
- "lastModified": "2023-02-10T04:53:36.893",
+ "lastModified": "2023-10-18T15:28:51.693",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:raffle_draw_system_project:raffle_draw_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "3292C3CB-82C1-4E6D-970B-AE09766A82DB"
+ "criteria": "cpe:2.3:a:oretnom23:raffle_draw_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F67511D-93BB-4CB7-8880-FE97D266A1B4"
}
]
}
diff --git a/CVE-2023/CVE-2023-241xx/CVE-2023-24199.json b/CVE-2023/CVE-2023-241xx/CVE-2023-24199.json
index 76ba0b9a9bc..1bfa12709aa 100644
--- a/CVE-2023/CVE-2023-241xx/CVE-2023-24199.json
+++ b/CVE-2023/CVE-2023-241xx/CVE-2023-24199.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24199",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T15:15:10.917",
- "lastModified": "2023-02-10T04:51:07.777",
+ "lastModified": "2023-10-18T15:29:34.800",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:raffle_draw_system_project:raffle_draw_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "3292C3CB-82C1-4E6D-970B-AE09766A82DB"
+ "criteria": "cpe:2.3:a:oretnom23:raffle_draw_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F67511D-93BB-4CB7-8880-FE97D266A1B4"
}
]
}
diff --git a/CVE-2023/CVE-2023-242xx/CVE-2023-24200.json b/CVE-2023/CVE-2023-242xx/CVE-2023-24200.json
index 7c6f50658d2..13e97cc9ed1 100644
--- a/CVE-2023/CVE-2023-242xx/CVE-2023-24200.json
+++ b/CVE-2023/CVE-2023-242xx/CVE-2023-24200.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24200",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T15:15:11.007",
- "lastModified": "2023-02-10T04:51:15.737",
+ "lastModified": "2023-10-18T15:31:32.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:raffle_draw_system_project:raffle_draw_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "3292C3CB-82C1-4E6D-970B-AE09766A82DB"
+ "criteria": "cpe:2.3:a:oretnom23:raffle_draw_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F67511D-93BB-4CB7-8880-FE97D266A1B4"
}
]
}
diff --git a/CVE-2023/CVE-2023-242xx/CVE-2023-24201.json b/CVE-2023/CVE-2023-242xx/CVE-2023-24201.json
index 0011d1eb5c7..3e2f6758146 100644
--- a/CVE-2023/CVE-2023-242xx/CVE-2023-24201.json
+++ b/CVE-2023/CVE-2023-242xx/CVE-2023-24201.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24201",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T15:15:11.097",
- "lastModified": "2023-02-10T04:51:59.563",
+ "lastModified": "2023-10-18T15:32:22.423",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:raffle_draw_system_project:raffle_draw_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "3292C3CB-82C1-4E6D-970B-AE09766A82DB"
+ "criteria": "cpe:2.3:a:oretnom23:raffle_draw_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F67511D-93BB-4CB7-8880-FE97D266A1B4"
}
]
}
diff --git a/CVE-2023/CVE-2023-242xx/CVE-2023-24202.json b/CVE-2023/CVE-2023-242xx/CVE-2023-24202.json
index c1f80fe35f0..3c120f47dee 100644
--- a/CVE-2023/CVE-2023-242xx/CVE-2023-24202.json
+++ b/CVE-2023/CVE-2023-242xx/CVE-2023-24202.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-24202",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-06T15:15:11.183",
- "lastModified": "2023-02-10T04:52:09.047",
+ "lastModified": "2023-10-18T15:32:30.043",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:raffle_draw_system_project:raffle_draw_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "3292C3CB-82C1-4E6D-970B-AE09766A82DB"
+ "criteria": "cpe:2.3:a:oretnom23:raffle_draw_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F67511D-93BB-4CB7-8880-FE97D266A1B4"
}
]
}
diff --git a/CVE-2023/CVE-2023-243xx/CVE-2023-24385.json b/CVE-2023/CVE-2023-243xx/CVE-2023-24385.json
index 0926f7b2c6c..e215ced9ed0 100644
--- a/CVE-2023/CVE-2023-243xx/CVE-2023-24385.json
+++ b/CVE-2023/CVE-2023-243xx/CVE-2023-24385.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-24385",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-17T09:15:09.960",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T15:02:07.950",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -50,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:davidlingren:media_library_assistant:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.12",
+ "matchCriteriaId": "1FE5C2DE-E210-4D3E-89A7-FF21821516CE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/media-library-assistant/wordpress-media-library-assistant-plugin-3-11-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24429.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24429.json
index 83b9d0278b4..1e849661493 100644
--- a/CVE-2023/CVE-2023-244xx/CVE-2023-24429.json
+++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24429.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-24429",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.110",
- "lastModified": "2023-02-04T02:06:33.267",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:23.990",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -66,11 +66,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24430.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24430.json
index c74073303fc..0115692473f 100644
--- a/CVE-2023/CVE-2023-244xx/CVE-2023-24430.json
+++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24430.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-24430",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.170",
- "lastModified": "2023-02-04T01:58:28.333",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.057",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -66,11 +66,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24431.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24431.json
index b2a170736c0..dba9bedf128 100644
--- a/CVE-2023/CVE-2023-244xx/CVE-2023-24431.json
+++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24431.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-24431",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.240",
- "lastModified": "2023-02-02T15:46:07.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.110",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -66,11 +66,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24432.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24432.json
index 139997f0fea..1de797ab676 100644
--- a/CVE-2023/CVE-2023-244xx/CVE-2023-24432.json
+++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24432.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-24432",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.307",
- "lastModified": "2023-02-02T15:45:03.793",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.167",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -66,11 +66,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24433.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24433.json
index 13b9d5ed535..972ffcff315 100644
--- a/CVE-2023/CVE-2023-244xx/CVE-2023-24433.json
+++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24433.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-24433",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.387",
- "lastModified": "2023-02-02T15:45:32.247",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.233",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -66,11 +66,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24434.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24434.json
index e7519dbd476..adc5c941df6 100644
--- a/CVE-2023/CVE-2023-244xx/CVE-2023-24434.json
+++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24434.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-24434",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.457",
- "lastModified": "2023-02-02T15:30:10.487",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.300",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -66,11 +66,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24435.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24435.json
index 9df89089315..82dabad4415 100644
--- a/CVE-2023/CVE-2023-244xx/CVE-2023-24435.json
+++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24435.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-24435",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.537",
- "lastModified": "2023-02-02T13:57:32.567",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.357",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -66,11 +66,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20(2)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24436.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24436.json
index 613ab6cede1..064c5519af6 100644
--- a/CVE-2023/CVE-2023-244xx/CVE-2023-24436.json
+++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24436.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-24436",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.600",
- "lastModified": "2023-02-02T15:03:24.113",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.417",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -66,11 +66,8 @@
],
"references": [
{
- "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20(1)",
- "source": "jenkinsci-cert@googlegroups.com",
- "tags": [
- "Vendor Advisory"
- ]
+ "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%281%29",
+ "source": "jenkinsci-cert@googlegroups.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24515.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24515.json
index ff416b388b8..e79f99f176c 100644
--- a/CVE-2023/CVE-2023-245xx/CVE-2023-24515.json
+++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24515.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-24515",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-08-22T19:16:34.480",
- "lastModified": "2023-08-26T02:23:15.997",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T12:15:09.093",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -56,7 +56,7 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
@@ -66,7 +66,7 @@
]
},
{
- "source": "cve-coordination@incibe.es",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@@ -95,6 +95,10 @@
}
],
"references": [
+ {
+ "url": "https://gist.github.com/damodarnaik/9cc76c6b320510c34a0a668bd7439f7b",
+ "source": "cve-coordination@incibe.es"
+ },
{
"url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",
"source": "cve-coordination@incibe.es",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2459.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2459.json
index 2f3b5188548..3a871587cd7 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2459.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2459.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2459",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-03T00:15:08.803",
- "lastModified": "2023-09-30T11:15:14.233",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:54:50.567",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -84,6 +84,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@@ -119,15 +129,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5398",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2460.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2460.json
index cda401d4405..0541faf0442 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2460.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2460.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2460",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-03T00:15:09.327",
- "lastModified": "2023-09-30T11:15:14.307",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:54:54.283",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "NVD-CWE-noinfo"
}
]
}
@@ -84,6 +84,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@@ -119,15 +129,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5398",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2461.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2461.json
index bd53f265b32..fa407d4082b 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2461.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2461.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2461",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-03T00:15:09.387",
- "lastModified": "2023-09-30T11:15:14.367",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:03:15.903",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -96,6 +96,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@@ -131,15 +141,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5398",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2462.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2462.json
index 40d4fd3b777..b7ddeb47df4 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2462.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2462.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2462",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-03T00:15:09.443",
- "lastModified": "2023-09-30T11:15:14.440",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:51:46.813",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -119,15 +124,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5398",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2463.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2463.json
index ce46f42570a..55d670a6a62 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2463.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2463.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2463",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-03T00:15:09.497",
- "lastModified": "2023-09-30T11:15:14.500",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:03:56.857",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -81,6 +81,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@@ -131,15 +141,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5398",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2464.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2464.json
index b2feb9f3655..7f728037a9b 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2464.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2464.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2464",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-03T00:15:09.550",
- "lastModified": "2023-09-30T11:15:14.560",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:04:01.780",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@@ -119,15 +129,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5398",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2465.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2465.json
index 7044faf46cb..80aedba131d 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2465.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2465.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2465",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-03T00:15:09.597",
- "lastModified": "2023-09-30T11:15:14.623",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T19:06:16.967",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@@ -119,15 +129,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5398",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2466.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2466.json
index f1ff684c57e..d4489bc1c7c 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2466.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2466.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2466",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-03T00:15:09.647",
- "lastModified": "2023-09-30T11:15:14.697",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:04:05.570",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@@ -119,15 +129,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5398",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2467.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2467.json
index 0d96e9935ac..1c9f7c61b14 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2467.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2467.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2467",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-03T00:15:09.697",
- "lastModified": "2023-09-30T11:15:14.757",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:04:08.910",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -81,6 +81,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@@ -131,15 +141,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5398",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2468.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2468.json
index e3548b7bb9b..810b15803e0 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2468.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2468.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2468",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-03T00:15:09.747",
- "lastModified": "2023-09-30T11:15:14.817",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T21:04:13.863",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,6 +69,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@@ -119,15 +129,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3V6GPGMY6ZWVWPECMQGGOKQVATXJ5BA/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4JI552XDFD6DYFU6WNCRBCAXWOFOOSF/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5398",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json
index 251aa9010c2..9fb3d929adb 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2475",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T13:15:25.287",
- "lastModified": "2023-05-09T17:27:09.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T06:15:08.267",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument ?? leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867."
+ "value": "A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument ?? leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2476.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2476.json
index 20416833fda..0274b4079de 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2476.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2476.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2476",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T14:15:09.273",
- "lastModified": "2023-05-09T17:21:53.020",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T06:15:10.087",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25032.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25032.json
new file mode 100644
index 00000000000..f29cc9d765e
--- /dev/null
+++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25032.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-25032",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:24.597",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Print, PDF, Email by PrintFriendly plugin <=\u00a05.5.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenada autenticada (con permisos de admin o superiores) en el complemento PrintFriendly en Print, PDF y Email en versiones <= 5.5.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/printfriendly/wordpress-print-pdf-email-by-printfriendly-plugin-5-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25476.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25476.json
new file mode 100644
index 00000000000..419d32fbf56
--- /dev/null
+++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25476.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-25476",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T08:15:07.570",
+ "lastModified": "2023-10-25T17:38:34.117",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ezoic AmpedSense \u2013 AdSense Split Tester plugin <=\u00a04.68 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Ezoic AmpedSense de AdSense Split Tester en versiones <= 4.68."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ezoic:ampedsense:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "4.68",
+ "matchCriteriaId": "93D680E4-4E9E-4B4C-AFDC-057406063535"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/ampedsense-adsense-split-tester/wordpress-ampedsense-adsense-split-tester-plugin-4-68-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25753.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25753.json
new file mode 100644
index 00000000000..81f6dc3bc24
--- /dev/null
+++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25753.json
@@ -0,0 +1,90 @@
+{
+ "id": "CVE-2023-25753",
+ "sourceIdentifier": "security@apache.org",
+ "published": "2023-10-19T09:15:08.480",
+ "lastModified": "2023-10-25T17:20:20.830",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nThere exists an SSRF (Server-Side Request Forgery) vulnerability located at the /sandbox/proxyGateway endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter.\n\nOf particular concern is our ability to exert control over the HTTP method, cookies, IP address, and headers. This effectively grants us the capability to dispatch complete HTTP requests to hosts of our choosing.\n\nThis issue affects Apache ShenYu: 2.5.1.\n\nUpgrade to Apache ShenYu 2.6.0 or apply patch\u00a0 https://github.com/apache/shenyu/pull/4776 \u00a0.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad SSRF (falsificaci\u00f3n de solicitudes del lado del servidor) ubicada en el endpoint /sandbox/proxyGateway. Esta vulnerabilidad nos permite manipular solicitudes arbitrarias y recuperar las respuestas correspondientes ingresando cualquier URL en el par\u00e1metro requestUrl. De particular preocupaci\u00f3n es nuestra capacidad para ejercer control sobre el m\u00e9todo HTTP, las cookies, la direcci\u00f3n IP y los encabezados. Esto efectivamente nos otorga la capacidad de enviar solicitudes HTTP completas a los hosts de nuestra elecci\u00f3n. Este problema afecta a Apache ShenYu: 2.5.1. Actualice a Apache ShenYu 2.6.0 o aplique el parche https://github.com/apache/shenyu/pull/4776"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ },
+ {
+ "source": "security@apache.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:shenyu:2.5.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FF6FCF7-9CEF-4E24-B669-256B1C825361"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://lists.apache.org/thread/chprswxvb22z35vnoxv9tt3zknsm977d",
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25761.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25761.json
index 2bceb5e1856..b8c52859d0e 100644
--- a/CVE-2023/CVE-2023-257xx/CVE-2023-25761.json
+++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25761.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25761",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.387",
- "lastModified": "2023-02-23T04:48:24.287",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.680",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json
index 1167e9361ca..950d5e3fca3 100644
--- a/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json
+++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25762",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.470",
- "lastModified": "2023-02-23T04:48:16.377",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.743",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json
index 480a6fd9b04..ab552c41207 100644
--- a/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json
+++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25763",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.543",
- "lastModified": "2023-02-23T04:48:08.983",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.803",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25764.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25764.json
index 5e6f0a821a4..79b94d42d42 100644
--- a/CVE-2023/CVE-2023-257xx/CVE-2023-25764.json
+++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25764.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25764",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.617",
- "lastModified": "2023-02-23T04:48:01.200",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.857",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -44,16 +44,6 @@
"value": "CWE-79"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-79"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25765.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25765.json
index 0e61ce0b151..b53867149b3 100644
--- a/CVE-2023/CVE-2023-257xx/CVE-2023-25765.json
+++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25765.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25765",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.700",
- "lastModified": "2023-02-23T04:47:47.887",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.917",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-693"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25766.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25766.json
index e6a6ae60de6..233ba0c1b21 100644
--- a/CVE-2023/CVE-2023-257xx/CVE-2023-25766.json
+++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25766.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25766",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.773",
- "lastModified": "2023-03-01T20:09:45.747",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:24.967",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -44,16 +44,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25767.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25767.json
index acb322de66a..c03080793ad 100644
--- a/CVE-2023/CVE-2023-257xx/CVE-2023-25767.json
+++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25767.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25767",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.847",
- "lastModified": "2023-02-24T15:27:53.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:25.027",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -34,18 +34,6 @@
}
]
},
- "weaknesses": [
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Primary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-352"
- }
- ]
- }
- ],
"configurations": [
{
"nodes": [
diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25768.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25768.json
index d7800b4a6c1..b36aa94f541 100644
--- a/CVE-2023/CVE-2023-257xx/CVE-2023-25768.json
+++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25768.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-25768",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.947",
- "lastModified": "2023-03-08T17:35:46.383",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:25.083",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -44,16 +44,6 @@
"value": "CWE-862"
}
]
- },
- {
- "source": "jenkinsci-cert@googlegroups.com",
- "type": "Secondary",
- "description": [
- {
- "lang": "en",
- "value": "CWE-862"
- }
- ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25774.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25774.json
index a3562076b8c..9010a8046f2 100644
--- a/CVE-2023/CVE-2023-257xx/CVE-2023-25774.json
+++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25774.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-25774",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-12T16:15:11.297",
- "lastModified": "2023-10-12T16:52:07.503",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T17:53:08.367",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service vulnerability exists in the vpnserver ConnectionAccept() functionality of SoftEther VPN 5.02. A set of specially crafted network connections can lead to denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de Denegaci\u00f3n de Servicio (DoS) en la funcionalidad vpnserver ConnectionAccept() de SoftEther VPN 5.02. Un conjunto de conexiones de red especialmente manipuladas puede provocar una Denegaci\u00f3n de Servicio (DoS). Un atacante puede enviar una secuencia de paquetes maliciosos para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.02:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D21F370B-D9F2-43E8-8E45-0EA74A3C9D4B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1743",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2564.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2564.json
index 0722091ea48..d25cc09e3b6 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2564.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2564.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2564",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-07T14:15:42.343",
- "lastModified": "2023-10-10T08:15:10.790",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T20:27:01.213",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -87,7 +87,10 @@
"references": [
{
"url": "https://github.com/sbs20/scanservjs/pull/606/commits/d51fd52c1569813990b8f74e64ae6979c665dca1",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/d13113ad-a107-416b-acc1-01e4c16ec461",
diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26112.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26112.json
index 1146e7568f6..29aadb1c75b 100644
--- a/CVE-2023/CVE-2023-261xx/CVE-2023-26112.json
+++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26112.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-26112",
"sourceIdentifier": "report@snyk.io",
"published": "2023-04-03T05:15:07.753",
- "lastModified": "2023-04-10T13:57:52.633",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T04:15:10.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\\((.*)\\). **Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file."
+ "value": "All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\\((.*)\\).\r\r**Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.\r\r"
}
],
"metrics": {
@@ -91,6 +91,14 @@
"Issue Tracking"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BO4RLMYEJODCNUE3DJIIUUFVTPAG6VN/",
+ "source": "report@snyk.io"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZHY7B33EFY4LESP2NI4APQUPRROTAZK/",
+ "source": "report@snyk.io"
+ },
{
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494",
"source": "report@snyk.io",
diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26115.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26115.json
index 28a9c5b92fb..355a86ef75b 100644
--- a/CVE-2023/CVE-2023-261xx/CVE-2023-26115.json
+++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26115.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-26115",
"sourceIdentifier": "report@snyk.io",
"published": "2023-06-22T05:15:09.157",
- "lastModified": "2023-08-24T16:15:07.820",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-23T18:57:33.990",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -76,7 +76,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:word-wrap_project:word-wrap:*:*:*:*:*:node.js:*:*",
- "matchCriteriaId": "04B48B0A-8B67-4838-A1E0-EB3CB727A813"
+ "versionEndExcluding": "1.2.4",
+ "matchCriteriaId": "F9B3A751-DF84-4680-B6CB-4D30C7F9FF5D"
}
]
}
@@ -93,7 +94,10 @@
},
{
"url": "https://github.com/jonschlinkert/word-wrap/releases/tag/1.2.4",
- "source": "report@snyk.io"
+ "source": "report@snyk.io",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657",
diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26116.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26116.json
index 5006cb7069a..57f3c997016 100644
--- a/CVE-2023/CVE-2023-261xx/CVE-2023-26116.json
+++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26116.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-26116",
"sourceIdentifier": "report@snyk.io",
"published": "2023-03-30T05:15:07.410",
- "lastModified": "2023-05-30T17:18:44.267",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T04:15:10.527",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -86,6 +86,10 @@
}
],
"references": [
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/",
+ "source": "report@snyk.io"
+ },
{
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320",
"source": "report@snyk.io",
diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26117.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26117.json
index ef26ba09fc0..82192e1c99a 100644
--- a/CVE-2023/CVE-2023-261xx/CVE-2023-26117.json
+++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26117.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-26117",
"sourceIdentifier": "report@snyk.io",
"published": "2023-03-30T05:15:07.687",
- "lastModified": "2023-05-30T17:20:47.480",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T04:15:10.637",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -86,6 +86,10 @@
}
],
"references": [
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/",
+ "source": "report@snyk.io"
+ },
{
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323",
"source": "report@snyk.io",
diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26118.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26118.json
index 428fa0e0943..3978f02b193 100644
--- a/CVE-2023/CVE-2023-261xx/CVE-2023-26118.json
+++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26118.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-26118",
"sourceIdentifier": "report@snyk.io",
"published": "2023-03-30T05:15:07.750",
- "lastModified": "2023-05-30T17:20:32.760",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T04:15:10.720",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -86,6 +86,10 @@
}
],
"references": [
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/",
+ "source": "report@snyk.io"
+ },
{
"url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326",
"source": "report@snyk.io",
diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26155.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26155.json
index df75240577a..e2667e51fb6 100644
--- a/CVE-2023/CVE-2023-261xx/CVE-2023-26155.json
+++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26155.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-26155",
"sourceIdentifier": "report@snyk.io",
"published": "2023-10-14T05:15:55.183",
- "lastModified": "2023-10-14T17:32:33.483",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:44:50.783",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "All versions of the package node-qpdf are vulnerable to Command Injection such that the package-exported method encrypt() fails to sanitize its parameter input, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they can specify the input pdf file path."
+ },
+ {
+ "lang": "es",
+ "value": "Todas las versiones del paquete node-qpdf son vulnerables a la inyecci\u00f3n de comandos, de modo que el m\u00e9todo encrypt() exportado por el paquete no puede sanitizar su entrada de par\u00e1metros, que luego fluye hacia una API de ejecuci\u00f3n de comandos confidencial. Como resultado, los atacantes pueden inyectar comandos maliciosos una vez que puedan especificar la ruta del archivo pdf de entrada."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "report@snyk.io",
"type": "Secondary",
@@ -34,14 +58,51 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-77"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nrhirani:node-qpdf:*:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC0932B9-C3A4-46E0-B0FE-8E4B7937A0D3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/nrhirani/node-qpdf/issues/23",
- "source": "report@snyk.io"
+ "source": "report@snyk.io",
+ "tags": [
+ "Exploit",
+ "Issue Tracking"
+ ]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918",
- "source": "report@snyk.io"
+ "source": "report@snyk.io",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26219.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26219.json
new file mode 100644
index 00000000000..67533031fe7
--- /dev/null
+++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26219.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-26219",
+ "sourceIdentifier": "security@tibco.com",
+ "published": "2023-10-25T18:17:25.143",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Hawk Console and Hawk Agent components of TIBCO Software Inc.'s TIBCO Hawk, TIBCO Hawk Distribution for TIBCO Silver Fabric, TIBCO Operational Intelligence Hawk RedTail, and TIBCO Runtime Agent contain a vulnerability that theoretically allows an attacker with access to the Hawk Console\u2019s and Agent\u2019s log to obtain credentials used to access associated EMS servers. Affected releases are TIBCO Software Inc.'s TIBCO Hawk: versions 6.2.2 and below, TIBCO Hawk Distribution for TIBCO Silver Fabric: versions 6.2.2 and below, TIBCO Operational Intelligence Hawk RedTail: versions 7.2.1 and below, and TIBCO Runtime Agent: versions 5.12.2 and below.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Los componentes Hawk Console y Hawk Agent de TIBCO Hawk de TIBCO Software Inc., TIBCO Hawk Distribution para TIBCO Silver Fabric, TIBCO Operational Intelligence Hawk RedTail y TIBCO Runtime Agent contienen una vulnerabilidad que te\u00f3ricamente permite a un atacante acceder al log de Hawk Console y Hawk Agent para obtener las credenciales utilizadas para acceder a los servidores EMS asociados. Las versiones afectadas son TIBCO Hawk de TIBCO Software Inc.: versiones 6.2.2 y siguientes, TIBCO Hawk Distribution para TIBCO Silver Fabric: versiones 6.2.2 y siguientes, TIBCO Operational Intelligence Hawk RedTail: versiones 7.2.1 y siguientes y TIBCO Runtime Agente: versiones 5.12.2 y anteriores."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@tibco.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.tibco.com/services/support/advisories",
+ "source": "security@tibco.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26220.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26220.json
index 417d35a629b..decc298a407 100644
--- a/CVE-2023/CVE-2023-262xx/CVE-2023-26220.json
+++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26220.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-26220",
"sourceIdentifier": "security@tibco.com",
"published": "2023-10-10T23:15:09.933",
- "lastModified": "2023-10-10T23:25:33.373",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:30:03.617",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Spotfire Library component of TIBCO Software Inc.'s Spotfire Analyst and Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s Spotfire Analyst: versions 11.4.7 and below, versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4, versions 12.1.0 and 12.1.1 and Spotfire Server: versions 11.4.11 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4, and 12.0.5, versions 12.1.0 and 12.1.1.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El componente Spotfire Library de Spotfire Analyst y Spotfire Server de TIBCO Software Inc. contiene una vulnerabilidad f\u00e1cilmente explotable que permite a un atacante con pocos privilegios y acceso a la red ejecutar Cross Site Scripting (XSS) almacenado en el sistema afectado. Un ataque exitoso que utilice esta vulnerabilidad requiere la interacci\u00f3n humana de una persona distinta del atacante. Las versiones afectadas son Spotfire Analyst de TIBCO Software Inc.: versiones 11.4.7 e inferiores, versiones 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, 12.0.1, 12.0.2, 12.0. 3 y 12.0.4, versiones 12.1.0 y 12.1.1 y Spotfire Server: versiones 11.4.11 y anteriores, versiones 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0 , 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.0.3, 12.0.4 y 12.0.5, versiones 12.1.0 y 12.1.1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "security@tibco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "security@tibco.com",
"type": "Secondary",
@@ -46,10 +80,172 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "11.4.7",
+ "matchCriteriaId": "841BE5EF-AA80-4864-8379-572F84D01CB1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.5.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6643BEFC-4C34-4D82-9451-79F2E2727230"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.6.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98448711-785E-483A-BC6A-5A5311C7FF63"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7CB9F167-A6FF-46ED-9BCB-F4634ACB18B5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:11.8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E3122E8-7D53-4FE6-A38F-39ED821BC8BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "12F5049F-F75D-45A3-A6A3-E22353721532"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F029AC1D-CB5B-4F2B-B255-EB98F7758232"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2AD66F3D-4B7D-4C0A-A3DE-69C4A0D2B480"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F07C385A-55C6-4B35-9D1A-058958571530"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.0.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1CF7CAF-77B3-4FB8-AD50-E74999A5306E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D671E2F-D211-4E0D-B351-92A08327E439"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_analyst:12.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD0A72BA-11DB-494E-9FBA-415253D878BE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "11.4.11",
+ "matchCriteriaId": "4A54F9B1-432F-4BDF-8331-710EB7DC7DA0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:11.5.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50269188-015E-406A-90B8-5F113773A3D5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EBDD97C0-212A-4E53-9246-65ED746C6554"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E22936E-ADBE-4D1F-AB3E-574DDE9B26E0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "71EF8AB2-09E0-4235-B7A2-41867303ACA2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:11.6.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2838D095-0DA8-4F1B-BAD4-D5A326C5D65C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:11.7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "014E0C2D-6601-478E-A5EF-D14789430A31"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:11.8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5854EC01-743F-4B31-B51F-34DE3F4DDCFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:11.8.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "113FBC40-777B-4B99-A5BF-A40F6707AFD9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "117AF754-4972-4254-A158-37B87C054DAF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7619EE98-BAFF-4685-B434-4CD2966D6C2D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7487265D-177D-40E5-8BBA-54224B9FFC96"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7722AC4-9856-403E-92A9-5CD0CFA57CDF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A18039B-1EF0-4617-9579-509E611FA859"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:12.0.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FB4CDB7-3FA6-4441-94F6-CEA13BD8C811"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:12.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DE8D46B2-D8C9-4FF9-A6FA-61B755241B12"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tibco:spotfire_server:12.1.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8466B949-D760-46C3-BC9B-11489DA9773F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.tibco.com/services/support/advisories",
- "source": "security@tibco.com"
+ "source": "security@tibco.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-263xx/CVE-2023-26300.json b/CVE-2023/CVE-2023-263xx/CVE-2023-26300.json
new file mode 100644
index 00000000000..16e67d7705e
--- /dev/null
+++ b/CVE-2023/CVE-2023-263xx/CVE-2023-26300.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-26300",
+ "sourceIdentifier": "hp-security-alert@hp.com",
+ "published": "2023-10-18T19:15:08.460",
+ "lastModified": "2023-10-18T20:00:27.677",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A potential security vulnerability has been identified in the system BIOS for certain HP PC products which might allow escalation of privilege. HP is releasing firmware updates to mitigate the potential vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una posible vulnerabilidad de seguridad en el BIOS de System para Certain HP PC products que podr\u00eda permitir una escalada de privilegios. HP est\u00e1 lanzando actualizaciones de firmware para mitigar la vulnerabilidad potencial."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://support.hp.com/us-en/document/ish_9461800-9461828-16",
+ "source": "hp-security-alert@hp.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26568.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26568.json
new file mode 100644
index 00000000000..15db36d3667
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26568.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26568",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.217",
+ "lastModified": "2023-10-28T03:20:16.467",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the GetStudentGroupStudents method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo GetStudentGroupStudents en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26568",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26569.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26569.json
new file mode 100644
index 00000000000..4f4a6930bd4
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26569.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26569",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.277",
+ "lastModified": "2023-10-28T03:20:20.530",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the StudentPopupDetails_Timetable method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo StudentPopupDetails_Timetable en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26569",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26570.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26570.json
new file mode 100644
index 00000000000..8c4622002dc
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26570.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26570",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.337",
+ "lastModified": "2023-10-28T03:20:26.277",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the StudentPopupDetails_Timetable method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction sensitive student data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo StudentPopupDetails_Timetable en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite que atacantes no autenticados extraigan datos confidenciales de los estudiantes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26570",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26571.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26571.json
new file mode 100644
index 00000000000..7f6e701dc9f
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26571.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26571",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.397",
+ "lastModified": "2023-10-28T03:20:31.930",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the SetStudentNotes method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows modification of student data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo SetStudentNotes en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la modificaci\u00f3n de los datos de los estudiantes por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26571",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26572.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26572.json
new file mode 100644
index 00000000000..ba6e3d215ee
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26572.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26572",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.457",
+ "lastModified": "2023-10-28T03:22:43.037",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the GetExcursionList method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo GetExcursionList en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26572",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26573.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26573.json
new file mode 100644
index 00000000000..162dca7784a
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26573.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26573",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.513",
+ "lastModified": "2023-10-28T03:22:35.543",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the SetDB method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows denial of service or theft of database login credentials. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo SetDB en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la Denegaci\u00f3n de Servicio (DoS) o el robo de credenciales de inicio de sesi\u00f3n de la base de datos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26573",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26574.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26574.json
new file mode 100644
index 00000000000..9c29da4e031
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26574.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26574",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.577",
+ "lastModified": "2023-10-28T03:22:50.603",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the SearchStudents method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction sensitive student data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo SearchStudents en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite que atacantes no autenticados extraigan datos confidenciales de los estudiantes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26574",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26575.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26575.json
new file mode 100644
index 00000000000..6f0b00ed29f
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26575.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26575",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.650",
+ "lastModified": "2023-10-28T03:22:26.930",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the SearchStudentsStaff method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction sensitive student and teacher data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo SearchStudentsStaff en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite que atacantes no autenticados extraigan datos confidenciales de estudiantes y profesores."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26575",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26576.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26576.json
new file mode 100644
index 00000000000..4db532de611
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26576.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26576",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.720",
+ "lastModified": "2023-10-28T03:22:20.050",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the SearchStudentsRFID method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction sensitive student data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo SearchStudentsRFID en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite que atacantes no autenticados extraigan datos confidenciales de los estudiantes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26576",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26577.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26577.json
new file mode 100644
index 00000000000..1384276a9e6
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26577.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26577",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.780",
+ "lastModified": "2023-10-28T03:22:14.633",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Stored cross-site scripting in the IDAttend\u2019s IDWeb application 3.1.052 and earlier allows attackers to hijack the browsing session of the logged in user. "
+ },
+ {
+ "lang": "es",
+ "value": "Cross-Site Scripting (XSS) Almacenado en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permiten a los atacantes secuestrar la sesi\u00f3n de navegaci\u00f3n del usuario que ha iniciado sesi\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26577",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26578.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26578.json
new file mode 100644
index 00000000000..392b7db2331
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26578.json
@@ -0,0 +1,113 @@
+{
+ "id": "CVE-2023-26578",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.837",
+ "lastModified": "2023-10-28T03:22:06.693",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Arbitrary file upload to web root in the IDAttend\u2019s IDWeb application 3.1.013 allows authenticated attackers to upload dangerous files to web root such as ASP or ASPX, gaining command execution on the affected server. "
+ },
+ {
+ "lang": "es",
+ "value": "La carga arbitraria de archivos a la ra\u00edz de la web en la aplicaci\u00f3n IDWeb 3.1.013 de IDAttend permite a atacantes autenticados cargar archivos peligrosos a la ra\u00edz web, como ASP o ASPX, obteniendo la ejecuci\u00f3n de comandos en el servidor afectado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:3.1.013:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2E83E186-DB76-4468-9BDE-E15B437E81EB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26578",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26579.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26579.json
new file mode 100644
index 00000000000..95dd614bee3
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26579.json
@@ -0,0 +1,109 @@
+{
+ "id": "CVE-2023-26579",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.897",
+ "lastModified": "2023-10-28T03:21:34.177",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the DeleteStaff method in IDAttend\u2019s IDWeb application 3.1.013 allows deletion of staff information by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo DeleteStaff en la aplicaci\u00f3n IDWeb 3.1.013 de IDAttend permite que atacantes no autenticados eliminen informaci\u00f3n del personal."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:3.1.013:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2E83E186-DB76-4468-9BDE-E15B437E81EB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26579",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26580.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26580.json
new file mode 100644
index 00000000000..1551004cb5e
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26580.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-26580",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:25.950",
+ "lastModified": "2023-10-28T03:23:40.257",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated arbitrary file read in the IDAttend\u2019s IDWeb application 3.1.013 allows the retrieval of any file present on the web server by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "Un archivo arbitrario no autenticado le\u00eddo en la aplicaci\u00f3n IDWeb 3.1.013 de IDAttend permite la recuperaci\u00f3n de cualquier archivo presente en el servidor web por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-552"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-552"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26580",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26581.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26581.json
new file mode 100644
index 00000000000..1e240478bb0
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26581.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26581",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.010",
+ "lastModified": "2023-10-28T03:20:36.517",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the GetVisitors method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo GetVisitors en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26581",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26582.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26582.json
new file mode 100644
index 00000000000..752aedee517
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26582.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26582",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.070",
+ "lastModified": "2023-10-28T03:20:40.767",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the GetExcursionDetails method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo GetExcursionDetails en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26582",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26583.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26583.json
new file mode 100644
index 00000000000..863c47aa0a3
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26583.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26583",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.127",
+ "lastModified": "2023-10-28T03:20:44.597",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the GetCurrentPeriod method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo GetCurrentPeriod en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26583",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26584.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26584.json
new file mode 100644
index 00000000000..8430aea749d
--- /dev/null
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26584.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-26584",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.180",
+ "lastModified": "2023-10-28T03:20:48.837",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the GetStudentInconsistencies method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo GetStudentInconsistencies en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-26584",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2624.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2624.json
index 1d7eedc00fa..8aa47230eb7 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2624.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2624.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2624",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.030",
- "lastModified": "2023-10-03T18:15:10.153",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T16:06:17.940",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -67,7 +67,12 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/174895/WordPress-KiviCare-3.2.0-Cross-Site-Scripting.html",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://wpscan.com/vulnerability/dc3a841d-a95b-462e-be4b-acaa44e77264",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json
index 198302c5d74..4b350dfe824 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2650.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2650",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-05-30T14:15:09.683",
- "lastModified": "2023-08-29T18:04:28.613",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T15:15:13.057",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -167,6 +167,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "openssl-security@openssl.org"
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5417",
"source": "openssl-security@openssl.org",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json
index ae4a99c9c98..031bba3e15e 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2667",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T07:15:08.627",
- "lastModified": "2023-09-25T16:46:20.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T06:15:11.847",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability has been found in SourceCodester Lost and Found Information System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file admin/. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-228883."
+ "value": "A vulnerability has been found in SourceCodester Lost and Found Information System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file admin/. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228883."
}
],
"metrics": {
@@ -111,6 +111,10 @@
}
],
"references": [
+ {
+ "url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2667.md",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://vuldb.com/?ctiid.228883",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json
index c6464ccfd58..061bbdec5ad 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2668",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T07:15:08.733",
- "lastModified": "2023-09-25T16:46:20.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T06:15:12.467",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0 and classified as critical. Affected by this issue is the function manager_category of the file admin/?page=categories/manage_category of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-228884."
+ "value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0 and classified as critical. Affected by this issue is the function manager_category of the file admin/?page=categories/manage_category of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228884."
}
],
"metrics": {
@@ -111,6 +111,10 @@
}
],
"references": [
+ {
+ "url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2668.md",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://vuldb.com/?ctiid.228884",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json
index 2df2d8cb5cb..8e96c5ae424 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2669",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T08:15:09.063",
- "lastModified": "2023-09-25T16:46:20.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T07:15:10.303",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as critical. This affects an unknown part of the file admin/?page=categories/view_category of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-228885 was assigned to this vulnerability."
+ "value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as critical. This affects an unknown part of the file admin/?page=categories/view_category of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228885 was assigned to this vulnerability."
}
],
"metrics": {
@@ -121,6 +121,10 @@
}
],
"references": [
+ {
+ "url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2669.md",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://vuldb.com/?ctiid.228885",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json
index ab362350973..feb9096f4cd 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2670",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T08:15:09.130",
- "lastModified": "2023-09-25T16:46:20.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T07:15:10.450",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file admin/?page=user/manage_user. The manipulation leads to improper access controls. The attack can be initiated remotely. VDB-228886 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file admin/?page=user/manage_user. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228886 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -111,6 +111,10 @@
}
],
"references": [
+ {
+ "url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2670.md",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://vuldb.com/?ctiid.228886",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json
index 97279a3a1bd..1106bdb188e 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2671",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T09:15:10.447",
- "lastModified": "2023-09-25T16:46:20.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T07:15:10.543",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file classes/Master.php?f=save_inquiry of the component Contact Form. The manipulation of the argument fullname/contact/message leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-228887."
+ "value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file classes/Master.php?f=save_inquiry of the component Contact Form. The manipulation of the argument fullname/contact/message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228887."
}
],
"metrics": {
@@ -111,6 +111,10 @@
}
],
"references": [
+ {
+ "url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2671.md",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://vuldb.com/?ctiid.228887",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json
index 5d581e0bad0..e1700c27bfe 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2672",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T09:15:10.520",
- "lastModified": "2023-09-25T16:46:20.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T07:15:10.637",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. Affected is an unknown function of the file items/view.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-228888."
+ "value": "A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. Affected is an unknown function of the file items/view.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228888."
}
],
"metrics": {
@@ -111,6 +111,10 @@
}
],
"references": [
+ {
+ "url": "https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2672.md",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://vuldb.com/?ctiid.228888",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2681.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2681.json
index 7f4d89f3ced..08001bc4269 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2681.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2681.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2681",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-10-03T13:15:09.937",
- "lastModified": "2023-10-05T16:43:37.583",
+ "lastModified": "2023-10-25T15:00:33.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -89,8 +89,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:jorani_project:jorani:1.0.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "00665EA7-7D22-4226-801E-ABA4BD94D0D7"
+ "criteria": "cpe:2.3:a:jorani:jorani:1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE8B2D2D-7CCC-4688-9C1C-5C2512F140E6"
}
]
}
diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27114.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27114.json
index 94a08835c02..12335be4d95 100644
--- a/CVE-2023/CVE-2023-271xx/CVE-2023-27114.json
+++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27114.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-27114",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-10T02:15:58.403",
- "lastModified": "2023-03-15T16:26:50.240",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-17T16:15:09.837",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -65,11 +65,8 @@
],
"references": [
{
- "url": "https://github.com/radareorg/radare2/commit/13308c9aad79f9c7a3507ce549fe270103e8ceea",
- "source": "cve@mitre.org",
- "tags": [
- "Patch"
- ]
+ "url": "https://github.com/radareorg/radare2/commit/a15067a8eaa836bcc24b0882712c14d1baa66509",
+ "source": "cve@mitre.org"
},
{
"url": "https://github.com/radareorg/radare2/issues/21363",
diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27132.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27132.json
new file mode 100644
index 00000000000..140dd8139ac
--- /dev/null
+++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27132.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-27132",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T16:15:09.957",
+ "lastModified": "2023-10-25T12:51:26.787",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TSplus Remote Work 16.0.0.0 places a cleartext password on the \"var pass\" line of the HTML source code for the secure single sign-on web portal. NOTE: CVE-2023-31069 is only about the TSplus Remote Access product, not the TSplus Remote Work product."
+ },
+ {
+ "lang": "es",
+ "value": "TSplus Remote Work 16.0.0.0 coloca una contrase\u00f1a de texto plano en la l\u00ednea \"var pass\" del c\u00f3digo fuente HTML para el portal web seguro de inicio de sesi\u00f3n \u00fanico. NOTA: CVE-2023-31069 se refiere \u00fanicamente al producto TSplus Remote Access, no al producto TSplus Remote Work."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-522"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tsplus:tsplus_remote_work:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "16.0.0.0",
+ "matchCriteriaId": "4FCFDE54-02A8-45F8-BA88-E7E44FB60FD9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://packetstormsecurity.com/files/174271",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27133.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27133.json
new file mode 100644
index 00000000000..a9a731342e3
--- /dev/null
+++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27133.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-27133",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T16:15:10.033",
+ "lastModified": "2023-10-24T20:42:16.187",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TSplus Remote Work 16.0.0.0 has weak permissions for .exe, .js, and .html files under the %PROGRAMFILES(X86)%\\TSplus-RemoteWork\\Clients\\www folder. This may enable privilege escalation if a different local user modifies a file. NOTE: CVE-2023-31067 and CVE-2023-31068 are only about the TSplus Remote Access product, not the TSplus Remote Work product."
+ },
+ {
+ "lang": "es",
+ "value": "TSplus Remote Work 16.0.0.0 tiene permisos d\u00e9biles para archivos .exe, .js y .html en la carpeta %PROGRAMFILES(X86)%\\TSplus-RemoteWork\\Clients\\www. Esto puede permitir una escalada de privilegios si un usuario local diferente modifica un archivo. NOTA: CVE-2023-31067 y CVE-2023-31068 se refieren \u00fanicamente al producto TSplus Remote Access, no al producto TSplus Remote Work."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-276"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tsplus:tsplus_remote_work:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "16.0.0.0",
+ "matchCriteriaId": "4FCFDE54-02A8-45F8-BA88-E7E44FB60FD9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://packetstormsecurity.com/files/174272",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27148.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27148.json
new file mode 100644
index 00000000000..7f274ed8847
--- /dev/null
+++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27148.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-27148",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T20:15:08.817",
+ "lastModified": "2023-10-27T19:40:46.700",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A stored cross-site scripting (XSS) vulnerability in the Admin panel in Enhancesoft osTicket v1.17.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Role Name parameter."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenada en el panel de administraci\u00f3n de Enhancesoft osTicket v1.17.2 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre de funci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:enhancesoft:osticket:1.17.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "77B993F5-E270-471F-8FE3-B8B110FBC08E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.esecforte.com/cve-2023-27148-osticket_xss/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27149.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27149.json
new file mode 100644
index 00000000000..27e20c67a87
--- /dev/null
+++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27149.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-27149",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T20:15:08.863",
+ "lastModified": "2023-10-27T19:41:33.100",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A stored cross-site scripting (XSS) vulnerability in Enhancesoft osTicket v1.17.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Label input parameter when updating a custom list."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenada en Enhancesoft osTicket v1.17.2 permite a los atacantes ejecutar scripts o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de entrada Etiqueta al actualizar una lista personalizada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:enhancesoft:osticket:1.17.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "77B993F5-E270-471F-8FE3-B8B110FBC08E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.esecforte.com/cve-2023-27149-osticket_xss/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27152.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27152.json
new file mode 100644
index 00000000000..f3662777a5e
--- /dev/null
+++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27152.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-27152",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T21:15:08.703",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "DECISO OPNsense 23.1 does not impose rate limits for authentication, allowing attackers to perform a brute-force attack to bypass authentication."
+ },
+ {
+ "lang": "es",
+ "value": "DECISO OPNsense 23.1 no impone l\u00edmites de velocidad para la autenticaci\u00f3n, lo que permite a los atacantes realizar un ataque de fuerza bruta para eludir la autenticaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.esecforte.com/cve-2023-27152-opnsense-brute-force/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27170.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27170.json
new file mode 100644
index 00000000000..f1ad128284d
--- /dev/null
+++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27170.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-27170",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T23:15:09.253",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Xpand IT Write-back manager v2.3.1 allows attackers to perform a directory traversal via modification of the siteName parameter."
+ },
+ {
+ "lang": "es",
+ "value": "Xpand IT Write-back manager v2.3.1 permite a los atacantes realizar un directory traversal mediante la modificaci\u00f3n del par\u00e1metro siteName."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://balwurk.com/cve-2023-27170-improper-limitation-of-a-pathname-to-a-restricted-directory/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27254.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27254.json
new file mode 100644
index 00000000000..ffd88f563a6
--- /dev/null
+++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27254.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27254",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.240",
+ "lastModified": "2023-10-28T03:20:53.253",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the GetRoomChanges method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo GetRoomChanges en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27254",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27255.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27255.json
new file mode 100644
index 00000000000..b05aea74e0e
--- /dev/null
+++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27255.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27255",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.297",
+ "lastModified": "2023-10-28T03:22:55.287",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the DeleteRoomChanges method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo DeleteRoomChanges en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27255",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27256.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27256.json
new file mode 100644
index 00000000000..24f6ce032a5
--- /dev/null
+++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27256.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27256",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.353",
+ "lastModified": "2023-10-28T03:23:01.543",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the GetLogFiles method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows retrieval of sensitive log files by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo GetLogFiles en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la recuperaci\u00f3n de archivos de registro confidenciales por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27256",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27257.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27257.json
new file mode 100644
index 00000000000..446348feeee
--- /dev/null
+++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27257.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27257",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.410",
+ "lastModified": "2023-10-28T03:19:47.833",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the GetActiveToiletPasses method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows retrieval of student information by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo GetActiveToiletPasses en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite que atacantes no autenticados recuperen la informaci\u00f3n de los estudiantes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27257",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27258.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27258.json
new file mode 100644
index 00000000000..d680284b1ca
--- /dev/null
+++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27258.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27258",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.470",
+ "lastModified": "2023-10-28T03:19:57.333",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the GetStudentGroupStudents method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows retrieval of student and teacher data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo GetStudentGroupStudents en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la recuperaci\u00f3n de datos de estudiantes y profesores por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27258",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27259.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27259.json
new file mode 100644
index 00000000000..c949c4076f9
--- /dev/null
+++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27259.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27259",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.527",
+ "lastModified": "2023-10-28T03:20:02.377",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the GetAssignmentsDue method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction of sensitive student and teacher data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo GetAssignmentsDue en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite que atacantes no autenticados extraigan datos confidenciales de estudiantes y profesores."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27259",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27260.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27260.json
new file mode 100644
index 00000000000..fae0a285f86
--- /dev/null
+++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27260.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27260",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.587",
+ "lastModified": "2023-10-28T03:20:11.070",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the GetAssignmentsDue method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo GetAssignmentsDue en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27260",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27261.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27261.json
new file mode 100644
index 00000000000..9ea22164243
--- /dev/null
+++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27261.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27261",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.657",
+ "lastModified": "2023-10-28T03:23:33.637",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the DeleteAssignments method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows deletion of data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo DeleteAssignments en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la eliminaci\u00f3n de datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27261",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27262.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27262.json
new file mode 100644
index 00000000000..d8f6a48e4d3
--- /dev/null
+++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27262.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27262",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.713",
+ "lastModified": "2023-10-28T03:23:20.260",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauthenticated SQL injection in the GetAssignmentsDue method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de SQL no autenticado en el m\u00e9todo GetAssignmentsDue en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite la extracci\u00f3n o modificaci\u00f3n de todos los datos por parte de atacantes no autenticados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27260",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27312.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27312.json
index d33ba801fe4..2c2467b2f72 100644
--- a/CVE-2023/CVE-2023-273xx/CVE-2023-27312.json
+++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27312.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-27312",
"sourceIdentifier": "security-alert@netapp.com",
"published": "2023-10-12T19:15:11.537",
- "lastModified": "2023-10-12T19:42:47.127",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:17:11.533",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SnapCenter Plugin for VMware vSphere versions 4.6 prior to 4.9 are \nsusceptible to a vulnerability which may allow authenticated \nunprivileged users to modify email and snapshot name settings within the\n VMware vSphere user interface.\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El complemento SnapCenter para VMware vSphere versiones 4.6 anteriores a 4.9 son susceptibles a una vulnerabilidad que puede permitir a usuarios autenticados sin privilegios modificar la configuraci\u00f3n del correo electr\u00f3nico y el nombre de la instant\u00e1nea dentro de la interfaz de usuario de VMware vSphere."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "security-alert@netapp.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "security-alert@netapp.com",
"type": "Secondary",
@@ -46,10 +80,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:snapcenter_plug-in:*:*:*:*:*:vmware_vsphere:*:*",
+ "versionStartIncluding": "4.6",
+ "versionEndExcluding": "4.9",
+ "matchCriteriaId": "63D70659-B00B-4380-A8A9-700EBE918615"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20230713-0001/",
- "source": "security-alert@netapp.com"
+ "source": "security-alert@netapp.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27313.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27313.json
index 38545d71f2e..9629990a6f1 100644
--- a/CVE-2023/CVE-2023-273xx/CVE-2023-27313.json
+++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27313.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-27313",
"sourceIdentifier": "security-alert@netapp.com",
"published": "2023-10-12T19:15:11.653",
- "lastModified": "2023-10-12T19:42:47.127",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:16:58.257",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SnapCenter versions 3.x and 4.x prior to 4.9 are susceptible to a \nvulnerability which may allow an authenticated unprivileged user to gain\n access as an admin user.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones 3.x y 4.x de SnapCenter anteriores a la 4.9 son susceptibles a una vulnerabilidad que puede permitir que un usuario autenticado sin privilegios obtenga acceso como usuario administrador."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security-alert@netapp.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "security-alert@netapp.com",
"type": "Secondary",
@@ -46,10 +80,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:snapcenter:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.0",
+ "versionEndExcluding": "4.9",
+ "matchCriteriaId": "9B02A810-1E06-4266-94FF-4A33D6ED68A9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20230713-0002/",
- "source": "security-alert@netapp.com"
+ "source": "security-alert@netapp.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27314.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27314.json
index e7b04ec2008..159de89da1a 100644
--- a/CVE-2023/CVE-2023-273xx/CVE-2023-27314.json
+++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27314.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-27314",
"sourceIdentifier": "security-alert@netapp.com",
"published": "2023-10-12T19:15:11.747",
- "lastModified": "2023-10-12T19:42:47.127",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:00:24.900",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ONTAP 9 versions prior to 9.8P19, 9.9.1P16, 9.10.1P12, 9.11.1P8, \n9.12.1P2 and 9.13.1 are susceptible to a vulnerability which could allow\n a remote unauthenticated attacker to cause a crash of the HTTP service."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de ONTAP 9 anteriores a 9.8P19, 9.9.1P16, 9.10.1P12, 9.11.1P8, 9.12.1P2 y 9.13.1 son susceptibles a una vulnerabilidad que podr\u00eda permitir que un atacante remoto no autenticado provoque una falla del servicio HTTP."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security-alert@netapp.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "security-alert@netapp.com",
"type": "Secondary",
@@ -46,10 +80,72 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.0",
+ "versionEndExcluding": "9.8",
+ "matchCriteriaId": "D9342DC4-2928-49B6-AACA-95B3DE9C994A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.8:-:*:*:*:*:*:*",
+ "matchCriteriaId": "BE523D87-B51F-41F2-9B6F-A85AB28FF3DC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.8:p7:*:*:*:*:*:*",
+ "matchCriteriaId": "B353C687-391F-476E-9199-2D769842E019"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.9.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "E0284DC1-9FAA-4979-82C3-AB7347614C80"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.9.1:p3:*:*:*:*:*:*",
+ "matchCriteriaId": "76CBFD8A-CE4C-4337-8F22-397DDCC1B074"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.10.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "E932E75A-46F0-47AA-9EFE-11D7127D4015"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.10.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "F1A4278F-D9A9-4C39-AC53-AB35DB921E02"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.12.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "CABEEE42-6098-4259-ABAA-8D8D7BEEB0A0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.13.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "BE4AE3BB-685A-466F-B4FA-D49D366C6598"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20231009-0001/",
- "source": "security-alert@netapp.com"
+ "source": "security-alert@netapp.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27316.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27316.json
index 93dad735d39..b3fff6815be 100644
--- a/CVE-2023/CVE-2023-273xx/CVE-2023-27316.json
+++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27316.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-27316",
"sourceIdentifier": "security-alert@netapp.com",
"published": "2023-10-12T22:15:09.640",
- "lastModified": "2023-10-13T12:47:48.873",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T14:25:34.030",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SnapCenter versions 4.8 through 4.9 are susceptible to a \nvulnerability which may allow an authenticated SnapCenter Server user to\n become an admin user on a remote system where a SnapCenter plug-in has \nbeen installed. \n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones 4.8 a 4.9 de SnapCenter son susceptibles a una vulnerabilidad que puede permitir que un usuario autenticado de SnapCenter Server se convierta en usuario administrador en un sistema remoto donde se ha instalado un complemento de SnapCenter."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "security-alert@netapp.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "security-alert@netapp.com",
"type": "Secondary",
@@ -46,14 +80,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:snapcenter:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.8",
+ "versionEndIncluding": "4.9",
+ "matchCriteriaId": "4304E07C-4A87-4589-896A-7F2EEC1BC7E1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://security.netapp.com/advisory/NTAP-20231012-0001/",
- "source": "security-alert@netapp.com"
+ "source": "security-alert@netapp.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231012-0001/",
- "source": "security-alert@netapp.com"
+ "source": "security-alert@netapp.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27375.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27375.json
new file mode 100644
index 00000000000..2f20e748ac2
--- /dev/null
+++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27375.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27375",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.773",
+ "lastModified": "2023-10-28T03:23:15.667",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the StudentPopupDetails_ContactDetails method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction of sensitive student data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo StudentPopupDetails_ContactDetails en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite que atacantes no autenticados extraigan datos confidenciales de los estudiantes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27375",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27376.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27376.json
new file mode 100644
index 00000000000..37f7cc6fc6a
--- /dev/null
+++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27376.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27376",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.837",
+ "lastModified": "2023-10-28T03:23:11.250",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the StudentPopupDetails_StudentDetails method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction of sensitive student data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo StudentPopupDetails_StudentDetails en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite que atacantes no autenticados extraigan datos confidenciales de los estudiantes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27376",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27377.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27377.json
new file mode 100644
index 00000000000..c14697eb996
--- /dev/null
+++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27377.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-27377",
+ "sourceIdentifier": "vdp@themissinglink.com.au",
+ "published": "2023-10-25T18:17:26.897",
+ "lastModified": "2023-10-28T03:23:47.653",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing authentication in the StudentPopupDetails_EmergencyContactDetails method in IDAttend\u2019s IDWeb application 3.1.052 and earlier allows extraction of sensitive student data by unauthenticated attackers. "
+ },
+ {
+ "lang": "es",
+ "value": "La falta de autenticaci\u00f3n en el m\u00e9todo StudentPopupDetails_EmergencyContactDetails en la aplicaci\u00f3n IDWeb de IDAttend 3.1.052 y versiones anteriores permite que atacantes no autenticados extraigan datos confidenciales de los estudiantes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ },
+ {
+ "source": "vdp@themissinglink.com.au",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.1.052",
+ "matchCriteriaId": "1BAFE4C9-F4BD-4B37-87D3-B0A399AD114B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.themissinglink.com.au/security-advisories/cve-2023-27377",
+ "source": "vdp@themissinglink.com.au",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27380.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27380.json
index 7dbc2338d2c..45db4e00954 100644
--- a/CVE-2023/CVE-2023-273xx/CVE-2023-27380.json
+++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27380.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-27380",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-11T16:15:12.747",
- "lastModified": "2023-10-11T16:37:00.913",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T15:00:54.690",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in the admin.cgi USSD_send functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funcionalidad admin.cgi USSD_send de peplink Surf SOHO HW1 v6.3.5 (en QEMU). Una solicitud HTTP especialmente manipulada puede conducir a la ejecuci\u00f3n de un comando. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,10 +80,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:peplink:surf_soho_firmware:6.3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F47DB73-DEB9-4191-9C70-BFD620575394"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:peplink:surf_soho:hw1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2313EA09-B0EA-4591-B4EA-2B80E7C60422"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1780",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Product",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27395.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27395.json
index 137585139d6..02cb44d2af0 100644
--- a/CVE-2023/CVE-2023-273xx/CVE-2023-27395.json
+++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27395.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-27395",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-12T16:15:11.583",
- "lastModified": "2023-10-12T18:15:09.987",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T17:58:04.460",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A heap-based buffer overflow vulnerability exists in the vpnserver WpcParsePacket() functionality of SoftEther VPN 4.41-9782-beta, 5.01.9674 and 5.02. A specially crafted network packet can lead to arbitrary code execution. An attacker can perform a man-in-the-middle attack to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de desbordamiento de b\u00fafer en la funcionalidad vpnserver WpcParsePacket() de SoftEther VPN 4.41-9782-beta, 5.01.9674 y 5.02. Un paquete de red especialmente manipulado puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede realizar un ataque de intermediario para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,14 +80,49 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:4.41-9782:beta:*:*:*:*:*:*",
+ "matchCriteriaId": "79C47EE5-1B55-4FDD-A5B5-E10FF3337100"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CF5CF13-B22F-494B-BDC0-B59371979251"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.02:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D21F370B-D9F2-43E8-8E45-0EA74A3C9D4B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1735",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.softether.org/9-about/News/904-SEVPN202301",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27516.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27516.json
index 5eef644b272..f514d41b729 100644
--- a/CVE-2023/CVE-2023-275xx/CVE-2023-27516.json
+++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27516.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-27516",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-12T16:15:11.670",
- "lastModified": "2023-10-12T16:52:07.503",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T16:35:39.283",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability exists in the CiRpcAccepted() functionality of SoftEther VPN 4.41-9782-beta and 5.01.9674. A specially crafted network packet can lead to unauthorized access. An attacker can send a network request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en la funcionalidad CiRpcAccepted() de SoftEther VPN 4.41-9782-beta y 5.01.9674. Un paquete de red especialmente manipulado puede provocar un acceso no autorizado. Un atacante puede enviar una solicitud de red para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1188"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,14 +80,44 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:4.41-9782:beta:*:*:*:*:*:*",
+ "matchCriteriaId": "79C47EE5-1B55-4FDD-A5B5-E10FF3337100"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CF5CF13-B22F-494B-BDC0-B59371979251"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1754",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.softether.org/9-about/News/904-SEVPN202301",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json
index 3ad1bf676a3..0851bfe98dc 100644
--- a/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json
+++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-27530",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-10T22:15:10.497",
- "lastModified": "2023-04-17T16:15:09.527",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-22T19:15:08.757",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -107,6 +107,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00017.html",
"source": "support@hackerone.com"
+ },
+ {
+ "url": "https://www.debian.org/security/2023/dsa-5530",
+ "source": "support@hackerone.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27533.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27533.json
index b15619f64ea..3074deb86f8 100644
--- a/CVE-2023/CVE-2023-275xx/CVE-2023-27533.json
+++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27533.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-27533",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.373",
- "lastModified": "2023-10-11T11:15:11.197",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:51:08.517",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -73,6 +73,149 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
+ "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "52DE3DFE-350F-4E83-B425-1D7D47BEF6DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,19 +229,31 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0011/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27534.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27534.json
index 21711fadc8e..09b241119e9 100644
--- a/CVE-2023/CVE-2023-275xx/CVE-2023-27534.json
+++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27534.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-27534",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.427",
- "lastModified": "2023-10-11T11:15:11.447",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:45:28.913",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -73,6 +73,149 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
+ "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B2748912-FC54-47F6-8C0C-B96784765B8E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,15 +229,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0012/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27535.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27535.json
index 38cbdd42b22..2ae3c1e859b 100644
--- a/CVE-2023/CVE-2023-275xx/CVE-2023-27535.json
+++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27535.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-27535",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.483",
- "lastModified": "2023-10-11T11:15:11.530",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:45:13.193",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -260,7 +260,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27536.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27536.json
index b6ab92af152..9d7112c091a 100644
--- a/CVE-2023/CVE-2023-275xx/CVE-2023-27536.json
+++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27536.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-27536",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.547",
- "lastModified": "2023-10-11T11:15:11.643",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:44:37.687",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -270,7 +270,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27537.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27537.json
index 012638e7a6f..9ecb878547d 100644
--- a/CVE-2023/CVE-2023-275xx/CVE-2023-27537.json
+++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27537.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-27537",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.617",
- "lastModified": "2023-10-11T11:15:11.753",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:44:28.253",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -76,6 +76,139 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
+ "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "52DE3DFE-350F-4E83-B425-1D7D47BEF6DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B2748912-FC54-47F6-8C0C-B96784765B8E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -89,11 +222,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27538.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27538.json
index a1cf47ddfe9..3e36428bfe7 100644
--- a/CVE-2023/CVE-2023-275xx/CVE-2023-27538.json
+++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27538.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-27538",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-03-30T20:15:07.677",
- "lastModified": "2023-10-11T11:15:11.977",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:43:26.050",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -67,8 +67,8 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.16.1",
- "versionEndIncluding": "7.88.1",
- "matchCriteriaId": "17E5685B-B249-480E-8AE0-F2EDA57EA053"
+ "versionEndExcluding": "8.0.0",
+ "matchCriteriaId": "D3ABEE9E-8E0B-4B8D-8913-D86B9CB05769"
}
]
}
@@ -88,6 +88,154 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
+ "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "52DE3DFE-350F-4E83-B425-1D7D47BEF6DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B2748912-FC54-47F6-8C0C-B96784765B8E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -101,15 +249,24 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27791.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27791.json
new file mode 100644
index 00000000000..e4959553440
--- /dev/null
+++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27791.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-27791",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T20:15:08.937",
+ "lastModified": "2023-10-25T09:51:31.380",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue found in IXP Data Easy Install 6.6.148840 allows a remote attacker to escalate privileges via insecure PRNG."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema encontrado en IXP Data Easy Install 6.6.148840 permite a un atacante remoto escalar privilegios a trav\u00e9s de PRNG inseguro."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-338"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ixpdata:easyinstall:6.6.148840:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4D3B40C-C1D0-41C5-B8E7-73EBF11E2A2F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.bramfitt-tech-labs.com/article/easy-install-cve-issue",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27792.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27792.json
new file mode 100644
index 00000000000..ced86538e40
--- /dev/null
+++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27792.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-27792",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T21:15:08.517",
+ "lastModified": "2023-10-25T09:50:30.440",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue found in IXP Data Easy Install v.6.6.14884.0 allows an attacker to escalate privileges via lack of permissions applied to sub directories."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema encontrado en IXP Data Easy Install v.6.6.14884.0 permite a un atacante escalar privilegios debido a la falta de permisos aplicados a los subdirectorios."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ixpdata:easyinstall:6.6.148840:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4D3B40C-C1D0-41C5-B8E7-73EBF11E2A2F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.bramfitt-tech-labs.com/article/easy-install-cve-issue",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27793.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27793.json
new file mode 100644
index 00000000000..d23b2b474df
--- /dev/null
+++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27793.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-27793",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T21:15:08.650",
+ "lastModified": "2023-10-25T12:07:41.090",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue discovered in IXP Data Easy Install v.6.6.14884.0 allows local attackers to gain escalated privileges via weak encoding of sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema descubierto en IXP Data Easy Install v.6.6.14884.0 permite a atacantes locales obtener privilegios elevados mediante una codificaci\u00f3n d\u00e9bil de informaci\u00f3n confidencial."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ixpdata:easyinstall:6.6.14884.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3E471C4-DD8E-41E9-822F-2D00BAC36F4A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.bramfitt-tech-labs.com/article/easy-install-cve-issue",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27795.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27795.json
new file mode 100644
index 00000000000..2ff3718d643
--- /dev/null
+++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27795.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-27795",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T21:15:08.697",
+ "lastModified": "2023-10-26T14:17:00.387",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue found in IXP Data Easy Install v.6.6.14884.0 allows a local attacker to gain privileges via a static XOR key."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema encontrado en IXP Data Easy Install v.6.6.14884.0 permite a un atacante local obtener privilegios a trav\u00e9s de una clave XOR est\u00e1tica."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ixpdata:easyinstall:6.6.148840:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4D3B40C-C1D0-41C5-B8E7-73EBF11E2A2F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.bramfitt-tech-labs.com/article/easy-install-cve-issue",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27854.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27854.json
new file mode 100644
index 00000000000..a8c1a08ea90
--- /dev/null
+++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27854.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-27854",
+ "sourceIdentifier": "PSIRT@rockwellautomation.com",
+ "published": "2023-10-27T19:15:41.157",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nAn arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow. \u00a0The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. \u00a0The user would need to open a malicious file provided to them by the attacker for the code to execute.\n\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "PSIRT@rockwellautomation.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "PSIRT@rockwellautomation.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141145",
+ "source": "PSIRT@rockwellautomation.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27857.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27857.json
index 98617a993e9..fcba6999faf 100644
--- a/CVE-2023/CVE-2023-278xx/CVE-2023-27857.json
+++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27857.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-27857",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-03-22T02:15:48.953",
- "lastModified": "2023-03-29T13:14:53.417",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:26.953",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In affected versions, a heap-based buffer over-read condition occurs when the message field indicates more data than is present in the message field in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker can exploit this vulnerability to crash ThinServer.exe due to a read access violation."
+ "value": "\n In affected versions, a heap-based buffer over-read condition occurs when the message field indicates more data than is present in the message field\n\n\n\n in Rockwell Automation's ThinManager ThinServer.\u00a0\u00a0An unauthenticated remote attacker can exploit this vulnerability to crash ThinServer.exe due to a read access violation.\n\n\n\n \n\n"
}
],
"metrics": {
@@ -71,7 +71,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-120"
+ "value": "CWE-125"
}
]
}
diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27858.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27858.json
new file mode 100644
index 00000000000..ffc753c2341
--- /dev/null
+++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27858.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-27858",
+ "sourceIdentifier": "PSIRT@rockwellautomation.com",
+ "published": "2023-10-27T19:15:41.230",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nRockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could potentially allow a malicious user to commit unauthorized code to the software by using an\u00a0uninitialized pointer in the application. \u00a0The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product. \u00a0The user would need to open a malicious file provided to them by the attacker for the code to execute.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "PSIRT@rockwellautomation.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "PSIRT@rockwellautomation.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-824"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141145",
+ "source": "PSIRT@rockwellautomation.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2718.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2718.json
index 492431f633a..3485a26f4a5 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2718.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2718.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2718",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-12T18:15:10.167",
- "lastModified": "2023-10-11T09:15:09.813",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-29T02:31:44.707",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -36,7 +36,7 @@
},
"weaknesses": [
{
- "source": "contact@wpscan.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,6 +44,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "contact@wpscan.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -75,7 +85,10 @@
},
{
"url": "https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2721.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2721.json
index cd2a7749e7e..14e480cd7ff 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2721.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2721.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2721",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.160",
- "lastModified": "2023-09-30T11:15:14.887",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:31:03.057",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -130,7 +130,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2722.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2722.json
index 11055717765..6bfc74e6e6a 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2722.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2722.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2722",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.217",
- "lastModified": "2023-09-30T11:15:14.967",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T16:47:19.397",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -142,7 +142,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2723.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2723.json
index 9381caac1f9..ef78762fb25 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2723.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2723.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2723",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.277",
- "lastModified": "2023-09-30T11:15:15.037",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T16:47:22.793",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -130,7 +130,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2724.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2724.json
index 8a15efe0f82..38fb978f921 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2724.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2724.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2724",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.327",
- "lastModified": "2023-09-30T11:15:15.107",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T16:47:30.767",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -102,7 +102,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/173131/Chrome-Internal-JavaScript-Object-Access-Via-Origin-Trials.html",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html",
@@ -134,7 +138,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2725.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2725.json
index 01aeaed193d..da632175962 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2725.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2725.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2725",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.383",
- "lastModified": "2023-09-30T11:15:15.187",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T16:47:34.527",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -130,7 +130,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2726.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2726.json
index 6d9a0d335c3..a26e0270895 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2726.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2726.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2726",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.433",
- "lastModified": "2023-09-30T11:15:15.260",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:31:06.937",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -130,7 +130,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json
index 7ccc48d2c28..f760b764e97 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2744.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2744",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.433",
- "lastModified": "2023-10-16T18:15:15.790",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:06:07.627",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -67,7 +67,12 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/175106/WordPress-WP-ERP-1.12.2-SQL-Injection.html",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://wpscan.com/vulnerability/435da8a1-9955-46d7-a508-b5738259e731",
diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28129.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28129.json
index dd90fa87de3..f74520722fa 100644
--- a/CVE-2023/CVE-2023-281xx/CVE-2023-28129.json
+++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28129.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-28129",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-08-10T20:15:09.657",
- "lastModified": "2023-08-15T20:28:13.247",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T04:15:10.807",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Desktop & Server Management (DSM) may have a possible execution of arbitrary commands."
+ "value": "DSM 2022.2 SU2 and all prior versions allows a local low privileged account to execute arbitrary OS commands as the DSM software installation user."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json
index ad3ca360b63..9d44676a9a0 100644
--- a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json
+++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28261",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-27T19:15:20.350",
- "lastModified": "2023-09-30T11:15:13.373",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:53:10.297",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -101,7 +101,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json
index 58c8c51799e..d95c1dc43b4 100644
--- a/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json
+++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28286",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-27T19:15:20.467",
- "lastModified": "2023-09-30T11:15:13.463",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:53:06.050",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -81,7 +81,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28319.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28319.json
index 959810789d7..c630b253e78 100644
--- a/CVE-2023/CVE-2023-283xx/CVE-2023-28319.json
+++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28319.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28319",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-26T21:15:10.020",
- "lastModified": "2023-10-11T11:15:12.140",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:42:56.687",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -238,21 +238,24 @@
"url": "http://seclists.org/fulldisclosure/2023/Jul/47",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jul/48",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jul/52",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
@@ -266,7 +269,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28320.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28320.json
index 63479fe7c31..ce12106ae2a 100644
--- a/CVE-2023/CVE-2023-283xx/CVE-2023-28320.json
+++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28320.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28320",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-26T21:15:15.937",
- "lastModified": "2023-10-11T11:15:12.517",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:42:42.793",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -242,21 +242,24 @@
"url": "http://seclists.org/fulldisclosure/2023/Jul/47",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jul/48",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jul/52",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
@@ -270,7 +273,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28321.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28321.json
index d54f49a6e65..5bd42a670cd 100644
--- a/CVE-2023/CVE-2023-283xx/CVE-2023-28321.json
+++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28321.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28321",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-26T21:15:16.020",
- "lastModified": "2023-10-11T15:15:09.543",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T18:42:36.073",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -79,6 +79,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
@@ -258,21 +263,24 @@
"url": "http://seclists.org/fulldisclosure/2023/Jul/47",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jul/48",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jul/52",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
@@ -286,7 +294,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/",
@@ -306,7 +318,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28322.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28322.json
index 53fb6db5b63..38458b10460 100644
--- a/CVE-2023/CVE-2023-283xx/CVE-2023-28322.json
+++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28322.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-28322",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-26T21:15:16.153",
- "lastModified": "2023-10-11T11:15:12.940",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T21:05:41.690",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -258,21 +258,24 @@
"url": "http://seclists.org/fulldisclosure/2023/Jul/47",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jul/48",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jul/52",
"source": "support@hackerone.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
@@ -302,7 +305,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202310-12",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28381.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28381.json
index 204150567b3..213a1293965 100644
--- a/CVE-2023/CVE-2023-283xx/CVE-2023-28381.json
+++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28381.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-28381",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-11T16:15:12.827",
- "lastModified": "2023-10-11T16:37:00.913",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T15:00:34.063",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in the admin.cgi MVPN_trial_init functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funcionalidad admin.cgi MVPN_trial_init de peplink Surf SOHO HW1 v6.3.5 (en QEMU). Una solicitud HTTP especialmente manipulada puede conducir a la ejecuci\u00f3n de un comando. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,10 +80,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:peplink:surf_soho_firmware:6.3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F47DB73-DEB9-4191-9C70-BFD620575394"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:peplink:surf_soho:hw1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2313EA09-B0EA-4591-B4EA-2B80E7C60422"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1779",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Product",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28635.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28635.json
index 935312ed911..3990a6e557a 100644
--- a/CVE-2023/CVE-2023-286xx/CVE-2023-28635.json
+++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28635.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-28635",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-11T20:15:09.893",
- "lastModified": "2023-10-11T21:04:47.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T16:06:32.323",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "vantage6 is privacy preserving federated learning infrastructure. Prior to version 4.0.0, malicious users may try to get access to resources they are not allowed to see, by creating resources with integers as names. One example where this is a risk, is when users define which users are allowed to run algorithms on their node. This may be defined by username or user id. Now, for example, if user id 13 is allowed to run tasks, and an attacker creates a username with username '13', they would be wrongly allowed to run an algorithm. There may also be other places in the code where such a mixup of resource ID or name leads to issues. Version 4.0.0 contains a patch for this issue. The best solution is to check when resources are created or modified, that the resource name always starts with a character."
+ },
+ {
+ "lang": "es",
+ "value": "vantage6 es una infraestructura de aprendizaje federada que preserva la privacidad. Antes de la versi\u00f3n 4.0.0, los usuarios malintencionados pod\u00edan intentar obtener acceso a recursos que no pod\u00edan ver, creando recursos con n\u00fameros enteros como nombres. Un ejemplo en el que esto supone un riesgo es cuando los usuarios definen qu\u00e9 usuarios pueden ejecutar algoritmos en su nodo. Esto puede definirse por nombre de usuario o identificaci\u00f3n de usuario. Ahora, por ejemplo, si el ID de usuario 13 puede ejecutar tareas y un atacante crea un nombre de usuario con el nombre de usuario '13', se le permitir\u00eda ejecutar un algoritmo por error. Tambi\u00e9n puede haber otros lugares en el c\u00f3digo donde dicha combinaci\u00f3n de ID o nombre de recurso genera problemas. La versi\u00f3n 4.0.0 contiene un parche para este problema. La mejor soluci\u00f3n es comprobar, cuando se crean o modifican recursos, que el nombre del recurso siempre comience con un car\u00e1cter."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.0.0",
+ "matchCriteriaId": "21C07998-FF3A-4F49-B6B7-97E89CB0A6B4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/vantage6/vantage6/blob/0682c4288f43fee5bcc72dc448cdd99bd7e57f76/docs/release_notes.rst#400",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/vantage6/vantage6/pull/744",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-7x94-6g2m-3hp2",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28793.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28793.json
new file mode 100644
index 00000000000..888061cc425
--- /dev/null
+++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28793.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-28793",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.387",
+ "lastModified": "2023-10-27T00:41:16.730",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en la librer\u00eda signelf utilizada por Zscaler Client Connector en Linux permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Zscaler Client Connector para Linux: versiones anteriores a 1.3.1.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "1.3.1.6",
+ "matchCriteriaId": "58F93164-0E8D-4DDC-BE4E-8D09CC32B322"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux&applicable_version=1.3.1&deployment_date=2022-09-19",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28795.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28795.json
new file mode 100644
index 00000000000..5b0c55228b0
--- /dev/null
+++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28795.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-28795",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.450",
+ "lastModified": "2023-10-27T00:41:21.067",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de error de validaci\u00f3n de origen en Zscaler Client Connector en Linux permite la inclusi\u00f3n de c\u00f3digo en el proceso existente. Este problema afecta a Zscaler Client Connector para Linux: versiones anteriores a 1.3.1.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-346"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-346"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "1.3.1.6",
+ "matchCriteriaId": "58F93164-0E8D-4DDC-BE4E-8D09CC32B322"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux&applicable_version=1.3.1&deployment_date=2022-09-19",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28796.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28796.json
new file mode 100644
index 00000000000..19fd5ba3c1a
--- /dev/null
+++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28796.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-28796",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.507",
+ "lastModified": "2023-10-27T00:41:34.893",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nImproper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La verificaci\u00f3n incorrecta de la vulnerabilidad de Cryptographic Signature en Zscaler Client Connector en Linux permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Zscaler Client Connector para Linux: versiones anteriores a 1.3.1.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-347"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-347"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "1.3.1.6",
+ "matchCriteriaId": "58F93164-0E8D-4DDC-BE4E-8D09CC32B322"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux&applicable_version=1.3.1&deployment_date=2022-09-19",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28797.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28797.json
new file mode 100644
index 00000000000..1a92b4cd438
--- /dev/null
+++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28797.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-28797",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.567",
+ "lastModified": "2023-10-27T00:41:53.097",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Zscaler Client Connector para Windows anterior a 4.1 escribe/elimina un archivo de configuraci\u00f3n dentro de carpetas espec\u00edficas en el disco. Un usuario malintencionado puede reemplazar la carpeta y ejecutar c\u00f3digo como usuario privilegiado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-59"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-59"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "4.1",
+ "matchCriteriaId": "54B697A3-9F3A-4C87-A8E9-462696DF7BB6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28803.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28803.json
new file mode 100644
index 00000000000..deabe0d11c8
--- /dev/null
+++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28803.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-28803",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.627",
+ "lastModified": "2023-10-27T00:42:04.713",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Es posible omitir la autenticaci\u00f3n mediante la suplantaci\u00f3n de un dispositivo con una direcci\u00f3n IP sint\u00e9tica en Zscaler Client Connector en Windows, lo que permite omitir la funcionalidad. Este problema afecta a Client Connector: versiones anteriores a 3.9."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-290"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-290"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "3.9",
+ "matchCriteriaId": "9B8D07A9-4498-4AFE-BE03-7241D844ED24"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28804.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28804.json
new file mode 100644
index 00000000000..64780da86b8
--- /dev/null
+++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28804.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-28804",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.687",
+ "lastModified": "2023-10-27T00:42:14.680",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de verificaci\u00f3n incorrecta de Cryptographic Signature en Zscaler Client Connector en Linux permite reemplazar archivos binarios. Este problema afecta a Linux Client Connector: antes de 1.4.0.105"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-347"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-347"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "1.4.0.105",
+ "matchCriteriaId": "265D988F-CAC9-45C0-A663-257BD0DCEF15"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28805.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28805.json
new file mode 100644
index 00000000000..f01a475face
--- /dev/null
+++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28805.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-28805",
+ "sourceIdentifier": "cve@zscaler.com",
+ "published": "2023-10-23T14:15:09.740",
+ "lastModified": "2023-10-27T00:42:30.530",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Zscaler Client Connector en Linux permite la escalada de privilegios. Este problema afecta a Client Connector: anterior a 1.4.0.105"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.4,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "cve@zscaler.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "1.4.0.105",
+ "matchCriteriaId": "265D988F-CAC9-45C0-A663-257BD0DCEF15"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023",
+ "source": "cve@zscaler.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2854.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2854.json
index 9bc02e0e000..22fb980a67c 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2854.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2854.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-2854",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:17.643",
- "lastModified": "2023-09-17T07:15:09.167",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T18:07:51.753",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "El fallo del analizador de archivos BLF en Wireshark 4.0.0 a 4.0.5 y 3.6.0 a 3.6.13 permite la denegaci\u00f3n de servicio a trav\u00e9s de un archivo de captura manipulado."
}
],
"metrics": {
@@ -90,6 +94,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,11 +131,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-17.html",
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2855.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2855.json
index 7e34d615fb2..47d61c7f2e1 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2855.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2855.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-2855",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:17.757",
- "lastModified": "2023-09-17T07:15:09.267",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T18:02:30.760",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "La falla del analizador de registros de Candump en Wireshark 4.0.0 a 4.0.5 y 3.6.0 a 3.6.13 permite la denegaci\u00f3n de servicio a trav\u00e9s de un archivo de captura manipulado"
}
],
"metrics": {
@@ -90,6 +94,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,11 +131,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-12.html",
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2856.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2856.json
index 0cccf228244..3bb5916b619 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2856.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2856.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-2856",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:17.913",
- "lastModified": "2023-09-17T07:15:09.347",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T17:53:32.420",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "El fallo del analizador de archivos VMS TCPIPtrace en Wireshark 4.0.0 a 4.0.5 y 3.6.0 a 3.6.13 permite la denegaci\u00f3n de servicio a trav\u00e9s de un archivo de captura manipulado."
}
],
"metrics": {
@@ -90,6 +94,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,15 +136,25 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-16.html",
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2857.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2857.json
index 64f95de8bb4..18a1ecafec6 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2857.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2857.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-2857",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:18.273",
- "lastModified": "2023-09-17T07:15:09.427",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T17:53:17.220",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "El fallo del analizador de archivos BLF en Wireshark 4.0.0 a 4.0.5 y 3.6.0 a 3.6.13 permite la denegaci\u00f3n de servicio a trav\u00e9s de un archivo de captura manipulado."
}
],
"metrics": {
@@ -90,6 +94,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,11 +131,17 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-13.html",
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2858.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2858.json
index b3b8e335f4a..0dbc9a9bc2a 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2858.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2858.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-2858",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:18.633",
- "lastModified": "2023-09-17T07:15:09.547",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T17:52:55.287",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "El fallo del analizador de archivos BLF en Wireshark 4.0.0 a 4.0.5 y 3.6.0 a 3.6.13 permite la denegaci\u00f3n de servicio a trav\u00e9s de un archivo de captura manipulado."
}
],
"metrics": {
@@ -90,6 +94,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,15 +136,24 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-15.html",
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2879.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2879.json
index 0f1c698c2b6..4a16a7a1e79 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2879.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2879.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-2879",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:19.000",
- "lastModified": "2023-09-17T07:15:09.630",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T17:52:45.083",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "GDSDB bucle infinito en Wireshark 4.0.0 a 4.0.5 y 3.6.0 a 3.6.13 permite la denegaci\u00f3n de servicio a trav\u00e9s de inyecci\u00f3n de paquetes o archivo de captura manipulado"
}
],
"metrics": {
@@ -90,6 +94,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,15 +136,25 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-14.html",
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2886.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2886.json
index e7526228e93..6503d843323 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2886.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2886.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2886",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-05-25T09:15:12.303",
- "lastModified": "2023-08-16T08:15:40.977",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-18T08:15:07.697",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -17,20 +17,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
- "confidentialityImpact": "LOW",
+ "confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
- "baseScore": 5.4,
+ "baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
- "impactScore": 2.5
+ "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2898.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2898.json
index 507c638528a..128107a797b 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2898.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2898.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2898",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-26T22:15:14.727",
- "lastModified": "2023-09-29T22:15:11.190",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:13.620",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -78,6 +78,10 @@
}
],
"references": [
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lore.kernel.org/linux-f2fs-devel/20230522124203.3838360-1-chao@kernel.org/",
"source": "secalert@redhat.com",
diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29009.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29009.json
new file mode 100644
index 00000000000..412c9ed5897
--- /dev/null
+++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29009.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-29009",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-27T20:15:09.010",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "baserCMS is a website development framework with WebAPI that runs on PHP8 and CakePHP4. There is a XSS Vulnerability in Favorites Feature to baserCMS. This issue has been patched in version 4.8.0.\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://basercms.net/security/JVN_45547161",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/baserproject/basercms/releases/tag/basercms-4.8.0",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-8vqx-prq4-rqrq",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29023.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29023.json
index cbca31fc19e..4e0712cec0e 100644
--- a/CVE-2023/CVE-2023-290xx/CVE-2023-29023.json
+++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29023.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29023",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-05-11T18:15:13.163",
- "lastModified": "2023-05-15T17:45:08.583",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:27.050",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -71,7 +71,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "CWE-79"
}
]
}
diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29024.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29024.json
index 3fbb15c99db..b8896986483 100644
--- a/CVE-2023/CVE-2023-290xx/CVE-2023-29024.json
+++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29024.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29024",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-05-11T18:15:13.240",
- "lastModified": "2023-05-15T17:45:04.930",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:27.150",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -71,7 +71,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "CWE-79"
}
]
}
diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29025.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29025.json
index 28bed267516..4736af1b9d5 100644
--- a/CVE-2023/CVE-2023-290xx/CVE-2023-29025.json
+++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29025.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29025",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-05-11T18:15:13.323",
- "lastModified": "2023-05-15T17:45:31.340",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:27.230",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -71,7 +71,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "CWE-79"
}
]
}
diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29030.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29030.json
index 58d38e0322f..35865f127f1 100644
--- a/CVE-2023/CVE-2023-290xx/CVE-2023-29030.json
+++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29030.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29030",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-05-11T18:15:13.770",
- "lastModified": "2023-05-15T17:46:39.870",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:27.313",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -71,7 +71,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "CWE-79"
}
]
}
diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29031.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29031.json
index 177b08b0647..d572a836a62 100644
--- a/CVE-2023/CVE-2023-290xx/CVE-2023-29031.json
+++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29031.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29031",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-05-11T18:15:13.843",
- "lastModified": "2023-05-15T17:46:57.373",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:27.397",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -71,7 +71,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "CWE-79"
}
]
}
diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json
index 4531b44a78c..9e6733d7fe5 100644
--- a/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json
+++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29334",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-28T18:15:26.390",
- "lastModified": "2023-09-30T11:15:13.547",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:53:01.143",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -75,7 +75,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json
index e2fabfacdfd..e5e704fbd14 100644
--- a/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json
+++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29350.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29350",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-05T23:15:09.253",
- "lastModified": "2023-09-30T11:15:13.620",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:54:16.570",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -75,7 +75,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json
index 1dda8b0e680..6b2a7ac86a1 100644
--- a/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json
+++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29354.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29354",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-05T23:15:09.333",
- "lastModified": "2023-09-30T11:15:13.713",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:54:10.640",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -75,7 +75,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202309-17",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29453.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29453.json
index 9b2bfbc278c..c8cbb716fd1 100644
--- a/CVE-2023/CVE-2023-294xx/CVE-2023-29453.json
+++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29453.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-29453",
"sourceIdentifier": "security@zabbix.com",
"published": "2023-10-12T06:15:13.077",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T14:50:55.717",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g., \"var a = {{.}}\"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template. Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution."
+ },
+ {
+ "lang": "es",
+ "value": "Las plantillas no consideran correctamente las comillas invertidas (`) como delimitadores de cadenas de Javascript y no las escapan como se esperaba. Las comillas invertidas se utilizan, desde ES6, para los literales de plantillas JS. Si una plantilla contiene una acci\u00f3n de plantilla Go dentro de un literal de plantilla Javascript, el contenido de la acci\u00f3n se puede usar para terminar el literal, inyectando c\u00f3digo Javascript arbitrario en la plantilla Go. Como los literales de plantilla de ES6 son bastante complejos y ellos mismos pueden hacer interpolaci\u00f3n de cadenas, se tom\u00f3 la decisi\u00f3n de simplemente no permitir que se utilicen acciones de plantilla de Go dentro de ellos (por ejemplo, \"var a = {{.}}\"), ya que no hay forma obviamente segura de permitir este comportamiento. Esto adopta el mismo enfoque que github.com/google/safehtml. Con arreglo, Plantilla. Parse devuelve un error cuando encuentra plantillas como esta, con un c\u00f3digo de error de valor 12. Este c\u00f3digo de error no se ha exportado actualmente, pero se exportar\u00e1 en la versi\u00f3n de Go 1.21. Los usuarios que conf\u00edan en el comportamiento anterior pueden volver a habilitarlo usando el indicador GODEBUG jstmpllitinterp=1, con la advertencia de que ahora se escapar\u00e1n las comillas invertidas. Esto debe usarse con precauci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "security@zabbix.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-94"
+ }
+ ]
+ },
{
"source": "security@zabbix.com",
"type": "Secondary",
@@ -46,10 +80,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix-agent2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.0.0",
+ "versionEndExcluding": "5.0.35",
+ "matchCriteriaId": "2950ACED-D8E9-456D-AEBF-5E5E145A6B82"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix-agent2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0.0",
+ "versionEndExcluding": "6.0.18",
+ "matchCriteriaId": "EDA29820-0B03-4566-BB94-AC420CE44CBB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix-agent2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.4.0",
+ "versionEndExcluding": "6.4.3",
+ "matchCriteriaId": "CE6BD8DF-5ACA-4B40-BA17-05C8E398B503"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://support.zabbix.com/browse/ZBX-23388",
- "source": "security@zabbix.com"
+ "source": "security@zabbix.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29462.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29462.json
index 1c6d2f75e1e..b20f5d73fd3 100644
--- a/CVE-2023/CVE-2023-294xx/CVE-2023-29462.json
+++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29462.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29462",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-05-09T14:15:13.343",
- "lastModified": "2023-05-17T18:26:52.220",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T18:15:09.830",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -71,7 +71,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-125"
+ "value": "CWE-787"
}
]
}
@@ -99,6 +99,13 @@
}
],
"references": [
+ {
+ "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139391",
+ "source": "PSIRT@rockwellautomation.com",
+ "tags": [
+ "Broken Link"
+ ]
+ },
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-10",
"source": "nvd@nist.gov",
diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29464.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29464.json
index a1276fddd13..bcea0888e01 100644
--- a/CVE-2023/CVE-2023-294xx/CVE-2023-29464.json
+++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29464.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-29464",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-10-13T13:15:11.453",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T20:10:53.483",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nFactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor to read data from memory via crafted malicious packets. Sending a size larger than the buffer size results in leakage of data from memory resulting in an information disclosure. If the size is large enough, it causes communications over the common industrial protocol to become unresponsive to any type of packet, resulting in a denial-of-service to FactoryTalk Linx over the common industrial protocol.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "FactoryTalk Linx, en Rockwell Automation PanelView Plus, permite que un actor de amenazas no autenticado lea datos de la memoria a trav\u00e9s de paquetes maliciosos manipulados. Enviar un tama\u00f1o mayor que el tama\u00f1o del b\u00fafer da como resultado una fuga de datos de la memoria, lo que resulta en una divulgaci\u00f3n de informaci\u00f3n. Si el tama\u00f1o es lo suficientemente grande, hace que las comunicaciones a trav\u00e9s del protocolo industrial com\u00fan dejen de responder a cualquier tipo de paquete, lo que resulta en una Denegaci\u00f3n de Servicio (DoS) para FactoryTalk Linx a trav\u00e9s del protocolo industrial com\u00fan."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@@ -46,10 +80,36 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_linx:6.20:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0753AB1-A633-4B8B-983E-1FA04EDDB2BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_linx:6.30:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22A83428-A3F4-45DD-95D2-D938CE82E4AE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141040",
- "source": "PSIRT@rockwellautomation.com"
+ "source": "PSIRT@rockwellautomation.com",
+ "tags": [
+ "Permissions Required",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29484.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29484.json
index fafa2bed515..8b092e79c58 100644
--- a/CVE-2023/CVE-2023-294xx/CVE-2023-29484.json
+++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29484.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29484",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T20:15:14.423",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T13:39:23.563",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,15 +14,99 @@
"value": "En Terminalfour anterior a 8.3.16, los usuarios LDAP mal configurados pueden iniciar sesi\u00f3n con una contrase\u00f1a no v\u00e1lida."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:terminalfour:terminalfour:7.4.0004:qp3:*:*:*:*:*:*",
+ "matchCriteriaId": "15737F32-A5C2-401E-8DF4-F5615AAD6473"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:terminalfour:terminalfour:8.2.18.2.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B5447EF3-9A0D-46CB-A8DD-F88327D74C97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:terminalfour:terminalfour:8.2.18.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7B7456B-FBBB-4074-A268-784EFFCC567A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:terminalfour:terminalfour:8.3.11.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCCDDB67-3BBE-43BD-993F-7BF5FEA65169"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:terminalfour:terminalfour:8.3.14.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0558454-674B-45B6-B223-6458701D90FF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:terminalfour:terminalfour:8.3.16:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E42F0B63-691C-4E14-BCAF-1E3754E11EA4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://docs.terminalfour.com/articles/security-notices/cve-2023-29484/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://docs.terminalfour.com/release-notes/83/16.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29842.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29842.json
index 0c05da97ede..34041414341 100644
--- a/CVE-2023/CVE-2023-298xx/CVE-2023-29842.json
+++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29842.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-29842",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-04T03:15:09.600",
- "lastModified": "2023-10-16T18:15:15.697",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:03:11.893",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "NONE",
+ "privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL"
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
},
- "exploitabilityScore": 3.9,
+ "exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
@@ -66,7 +66,12 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/175105/ChurchCRM-4.5.4-SQL-Injection.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/ChurchCRM/CRM",
diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29973.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29973.json
new file mode 100644
index 00000000000..ff5d95293ae
--- /dev/null
+++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29973.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-29973",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:27.493",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Pfsense CE version 2.6.0 is vulnerable to No rate limit which can lead to an attacker creating multiple malicious users in firewall."
+ },
+ {
+ "lang": "es",
+ "value": "Pfsense CE versi\u00f3n 2.6.0 es vulnerable a No rate limit, lo que puede llevar a que un atacante cree m\u00faltiples usuarios maliciosos en el firewall."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.esecforte.com/cve-2023-29973-no-rate-limit/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json
index ef94e691a15..12b7c1f9dca 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-2952",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-30T23:15:09.887",
- "lastModified": "2023-09-17T07:15:09.717",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T17:52:38.970",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file"
+ },
+ {
+ "lang": "es",
+ "value": "El bucle infinito del disector XRA en Wireshark 4.0.0 a 4.0.5 y 3.6.0 a 3.6.13 permite la denegaci\u00f3n de servicio mediante la inyecci\u00f3n de paquetes o un archivo de captura manipulado"
}
],
"metrics": {
@@ -101,6 +105,11 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
@@ -126,16 +135,23 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00004.html",
"source": "cve@gitlab.com",
"tags": [
- "Mailing List"
+ "Mailing List",
+ "Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202309-02",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5429",
- "source": "cve@gitlab.com"
+ "source": "cve@gitlab.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html",
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2978.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2978.json
index 39a8ff55375..c10d3391399 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2978.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2978.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2978",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T14:15:09.763",
- "lastModified": "2023-06-05T18:02:38.967",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T08:15:08.147",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Change Subscription Handler. The manipulation leads to authorization bypass. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-230210 is the identifier assigned to this vulnerability."
+ "value": "A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Change Subscription Handler. The manipulation leads to authorization bypass. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-230210 is the identifier assigned to this vulnerability."
}
],
"metrics": {
@@ -111,6 +111,10 @@
}
],
"references": [
+ {
+ "url": "https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://pydio.com/en/community/releases/pydio-cells/pydio-cells-enterprise-421",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2979.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2979.json
index 3a9df772874..63f0fb80b5d 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2979.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2979.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2979",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T14:15:09.843",
- "lastModified": "2023-06-05T18:03:03.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T08:15:08.253",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in Abstrium Pydio Cells 4.2.0. This affects an unknown part of the component User Creation Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230211."
+ "value": "A vulnerability classified as critical has been found in Abstrium Pydio Cells 4.2.0. This affects an unknown part of the component User Creation Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230211."
}
],
"metrics": {
@@ -111,6 +111,10 @@
}
],
"references": [
+ {
+ "url": "https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://pydio.com/en/community/releases/pydio-cells/pydio-cells-enterprise-421",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2980.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2980.json
index 7829b7eb25e..8b594391b9c 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2980.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2980.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2980",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T15:15:09.467",
- "lastModified": "2023-06-05T18:03:52.583",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T08:15:08.327",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical was found in Abstrium Pydio Cells 4.2.0. This vulnerability affects unknown code of the component User Creation Handler. The manipulation leads to improper control of resource identifiers. The attack can be initiated remotely. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230212."
+ "value": "A vulnerability classified as critical was found in Abstrium Pydio Cells 4.2.0. This vulnerability affects unknown code of the component User Creation Handler. The manipulation leads to improper control of resource identifiers. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230212."
}
],
"metrics": {
@@ -111,6 +111,10 @@
}
],
"references": [
+ {
+ "url": "https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://pydio.com/en/community/releases/pydio-cells/pydio-cells-enterprise-421",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2981.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2981.json
index 3b60af82dda..2bbfbb7d273 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2981.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2981.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2981",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T15:15:09.553",
- "lastModified": "2023-06-05T18:04:19.170",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T08:15:08.400",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in Abstrium Pydio Cells 4.2.0. This issue affects some unknown processing of the component Chat. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230213 was assigned to this vulnerability."
+ "value": "A vulnerability, which was classified as problematic, has been found in Abstrium Pydio Cells 4.2.0. This issue affects some unknown processing of the component Chat. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230213 was assigned to this vulnerability."
}
],
"metrics": {
@@ -111,6 +111,10 @@
}
],
"references": [
+ {
+ "url": "https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be",
+ "source": "cna@vuldb.com"
+ },
{
"url": "https://pydio.com/en/community/releases/pydio-cells/pydio-cells-enterprise-421",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2995.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2995.json
index 7475b36b922..722cc901428 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2995.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2995.json
@@ -2,16 +2,16 @@
"id": "CVE-2023-2995",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-09-19T20:15:09.120",
- "lastModified": "2023-09-21T13:13:26.580",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T09:15:08.867",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "The Leyka WordPress plugin through 3.30.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
+ "value": "The Leyka WordPress plugin before 3.30.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
},
{
"lang": "es",
- "value": "El complemento Leyka de WordPress hasta la versi\u00f3n 3.30.3 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Stored Cross-Site Scripting incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
+ "value": "El complemento Leyka WordPress anterior a 3.30.4 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting almacenados incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30131.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30131.json
new file mode 100644
index 00000000000..5e371e45beb
--- /dev/null
+++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30131.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-30131",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T21:15:08.743",
+ "lastModified": "2023-10-26T14:15:22.767",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue discovered in IXP EasyInstall 6.6.14884.0 allows attackers to run arbitrary commands, gain escalated privilege, and cause other unspecified impacts via unauthenticated API calls."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema descubierto en IXP EasyInstall 6.6.14884.0 permite a los atacantes ejecutar comandos arbitrarios, obtener privilegios elevados y causar otros impactos no especificados a trav\u00e9s de llamadas API no autenticadas."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ixpdata:easyinstall:6.6.148840:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E4D3B40C-C1D0-41C5-B8E7-73EBF11E2A2F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.bramfitt-tech-labs.com/article/easy-install-cve-issue",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30132.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30132.json
new file mode 100644
index 00000000000..cc2f366a7bf
--- /dev/null
+++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30132.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-30132",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T21:15:08.787",
+ "lastModified": "2023-10-26T14:17:33.853",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue discovered in IXP Data EasyInstall 6.6.14907.0 allows attackers to gain escalated privileges via static Cryptographic Key."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema descubierto en IXP Data EasyInstall 6.6.14907.0 permite a los atacantes obtener privilegios aumentados a trav\u00e9s de una Clave Criptogr\u00e1fica est\u00e1tica."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-326"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ixpdata:easyinstall:6.6.14907.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B36668E0-1EE5-4222-A266-DB48404EB9F1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.bramfitt-tech-labs.com/article/easy-install-cve-issue",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30148.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30148.json
index 5b0b16fef4b..d92c1bbbe5d 100644
--- a/CVE-2023/CVE-2023-301xx/CVE-2023-30148.json
+++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30148.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-30148",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-14T04:15:10.933",
- "lastModified": "2023-10-14T17:32:33.483",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:16:01.450",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple Stored Cross Site Scripting (XSS) vulnerabilities in Opart opartmultihtmlblock before version 2.0.12 and Opart multihtmlblock* version 1.0.0, allows remote authenticated users to inject arbitrary web script or HTML via the body_text or body_text_rude field in /sourcefiles/BlockhtmlClass.php and /sourcefiles/blockhtml.php."
+ },
+ {
+ "lang": "es",
+ "value": "M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) Almacenado en Opart opartmultihtmlblock anterior a la versi\u00f3n 2.0.12 y Opart multihtmlblock* versi\u00f3n 1.0.0, permiten a usuarios remotos autenticados inyectar scripts web o HTML arbitrarios a trav\u00e9s del campo body_text o body_text_rude en /sourcefiles/BlockhtmlClass.php y /sourcefiles/blockhtml.php."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "cve@mitre.org",
"type": "Secondary",
@@ -34,10 +58,44 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:opart:multi_html_block:*:*:*:*:*:prestashop:*:*",
+ "versionEndExcluding": "2.0.12",
+ "matchCriteriaId": "26C0B971-9CCD-467D-9648-DC6096CCDAAC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/10/10/opartmultihtmlblock.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30154.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30154.json
index fdd6e57ff03..eafc8233d4b 100644
--- a/CVE-2023/CVE-2023-301xx/CVE-2023-30154.json
+++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30154.json
@@ -2,19 +2,80 @@
"id": "CVE-2023-30154",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-14T04:15:11.393",
- "lastModified": "2023-10-14T17:32:33.483",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:23:45.270",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple improper neutralization of SQL parameters in module AfterMail (aftermailpresta) for PrestaShop, before version 2.2.1, allows remote attackers to perform SQL injection attacks via `id_customer`, `id_conf`, `id_product` and `token` parameters in `aftermailajax.php via the 'id_product' parameter in hooks DisplayRightColumnProduct and DisplayProductButtons."
+ },
+ {
+ "lang": "es",
+ "value": "La neutralizaci\u00f3n m\u00faltiple inadecuada de par\u00e1metros SQL en el m\u00f3dulo AfterMail (aftermailpresta) para PrestaShop, anterior a la versi\u00f3n 2.2.1, permite a atacantes remotos realizar ataques de inyecci\u00f3n SQL a trav\u00e9s de los par\u00e1metros `id_customer`, `id_conf`, `id_product` y `token` en `aftermailajax.php` a trav\u00e9s del par\u00e1metro 'id_product' en los hooks DisplayRightColumnProduct y DisplayProductButtons."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:shoprunners:aftermail:*:*:*:*:*:prestashop:*:*",
+ "versionEndExcluding": "2.2.1",
+ "matchCriteriaId": "61260C43-B987-47A3-A578-D470AFA7AC7F"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/10/10/aftermailpresta.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30492.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30492.json
new file mode 100644
index 00000000000..0728d2e6dfe
--- /dev/null
+++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30492.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-30492",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T12:15:08.513",
+ "lastModified": "2023-10-26T12:58:59.800",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Vark Minimum Purchase for WooCommerce plugin <=\u00a02.0.0.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenada autenticada (con permisos de colaborador o superior) en el complemento Vark Minimum Purchase para WooCommerce en versiones <= 2.0.0.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/minimum-purchase-for-woocommerce/wordpress-minimum-purchase-for-woocommerce-plugin-2-0-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-305xx/CVE-2023-30534.json b/CVE-2023/CVE-2023-305xx/CVE-2023-30534.json
index 916c5ecaa6d..379689c71a7 100644
--- a/CVE-2023/CVE-2023-305xx/CVE-2023-30534.json
+++ b/CVE-2023/CVE-2023-305xx/CVE-2023-30534.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-30534",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T22:15:08.240",
- "lastModified": "2023-10-13T04:15:11.693",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:51:29.807",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -95,15 +115,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.fastly.com/blog/cve-2023-30534-insecure-deserialization-in-cacti-prior-to-1-2-25",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-305xx/CVE-2023-30562.json b/CVE-2023/CVE-2023-305xx/CVE-2023-30562.json
index 089dfc449a4..95edf82c4c8 100644
--- a/CVE-2023/CVE-2023-305xx/CVE-2023-30562.json
+++ b/CVE-2023/CVE-2023-305xx/CVE-2023-30562.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-30562",
"sourceIdentifier": "cybersecurity@bd.com",
"published": "2023-07-13T20:15:09.080",
- "lastModified": "2023-07-25T18:47:10.843",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T16:15:08.433",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -37,20 +37,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
- "integrityImpact": "HIGH",
- "availabilityImpact": "HIGH",
- "baseScore": 6.7,
- "baseSeverity": "MEDIUM"
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.0,
+ "baseSeverity": "LOW"
},
"exploitabilityScore": 1.5,
- "impactScore": 5.2
+ "impactScore": 1.4
}
]
},
diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30633.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30633.json
new file mode 100644
index 00000000000..049f546aa2b
--- /dev/null
+++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30633.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-30633",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T20:15:08.990",
+ "lastModified": "2023-10-20T11:27:35.620",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in TrEEConfigDriver in Insyde InsydeH2O with kernel 5.0 through 5.5. It can report false TPM PCR values, and thus mask malware activity. Devices use Platform Configuration Registers (PCRs) to record information about device and software configuration to ensure that the boot process is secure. (For example, Windows uses these PCR measurements to determine device health.) A vulnerable device can masquerade as a healthy device by extending arbitrary values into Platform Configuration Register (PCR) banks. This requires physical access to a target victim's device, or compromise of user credentials for a device. This issue is similar to CVE-2021-42299 (on Surface Pro devices)."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en TrEEConfigDriver de Insyde InsydeH2O con kernel 5.0 a 5.5. Puede informar valores falsos de TPM PCR y, por tanto, enmascarar la actividad de malware. Los dispositivos utilizan Platform Configuration Registers (PCR) para registrar informaci\u00f3n sobre la configuraci\u00f3n del dispositivo y del software para garantizar que el proceso de arranque sea seguro. (Por ejemplo, Windows utiliza estas mediciones de PCR para determinar el estado del dispositivo). Un dispositivo vulnerable puede hacerse pasar por un dispositivo en buen estado extendiendo valores arbitrarios a los bancos del Platform Configuration Registers (PCR). Esto requiere acceso f\u00edsico al dispositivo de la v\u00edctima objetivo o comprometer las credenciales de usuario de un dispositivo. Este problema es similar a CVE-2021-42299 (en dispositivos Surface Pro)."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.insyde.com/security-pledge",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.insyde.com/security-pledge/SA-2023045",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30774.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30774.json
index a93e50f9eb0..73e4bac5a1e 100644
--- a/CVE-2023/CVE-2023-307xx/CVE-2023-30774.json
+++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30774.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-30774",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-19T15:15:08.923",
- "lastModified": "2023-07-03T16:15:10.150",
+ "lastModified": "2023-10-26T00:15:09.963",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -74,6 +74,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://access.redhat.com/security/cve/CVE-2023-30774",
"source": "secalert@redhat.com",
@@ -100,6 +104,10 @@
{
"url": "https://security.netapp.com/advisory/ntap-20230703-0002/",
"source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "secalert@redhat.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30781.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30781.json
new file mode 100644
index 00000000000..48ca8a03558
--- /dev/null
+++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30781.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-30781",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T14:15:09.237",
+ "lastModified": "2023-10-25T01:26:48.097",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Theme Blvd Tweeple plugin <=\u00a00.9.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Theme Blvd Tweeple en versiones <= 0.9.5."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:themeblvd:tweeple:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "0.9.5",
+ "matchCriteriaId": "4FD92DA8-285B-4150-8D8D-A3D6C32036FE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/tweeple/wordpress-tweeple-plugin-0-9-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30801.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30801.json
index 519f69626af..baa7d7cb835 100644
--- a/CVE-2023/CVE-2023-308xx/CVE-2023-30801.json
+++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30801.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-30801",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2023-10-10T14:15:10.493",
- "lastModified": "2023-10-10T14:58:46.263",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T02:17:16.787",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the \"external program\" feature in the web user interface. This was reportedly exploited in the wild in March 2023.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Todas las versiones del cliente qBittorrent hasta la 4.5.5 utilizan credenciales predeterminadas cuando la interfaz de usuario web est\u00e1 habilitada. El administrador no est\u00e1 obligado a cambiar las credenciales predeterminadas. A partir de 4.5.5, este problema no se ha solucionado. Un atacante remoto puede utilizar las credenciales predeterminadas para autenticar y ejecutar comandos arbitrarios del sistema operativo utilizando la funci\u00f3n \"programa externo\" en la interfaz de usuario web. Seg\u00fan se informa, esto fue explotado salvajemente en marzo de 2023."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
+ },
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
@@ -46,14 +80,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:qbittorrent:qbittorrent:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "4.5.5",
+ "matchCriteriaId": "A1B8F48C-E176-4D0E-A303-596701DD2EF4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/qbittorrent/qBittorrent/issues/18731",
- "source": "disclosure@vulncheck.com"
+ "source": "disclosure@vulncheck.com",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://vulncheck.com/advisories/qbittorrent-default-creds",
- "source": "disclosure@vulncheck.com"
+ "source": "disclosure@vulncheck.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30911.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30911.json
new file mode 100644
index 00000000000..0fcf8ef8395
--- /dev/null
+++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30911.json
@@ -0,0 +1,505 @@
+{
+ "id": "CVE-2023-30911",
+ "sourceIdentifier": "security-alert@hpe.com",
+ "published": "2023-10-18T18:15:09.033",
+ "lastModified": "2023-10-25T01:24:10.810",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "HPE Integrated Lights-Out 5 e Integrated Lights-Out 6 que utilizan iLOrest pueden provocar una Denegaci\u00f3n de Servicio."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-alert@hpe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.98",
+ "matchCriteriaId": "DAF9FFD1-73D6-40AD-849B-EB4749B5AAE3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_2000_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6135F141-E7EE-4DCE-988F-62F7B5815EBA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1BF55930-EC9C-4C0D-8092-3E1091902D4B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CFB818A6-80D5-4DD7-8E0D-EC25764A0693"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "25418088-0890-401E-837C-611154B2C433"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1480B92-9A59-4675-B2DF-6DAE385927B2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC09C72C-0BD3-4DB1-96C6-72F2330D4165"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB23B5E3-887B-41C8-B83E-0203BEC9DDB1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33A5C2F7-66E1-483F-95E7-D51C6D32E7CA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_r2200_gen10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F3FF527B-51BF-445B-80D0-42FD50D6F60A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A478D98-EE4E-45ED-A257-F154693E6FB2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3CAC257C-8594-454D-BA28-5D98F03AF3EC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4CB4D5F2-2E5C-4191-ACA0-D086E08FFDA4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AC36ED1-D392-4DC6-B3E0-99A821705AA2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D0ACC75-47E9-439A-9338-170478FB326F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C25FD273-0E16-4975-985C-8BD96AE0D449"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "554BD1A9-19DC-40E7-875F-2C6091CDC904"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0C77CAF-0A18-4447-93BD-C64595475E37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "08D81BA5-E5D8-4D42-8C42-A91063008359"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EA978EC2-6027-4605-BECC-68B4682DB5E5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B15D52EA-CE63-47AF-993D-265163B5B38E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1F98CB6-3933-4425-A7E9-542AB764C8C4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A91E7E91-BED2-4CFE-AB7A-8537F1A589C8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BE801CF-95AB-409A-8063-9525FC1A3BF1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4A540039-4339-44CE-92AD-83B80928FC81"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD08B95A-240C-436E-91B5-2D594F6F1F07"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7151CE9-BAD2-47B8-9283-5BEB53C93D98"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E27B2E8E-1F1D-4397-BE33-80755D6BE56C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8545248A-2943-4B8D-A295-BE7D43492BC9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00B032E4-9663-4525-ACC4-217B5E266124"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "61758FDD-0744-4207-950E-D11717E9E5D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D3845235-CAFC-4FB3-AB26-F0E8A8815F88"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8389F7F-7653-4695-91CC-DCFACC870094"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "419470B4-80EF-46BF-8DB4-6569D3E8435F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "174EF59C-18A6-4490-A23A-76E74C1D2AFA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C755817B-B074-4496-934B-A30C72A4F849"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E79D5665-6654-4AF7-A3DE-7F338067E8C3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F8B5AC2-7889-4654-88D2-289CE20A4ED7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_microserver_gen10_plus_v2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCB4EDC6-F7DA-4DCD-AB0B-BCCD5B4776DC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB32875E-11E3-443E-809C-12CCAE574570"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5527AD20-7E19-4987-915D-FCFFEBFDA4C6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76C24685-FEE2-494F-9806-56477E62FD1A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7DE16BA-939E-4C26-B03B-439E60C7C872"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B224273-2E15-41F2-84D6-D754F6B76B49"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1ACD7139-05F6-4D60-BB0F-9AA6952720CA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "01181BEB-DE0B-49AA-B632-91B40046120F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9334B70C-EBBD-4D0F-A0DC-EC84E014701E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "50247A44-3EA0-4B4B-9AB6-64D9B470F190"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A21F0B8-D613-46CD-BAEC-5CD876FD5352"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4435D5C3-A7CB-4EA6-87A9-6026DAC8DA47"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72F58441-4DFB-42F3-AA93-500AAF712D1B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "424298C0-01E2-4770-818D-25F47A801F88"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1E7408A4-7409-4223-ABA7-C1F35E84D213"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C3D137A-E744-4543-83DF-7B0E01F4456C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "853AF641-B81C-4FB7-89AB-EACF420F0C62"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F15301B-B695-4DC8-9EE5-517AC2E64778"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19188281-533B-450E-84F1-089F3300D08E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:hpe:integrated_lights-out_6_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.53",
+ "matchCriteriaId": "46E5BFA5-D47B-4D7D-9328-9210F5289934"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:alletra_4110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F66E9860-0CC6-4C51-9B1D-D56CBD1F231B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:alletra_4120:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F95280DF-C0DD-4685-9F1E-5B8F2BA8CFD7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:alletra_4140:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB18DECF-4A39-4970-BE37-7C19818BD78A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl110_gen11:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D3F028DB-68DF-4551-9D52-99D02F5DDBD3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl20_gen11:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2378D39A-9737-4681-A724-1CF9B252D29E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl320_gen11_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D01E2C9-76B7-4C23-A9B4-7BFB90F7F848"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl325_gen11_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B8A4A0C-A33A-48E5-8F53-807A20333DE9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl345_gen11_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37DFB5BE-E36B-4D5D-AC60-267799B6AEF9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl360_gen11_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE19E0B8-B23C-41E0-82DA-BEFBCDC7954A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl365_gen11_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8E5A73F-96A5-4488-8DAE-3ECBEAD71CE9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl380_gen11_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "05AF31FE-6C42-4D64-A216-7FD5383D50F5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl380a_gen11:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A576DB6-E28A-44F3-9D02-AB6DB197589D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl385_gen11_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "36449636-2501-4608-968D-9E73090A4D43"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_dl560_gen11:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8E15353-5528-4630-87CE-1D1304C13E97"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_ml110_gen11:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79E6B854-C81C-4D33-856F-6BBE7AA38863"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_ml30_gen11:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ADDD6399-8558-4642-83FF-B0F8E370F549"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_ml350_gen11_server:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A24D0AE-55B8-438A-B956-3A20F34382F2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:proliant_rl300_gen11:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEC202C6-AD3B-4C2C-9BA6-3F5356EF30AC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hpe:synergy_480_gen11_compute_module:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AF809BB7-50A7-4477-A627-D63A3AE5AA18"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04544en_us",
+ "source": "security-alert@hpe.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30912.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30912.json
new file mode 100644
index 00000000000..ce7ed8726c6
--- /dev/null
+++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30912.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-30912",
+ "sourceIdentifier": "security-alert@hpe.com",
+ "published": "2023-10-25T18:17:27.543",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nA remote code execution issue exists in HPE OneView.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe un problema de ejecuci\u00f3n remota de c\u00f3digo en HPE OneView."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-alert@hpe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04548en_us",
+ "source": "security-alert@hpe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30967.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30967.json
new file mode 100644
index 00000000000..a7bdb95f658
--- /dev/null
+++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30967.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-30967",
+ "sourceIdentifier": "cve-coordination@palantir.com",
+ "published": "2023-10-26T00:15:10.040",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Gotham Orbital-Simulator service prior to 0.692.0 was found to be vulnerable to a Path traversal issue allowing an unauthenticated user to read arbitrary files on the file system. "
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que el servicio Gotham Orbital-Simulator anterior a 0.692.0 era vulnerable a un problema de Path Traversal que permit\u00eda a un usuario no autenticado leer archivos arbitrarios en el sistema de archivos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cve-coordination@palantir.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://palantir.safebase.us/?tcuUid=8fd5809f-26f8-406e-b36f-4a6596a19d79",
+ "source": "cve-coordination@palantir.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30969.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30969.json
new file mode 100644
index 00000000000..7998c5a8de7
--- /dev/null
+++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30969.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-30969",
+ "sourceIdentifier": "cve-coordination@palantir.com",
+ "published": "2023-10-26T00:15:10.107",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Palantir Tiles1 service was found to be vulnerable to an API wide issue where the service was not performing authentication/authorization on all the endpoints.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que el servicio Palantir Tiles1 era vulnerable a un problema en toda la API en el que el servicio no realizaba autenticaci\u00f3n/autorizaci\u00f3n en todos los endpoints."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cve-coordination@palantir.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://palantir.safebase.us/?tcuUid=afcbc9b2-de62-44b9-b28b-2ebf0684fbf7",
+ "source": "cve-coordination@palantir.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30987.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30987.json
index 86c2ab81dd0..4938612f393 100644
--- a/CVE-2023/CVE-2023-309xx/CVE-2023-30987.json
+++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30987.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-30987",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T21:15:10.627",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:05:29.397",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,153 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.5",
+ "versionEndExcluding": "11.5.8",
+ "matchCriteriaId": "65161064-A4A3-48E5-AC0A-388429FF2F53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:-:*:*:*:*:*:*",
+ "matchCriteriaId": "190AE881-F7BF-486E-BDAE-197337D70CDB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D1BAA43-4C77-4AC7-8561-93EDE0AED000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp2:*:*:*:*:*:*",
+ "matchCriteriaId": "87C39880-D0E9-4487-9A80-B4D1A999032F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp3:*:*:*:*:*:*",
+ "matchCriteriaId": "8842A8B6-E470-4536-AB5D-DA1C62A05F58"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp3a:*:*:*:*:*:*",
+ "matchCriteriaId": "92BF0482-E4FE-454E-84DD-27074097F3F3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp4:*:*:*:*:*:*",
+ "matchCriteriaId": "3705A79B-7903-4055-9CDC-55D60D2AC2E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp5:*:*:*:*:*:*",
+ "matchCriteriaId": "CBDFCE61-EE04-4901-844D-61B8966C1B81"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp6:*:*:*:*:*:*",
+ "matchCriteriaId": "53A23363-413D-4785-B8C1-9AC2F96000EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp7:*:*:*:*:*:*",
+ "matchCriteriaId": "6E22D884-A33F-41D7-84CB-B6360A39863F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp8:*:*:*:*:*:*",
+ "matchCriteriaId": "4DA56D35-93E9-4659-B180-2FD636A39BAB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp9:*:*:*:*:*:*",
+ "matchCriteriaId": "6E7F0B02-EA0B-4BD1-AA0C-2A4735221963"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "7F91EC14-CD9A-42EB-9D81-6025A1D74749"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp1:*:*:*:*:*:*",
+ "matchCriteriaId": "5D098641-0833-4718-BB6A-273E1CA0F887"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp2:*:*:*:*:*:*",
+ "matchCriteriaId": "8B451F96-2A58-4758-86E6-F8A030805C51"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp3:*:*:*:*:*:*",
+ "matchCriteriaId": "69CBC98E-BECE-41A4-A0D9-9F3AC1602ABE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp4:*:*:*:*:*:*",
+ "matchCriteriaId": "20386F14-BC32-4174-9F3A-F7406486976A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp5:*:*:*:*:*:*",
+ "matchCriteriaId": "DD0DD54B-AB2E-4C56-B348-FF87C174270A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp6:*:*:*:*:*:*",
+ "matchCriteriaId": "CC14EF40-FE00-47F9-8A78-98713F903D9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253440",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047560",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30991.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30991.json
index b0b4c41f299..5d2745d21ab 100644
--- a/CVE-2023/CVE-2023-309xx/CVE-2023-30991.json
+++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30991.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-30991",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T23:15:10.147",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:34:33.447",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,98 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.5",
+ "versionEndIncluding": "11.5.8",
+ "matchCriteriaId": "8966D805-3817-488E-B692-D15838AD3469"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "7F91EC14-CD9A-42EB-9D81-6025A1D74749"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp1:*:*:*:*:*:*",
+ "matchCriteriaId": "5D098641-0833-4718-BB6A-273E1CA0F887"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp2:*:*:*:*:*:*",
+ "matchCriteriaId": "8B451F96-2A58-4758-86E6-F8A030805C51"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp3:*:*:*:*:*:*",
+ "matchCriteriaId": "69CBC98E-BECE-41A4-A0D9-9F3AC1602ABE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp4:*:*:*:*:*:*",
+ "matchCriteriaId": "20386F14-BC32-4174-9F3A-F7406486976A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp5:*:*:*:*:*:*",
+ "matchCriteriaId": "DD0DD54B-AB2E-4C56-B348-FF87C174270A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp6:*:*:*:*:*:*",
+ "matchCriteriaId": "CC14EF40-FE00-47F9-8A78-98713F903D9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/254037",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047499",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-309xx/CVE-2023-30994.json b/CVE-2023/CVE-2023-309xx/CVE-2023-30994.json
index b48b6842a80..7f884106347 100644
--- a/CVE-2023/CVE-2023-309xx/CVE-2023-30994.json
+++ b/CVE-2023/CVE-2023-309xx/CVE-2023-30994.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-30994",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-14T17:15:09.623",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:48:41.863",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138"
+ },
+ {
+ "lang": "es",
+ "value": "IBM QRadar SIEM 7.5.0 utiliza algoritmos criptogr\u00e1ficos m\u00e1s d\u00e9biles de lo esperado que podr\u00edan permitir a un atacante descifrar informaci\u00f3n altamente confidencial. IBM X-Force ID: 254138"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-327"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,81 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "DACA17CC-8B71-4E71-B075-BFFB65AD989C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_1:*:*:*:*:*:*",
+ "matchCriteriaId": "BA60FDE5-8C40-4C7A-97CF-BA2A64BF307D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_2:*:*:*:*:*:*",
+ "matchCriteriaId": "AB518E06-00BA-48F3-8AEC-6E1E97CAA2CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_3:*:*:*:*:*:*",
+ "matchCriteriaId": "289027A2-178C-45DE-A86F-1207F23D13B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_4:*:*:*:*:*:*",
+ "matchCriteriaId": "5047AECF-879B-427A-ACF7-ECB10965E1B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_5:*:*:*:*:*:*",
+ "matchCriteriaId": "CD448AB8-E3CC-41A1-9D32-B1B35C68FA5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_6:*:*:*:*:*:*",
+ "matchCriteriaId": "9F4014E8-42E2-4B76-B2DA-8B50929A4AB5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/254138",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7049133",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3010.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3010.json
new file mode 100644
index 00000000000..9779baf39a6
--- /dev/null
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3010.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-3010",
+ "sourceIdentifier": "security@grafana.com",
+ "published": "2023-10-25T18:17:29.993",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Grafana is an open-source platform for monitoring and observability. \n\nThe WorldMap panel plugin, versions before 1.0.4 contains a DOM XSS vulnerability.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Grafana es una plataforma de c\u00f3digo abierto para monitorizaci\u00f3n y observabilidad. El complemento del panel WorldMap, versiones anteriores a la 1.0.4, contiene una vulnerabilidad de DOM XSS."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@grafana.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@grafana.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://grafana.com/security/security-advisories/cve-2023-3010/",
+ "source": "security@grafana.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json
index deff3da40f8..a4cb2d4cd6a 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T15:15:09.713",
- "lastModified": "2023-09-25T16:46:20.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T08:15:08.550",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -111,15 +111,6 @@
}
],
"references": [
- {
- "url": "http://packetstormsecurity.com/files/172653/Lost-And-Found-Information-System-1.0-Broken-Access-Control-Privilege-Escalation.html",
- "source": "cna@vuldb.com",
- "tags": [
- "Exploit",
- "Third Party Advisory",
- "VDB Entry"
- ]
- },
{
"url": "https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-idor-cve-2023-977966c4450d",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3042.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3042.json
new file mode 100644
index 00000000000..fc4886eb0c4
--- /dev/null
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3042.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-3042",
+ "sourceIdentifier": "security@dotcms.com",
+ "published": "2023-10-17T23:15:11.920",
+ "lastModified": "2023-10-25T14:31:29.200",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In dotCMS, versions mentioned, a flaw in the NormalizationFilter does not strip double slashes (//) from URLs, potentially enabling bypasses for XSS and access controls. An example affected URL is https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp , which should return a 404 response but didn't. \n\nThe oversight in the default invalid URL character list can be viewed at the provided GitHub link https://github.com/dotCMS/core/blob/master/dotCMS/src/main/java/com/dotcms/filters/NormalizationFilter.java#L37 .\u00a0\n\nTo mitigate, users can block URLs with double slashes at firewalls or utilize dotCMS config variables.\n\nSpecifically, they can use the DOT_URI_NORMALIZATION_FORBIDDEN_STRINGS environmental variable to add // to the list of invalid strings. \n\nAdditionally, the DOT_URI_NORMALIZATION_FORBIDDEN_REGEX variable offers more detailed control, for instance, to block //html.* URLs.\n\nFix Version:23.06+, LTS 22.03.7+, LTS 23.01.4+\n"
+ },
+ {
+ "lang": "es",
+ "value": "En dotCMS, versiones mencionadas, una falla en NormalizationFilter no elimina las barras dobles (//) de las URL, lo que potencialmente permite omitir XSS y controles de acceso. Un ejemplo de URL afectada es https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp, que deber\u00eda devolver una respuesta 404 pero no lo hizo. La supervisi\u00f3n de la lista predeterminada de caracteres de URL no v\u00e1lidos se puede ver en el enlace proporcionado de GitHub https://github.com/dotCMS/core/blob/master/dotCMS/src/main/java/com/dotcms/filters/NormalizationFilter.java #L37. Para mitigar, los usuarios pueden bloquear las URL con barras dobles en los firewalls o utilizar variables de configuraci\u00f3n de dotCMS. Espec\u00edficamente, pueden usar la variable ambiental DOT_URI_NORMALIZATION_FORBIDDEN_STRINGS para agregar // a la lista de cadenas no v\u00e1lidas. Adem\u00e1s, la variable DOT_URI_NORMALIZATION_FORBIDDEN_REGEX ofrece un control m\u00e1s detallado, por ejemplo, para bloquear URL //html.*. Versi\u00f3n reparada: 23.06+, LTS 22.03.7+, LTS 23.01.4+"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@dotcms.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@dotcms.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dotcms:dotcms:5.3.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1B26B5D7-CE8E-4908-8D46-A78B1A4245BA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dotcms:dotcms:21.06:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98D4378C-DEAC-44C1-89D1-A4846450E153"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dotcms:dotcms:22.03:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC8E88E-4C9A-4FE9-A3B6-2A5707323F1E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dotcms:dotcms:23.01:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D68AC1E5-1756-4838-8BE5-78B2F1435A6C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.dotcms.com/security/SI-68",
+ "source": "security@dotcms.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json
index 861d7c94c99..f58cd97f5fb 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-3085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-03T11:15:21.443",
- "lastModified": "2023-06-12T17:25:40.813",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T08:15:08.707",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability, which was classified as problematic, has been found in X-WRT luci up to 22.10_b202303061504. This issue affects the function run_action of the file modules/luci-base/ucode/dispatcher.uc of the component 404 Error Template Handler. The manipulation of the argument request_path leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 22.10_b202303121313 is able to address this issue. The name of the patch is 24d7da2416b9ab246825c33c213fe939a89b369c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230663."
+ "value": "A vulnerability, which was classified as problematic, has been found in X-WRT luci up to 22.10_b202303061504. This issue affects the function run_action of the file modules/luci-base/ucode/dispatcher.uc of the component 404 Error Template Handler. The manipulation of the argument request_path leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 22.10_b202303121313 is able to address this issue. The patch is named 24d7da2416b9ab246825c33c213fe939a89b369c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230663."
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3090.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3090.json
index 17818e2e12b..f28d604c6cc 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3090.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3090.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3090",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-06-28T20:15:09.693",
- "lastModified": "2023-10-11T19:15:10.233",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-26T18:27:16.253",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -104,6 +104,16 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
@@ -117,11 +127,19 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e",
@@ -141,11 +159,25 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230731-0002/",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5448",
@@ -156,7 +188,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31046.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31046.json
new file mode 100644
index 00000000000..4778f613eb3
--- /dev/null
+++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31046.json
@@ -0,0 +1,107 @@
+{
+ "id": "CVE-2023-31046",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T14:15:08.883",
+ "lastModified": "2023-10-26T17:14:53.670",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A Path Traversal vulnerability exists in PaperCut NG before 22.1.1 and PaperCut MF before 22.1.1. Under specific conditions, this could potentially allow an authenticated attacker to achieve read-only access to the server's filesystem, because requests beginning with \"GET /ui/static/..//..\" reach getStaticContent in UIContentResource.class in the static-content-files servlet."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de Path Traversal en PaperCut NG anterior a 22.1.1 y PaperCut MF anterior a 22.1.1. En condiciones espec\u00edficas, esto podr\u00eda permitir que un atacante autenticado obtenga acceso de solo lectura al sistema de archivos del servidor, porque las solicitudes que comienzan con \"GET /ui/static/..//..\" alcanza getStaticContent en UIContentResource.class en el servlet static-content-files."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "22.1.1",
+ "matchCriteriaId": "E017C8AB-3DE6-4506-8F25-95DCD901FFAE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "22.1.1",
+ "matchCriteriaId": "3FB63050-D74D-417B-9639-B81D3B789EE1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://research.aurainfosec.io/disclosure/papercut/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://web.archive.org/web/20230814061444/https://research.aurainfosec.io/disclosure/papercut/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#security-notifications",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.papercut.com/kb/Main/SecurityBulletinJune2023",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31069.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31069.json
index 940211bb750..e453302453d 100644
--- a/CVE-2023/CVE-2023-310xx/CVE-2023-31069.json
+++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31069.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-31069",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-11T19:15:41.983",
- "lastModified": "2023-09-13T03:53:33.217",
+ "lastModified": "2023-10-25T13:05:39.153",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in TSplus Remote Access through 16.0.2.14. Credentials are stored as cleartext within the HTML source code of the login page."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en TSplus Remote Access hasta 16.0.2.14. Las credenciales se almacenan como texto sin cifrar dentro del c\u00f3digo fuente HTML de la p\u00e1gina de inicio de sesi\u00f3n."
}
],
"metrics": {
@@ -17,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
- "integrityImpact": "NONE",
- "availabilityImpact": "NONE",
- "baseScore": 7.5,
- "baseSeverity": "HIGH"
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
- "impactScore": 3.6
+ "impactScore": 5.9
}
]
},
diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31084.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31084.json
index 8b4447351b4..1361a167f8b 100644
--- a/CVE-2023/CVE-2023-310xx/CVE-2023-31084.json
+++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31084.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-31084",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-24T06:15:07.997",
- "lastModified": "2023-09-29T22:15:11.527",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:13.787",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -68,6 +68,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "cve@mitre.org"
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/",
"source": "cve@mitre.org"
diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31096.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31096.json
index 8d1784763fb..500a15716a5 100644
--- a/CVE-2023/CVE-2023-310xx/CVE-2023-31096.json
+++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31096.json
@@ -2,23 +2,99 @@
"id": "CVE-2023-31096",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T19:15:09.530",
- "lastModified": "2023-10-10T19:37:40.180",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:27:16.947",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Broadcom) LSI PCI-SV92EX Soft Modem Kernel Driver through 2.2.100.1 (aka AGRSM64.sys). There is Local Privilege Escalation to SYSTEM via a Stack Overflow in RTLCopyMemory (IOCTL 0x1b2150). An attacker can exploit this to elevate privileges from a medium-integrity process to SYSTEM. This can also be used to bypass kernel-level protections such as AV or PPL, because exploit code runs with high-integrity privileges and can be used in coordinated BYOVD (bring your own vulnerable driver) ransomware campaigns."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en Broadcom) LSI PCI-SV92EX Soft Modem Kernel Driver hasta 2.2.100.1 (tambi\u00e9n conocido como AGRSM64.sys). Hay una escalada de privilegios local al SYSTEM a trav\u00e9s de un desbordamiento de pila en RTLCopyMemory (IOCTL 0x1b2150). Un atacante puede aprovechar esto para elevar los privilegios de un proceso de integridad media al SYSTEM. Esto tambi\u00e9n se puede utilizar para omitir protecciones a nivel de kernel como AV o PPL, porque el c\u00f3digo de explotaci\u00f3n se ejecuta con privilegios de alta integridad y se puede utilizar en campa\u00f1as coordinadas de ransomware BYOVD (traiga su propio controlador vulnerable)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:broadcom:lsi_pci-sv92ex_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.2.100.1",
+ "matchCriteriaId": "B800F3FF-2B88-4135-9E76-CDA5B582F00D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:broadcom:lsi_pci-sv92ex:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9EE609F6-C73C-4152-B748-4860C45D8BB7"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://cschwarz1.github.io/posts/0x04/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.broadcom.com",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Not Applicable"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31122.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31122.json
new file mode 100644
index 00000000000..5b03adc3795
--- /dev/null
+++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31122.json
@@ -0,0 +1,109 @@
+{
+ "id": "CVE-2023-31122",
+ "sourceIdentifier": "security@apache.org",
+ "published": "2023-10-23T07:15:11.103",
+ "lastModified": "2023-10-28T03:30:29.223",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de lectura fuera de l\u00edmites en mod_macro del servidor Apache HTTP. Este problema afecta al servidor Apache HTTP: hasta 2.4.57."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@apache.org",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.4.57",
+ "matchCriteriaId": "A1BE631C-0308-4AEB-93CF-757B37D2BAFA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://httpd.apache.org/security/vulnerabilities_24.html",
+ "source": "security@apache.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0011/",
+ "source": "security@apache.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31132.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31132.json
index 8d8396d6423..e592515d367 100644
--- a/CVE-2023/CVE-2023-311xx/CVE-2023-31132.json
+++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31132.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-31132",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T22:15:08.487",
- "lastModified": "2023-10-13T04:15:11.910",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:52:15.093",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a privilege escalation vulnerability. A low-privileged OS user with access to a Windows host where Cacti is installed can create arbitrary PHP files in a web document directory. The user can then execute the PHP files under the security context of SYSTEM. This allows an attacker to escalate privilege from a normal user account to SYSTEM. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Cacti es un framework de monitorizaci\u00f3n operativa y gesti\u00f3n de fallos de c\u00f3digo abierto. Las versiones afectadas est\u00e1n sujetas a una vulnerabilidad de escalada de privilegios. Un usuario del sistema operativo con pocos privilegios y acceso a un host Windows en el que est\u00e9 instalado Cacti puede crear archivos PHP arbitrarios en un directorio de documentos web. El usuario puede entonces ejecutar los archivos PHP bajo el contexto de seguridad de SYSTEM. Esto permite a un atacante escalar privilegios desde una cuenta de usuario normal a SYSTEM. Este problema se ha solucionado en la versi\u00f3n 1.2.25. Se recomienda a los usuarios actualizar. No se conocen soluciones para esta vulnerabilidad. "
}
],
"metrics": {
@@ -107,11 +111,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31192.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31192.json
index 8f857e689e3..7eb04005089 100644
--- a/CVE-2023/CVE-2023-311xx/CVE-2023-31192.json
+++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31192.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-31192",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-12T16:15:11.760",
- "lastModified": "2023-10-12T16:52:07.503",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:59:18.633",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An information disclosure vulnerability exists in the ClientConnect() functionality of SoftEther VPN 5.01.9674. A specially crafted network packet can lead to a disclosure of sensitive information. An attacker can perform a man-in-the-middle attack to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la funcionalidad ClientConnect() de SoftEther VPN 5.01.9674. Un paquete de red especialmente manipulado puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial. Un atacante puede realizar un ataque de intermediario para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 3.6
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-908"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,14 +80,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CF5CF13-B22F-494B-BDC0-B59371979251"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1768",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.softether.org/9-about/News/904-SEVPN202301",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31217.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31217.json
new file mode 100644
index 00000000000..bc06276015a
--- /dev/null
+++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31217.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-31217",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T13:15:08.880",
+ "lastModified": "2023-10-25T17:24:10.200",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in MyTechTalky User Location and IP plugin <=\u00a01.6 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento MyTechTalky User Location and IP en versiones <= 1.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:user_location_and_ip_project:user_location_and_ip:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.6",
+ "matchCriteriaId": "4400CD05-9795-44D3-9158-7D0533C7223B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/user-location-and-ip/wordpress-user-location-and-ip-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31416.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31416.json
new file mode 100644
index 00000000000..2a78fb255a0
--- /dev/null
+++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31416.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-31416",
+ "sourceIdentifier": "bressers@elastic.co",
+ "published": "2023-10-26T19:15:45.270",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Secret token configuration is never applied when using ECK <2.8 with APM Server >=8.0. This could lead to anonymous requests to an APM Server being accepted and the data ingested into this APM deployment."
+ },
+ {
+ "lang": "es",
+ "value": "La configuraci\u00f3n del token secreto nunca se aplica cuando se usa ECK <2.8 con APM Server>=8.0. Esto podr\u00eda dar lugar a que se acepten solicitudes an\u00f3nimas a un servidor APM y que los datos se ingieran en esta implementaci\u00f3n de APM."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://discuss.elastic.co/t/elastic-cloud-on-kubernetes-eck-2-8-security-update/343854",
+ "source": "bressers@elastic.co"
+ },
+ {
+ "url": "https://www.elastic.co/community/security",
+ "source": "bressers@elastic.co"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31417.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31417.json
new file mode 100644
index 00000000000..2e373082d22
--- /dev/null
+++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31417.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-31417",
+ "sourceIdentifier": "bressers@elastic.co",
+ "published": "2023-10-26T18:15:08.500",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Elasticsearch generally filters out sensitive information and credentials before logging to the audit log. It was found that this filtering was not applied when requests to Elasticsearch use certain deprecated URIs for APIs. The impact of this flaw is that sensitive information such as passwords and tokens might be printed in cleartext in Elasticsearch audit logs. Note that audit logging is disabled by default and needs to be explicitly enabled and even when audit logging is enabled, request bodies that could contain sensitive information are not printed to the audit log unless explicitly configured.\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Elasticsearch generalmente filtra la informaci\u00f3n y las credenciales confidenciales antes de iniciar sesi\u00f3n en el registro de auditor\u00eda. Se descubri\u00f3 que este filtrado no se aplicaba cuando las solicitudes a Elasticsearch utilizan ciertos URI obsoletos para las API. El impacto de esta falla es que la informaci\u00f3n confidencial, como contrase\u00f1as y tokens, puede imprimirse en texto plano en los registros de auditor\u00eda de Elasticsearch. Tenga en cuenta que el registro de auditor\u00eda est\u00e1 deshabilitado de forma predeterminada y debe habilitarse expl\u00edcitamente e incluso cuando el registro de auditor\u00eda est\u00e1 habilitado, los cuerpos de solicitud que podr\u00edan contener informaci\u00f3n confidencial no se imprimen en el registro de auditor\u00eda a menos que se configure expl\u00edcitamente."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.5,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://discuss.elastic.co/t/elasticsearch-8-9-2-and-7-17-13-security-update/342479",
+ "source": "bressers@elastic.co"
+ },
+ {
+ "url": "https://www.elastic.co/community/security",
+ "source": "bressers@elastic.co"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31418.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31418.json
new file mode 100644
index 00000000000..61c6531b6ae
--- /dev/null
+++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31418.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-31418",
+ "sourceIdentifier": "bressers@elastic.co",
+ "published": "2023-10-26T18:15:08.587",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue has been identified with how Elasticsearch handled incoming requests on the HTTP layer. An unauthenticated user could force an Elasticsearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests. The issue was identified by Elastic Engineering and we have no indication that the issue is known or that it is being exploited in the wild."
+ },
+ {
+ "lang": "es",
+ "value": "Se identific\u00f3 un problema con la forma en que Elasticsearch manej\u00f3 las solicitudes entrantes en la capa HTTP. Un usuario no autenticado podr\u00eda forzar la salida de un nodo de Elasticsearch con un error OutOfMemory enviando una cantidad moderada de solicitudes HTTP con formato incorrecto. El problema fue identificado por Elastic Engineering y no tenemos indicios de que se conozca o de que est\u00e9 siendo explotado en la naturaleza."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://discuss.elastic.co/t/elasticsearch-8-9-0-7-17-13-security-update/343616",
+ "source": "bressers@elastic.co"
+ },
+ {
+ "url": "https://www.elastic.co/community/security",
+ "source": "bressers@elastic.co"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31419.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31419.json
new file mode 100644
index 00000000000..3ab66aa4393
--- /dev/null
+++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31419.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-31419",
+ "sourceIdentifier": "bressers@elastic.co",
+ "published": "2023-10-26T18:15:08.647",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 una falla en Elasticsearch que afectaba a la API _search y permit\u00eda que una cadena de consulta especialmente manipulada provocara un desbordamiento de pila y, en \u00faltima instancia, una denegaci\u00f3n de servicio."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://discuss.elastic.co/t/elasticsearch-8-9-1-7-17-13-security-update/343297",
+ "source": "bressers@elastic.co"
+ },
+ {
+ "url": "https://www.elastic.co/community/security",
+ "source": "bressers@elastic.co"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31421.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31421.json
new file mode 100644
index 00000000000..bdbb27037cd
--- /dev/null
+++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31421.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-31421",
+ "sourceIdentifier": "bressers@elastic.co",
+ "published": "2023-10-26T04:15:16.000",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que cuando actuaban como Clientes TLS, Beats, Elastic Agent, APM Server y Fleet Server no verificaban si el certificado del servidor es v\u00e1lido para la direcci\u00f3n IP de destino; sin embargo, a\u00fan se realiza la validaci\u00f3n de la firma del certificado. M\u00e1s espec\u00edficamente, cuando el cliente est\u00e1 configurado para conectarse a una direcci\u00f3n IP (en lugar de un nombre de host), no valida los valores IP SAN del certificado del servidor con esa direcci\u00f3n IP y la validaci\u00f3n del certificado falla y, por lo tanto, la conexi\u00f3n no se bloquea como se esperaba."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-295"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://discuss.elastic.co/t/beats-elastic-agent-apm-server-and-fleet-server-8-10-1-security-update-improper-certificate-validation-issue-esa-2023-16/343385",
+ "source": "bressers@elastic.co"
+ },
+ {
+ "url": "https://www.elastic.co/community/security",
+ "source": "bressers@elastic.co"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31422.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31422.json
new file mode 100644
index 00000000000..ec475c1c16f
--- /dev/null
+++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31422.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-31422",
+ "sourceIdentifier": "bressers@elastic.co",
+ "published": "2023-10-26T02:15:08.340",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered by Elastic whereby sensitive information is recorded in Kibana logs in the event of an error. The issue impacts only Kibana version 8.10.0 when logging in the JSON layout or when the pattern layout is configured to log the %meta pattern. Elastic has released Kibana 8.10.1 which resolves this issue. The error object recorded in the log contains request information, which can include sensitive data, such as authentication credentials, cookies, authorization headers, query params, request paths, and other metadata. Some examples of sensitive data which can be included in the logs are account credentials for kibana_system, kibana-metricbeat, or Kibana end-users."
+ },
+ {
+ "lang": "es",
+ "value": "Elastic descubri\u00f3 un problema por el cual se registra informaci\u00f3n confidencial en los registros de Kibana en caso de error. El problema afecta solo a la versi\u00f3n 8.10.0 de Kibana cuando se inicia sesi\u00f3n en el dise\u00f1o JSON o cuando el dise\u00f1o del patr\u00f3n est\u00e1 configurado para registrar el patr\u00f3n %meta. Elastic lanz\u00f3 Kibana 8.10.1 que resuelve este problema. El objeto de error registrado en el log contiene informaci\u00f3n de solicitud, que puede incluir datos confidenciales, como credenciales de autenticaci\u00f3n, cookies, encabezados de autorizaci\u00f3n, par\u00e1metros de consulta, rutas de solicitud y otros metadatos. Algunos ejemplos de datos confidenciales que se pueden incluir en los registros son las credenciales de cuenta para los usuarios finales de kibana_system, kibana-metricbeat o Kibana."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://discuss.elastic.co/t/kibana-8-10-1-security-update/343287",
+ "source": "bressers@elastic.co"
+ },
+ {
+ "url": "https://www.elastic.co/community/security",
+ "source": "bressers@elastic.co"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31490.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31490.json
index 3558ee2503d..a8396aad5d1 100644
--- a/CVE-2023/CVE-2023-314xx/CVE-2023-31490.json
+++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31490.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-31490",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T16:15:14.757",
- "lastModified": "2023-09-19T22:15:11.297",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:52:59.363",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema encontrado en Frrouting bgpd v.8.4.2 permite a un atacante remoto causar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n bgp_attr_psid_sub()."
}
],
"metrics": {
@@ -61,6 +65,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -75,11 +104,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5495",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31580.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31580.json
new file mode 100644
index 00000000000..ca79d9cc599
--- /dev/null
+++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31580.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-31580",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:27.680",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "light-oauth2 before version 2.1.27 obtains the public key without any verification. This could allow attackers to authenticate to the application with a crafted JWT token."
+ },
+ {
+ "lang": "es",
+ "value": "light-oauth2 anterior a la versi\u00f3n 2.1.27 obtiene la clave p\u00fablica sin ninguna verificaci\u00f3n. Esto podr\u00eda permitir a los atacantes autenticarse en la aplicaci\u00f3n con un token JWT manipulado."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/KANIXB/JWTIssues/blob/main/Certification%20Verification%20issue%20in%20light-oauth2.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/networknt/light-oauth2/issues/369",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31581.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31581.json
new file mode 100644
index 00000000000..102e496fd2a
--- /dev/null
+++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31581.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-31581",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:27.727",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Dromara Sureness before v1.0.8 was discovered to use a hardcoded key."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Dromara Sureness anterior a v1.0.8 utilizaba una clave codificada."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/dromara/sureness/issues/164",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/xubowenW/JWTissues/blob/main/sureness%20secure%20issues.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31582.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31582.json
new file mode 100644
index 00000000000..6bf20a66314
--- /dev/null
+++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31582.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-31582",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:27.777",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "jose4j before v0.9.3 allows attackers to set a low iteration count of 1000 or less."
+ },
+ {
+ "lang": "es",
+ "value": "jose4j anterior a v0.9.3 permite a los atacantes establecer un recuento bajo de iteraciones de 1000 o menos."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://bitbucket.org/b_c/jose4j/issues/203/insecure-support-of-setting-pbe-less-then",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/KANIXB/JWTIssues/blob/main/jose4j%20issue.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3111.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3111.json
index 4b34d5c0fd3..27b4412ab03 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3111.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3111.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3111",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-05T21:15:11.377",
- "lastModified": "2023-10-10T16:45:26.057",
+ "lastModified": "2023-10-29T02:42:56.190",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -117,28 +117,148 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*",
- "matchCriteriaId": "27227B35-932A-4035-B39F-6A455753C0D6"
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*",
- "matchCriteriaId": "489D20B9-166F-423D-8C48-A23D3026E33B"
- },
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*",
- "matchCriteriaId": "A4AD592C-222D-4C6F-B176-8145A1A5AFEC"
- },
+ "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*",
- "matchCriteriaId": "8603654B-A8A9-4DEB-B0DD-C82E1C885749"
- },
+ "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*",
- "matchCriteriaId": "C855C933-F271-45E6-8E85-8D7CF2EF1BE6"
+ "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
}
]
}
@@ -154,6 +274,14 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://patchwork.kernel.org/project/linux-btrfs/patch/20220721074829.2905233-1-r33s3n6@gmail.com/",
"source": "secalert@redhat.com",
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3112.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3112.json
new file mode 100644
index 00000000000..cccbd41cc87
--- /dev/null
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3112.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-3112",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-25T18:17:30.060",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was reported in Elliptic Labs Virtual Lock Sensor for ThinkPad T14 Gen 3 that could allow an attacker with local access to execute code with elevated privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Se inform\u00f3 una vulnerabilidad en el sensor de bloqueo virtual de Elliptic Labs para ThinkPad T14 Gen 3 que podr\u00eda permitir a un atacante con acceso local ejecutar c\u00f3digo con privilegios elevados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-276"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-128081",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3134.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3134.json
index f01caa580b6..6b4244799ee 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3134.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3134.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3134",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-07-31T10:15:10.500",
- "lastModified": "2023-10-11T09:15:10.097",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-29T02:31:35.347",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -75,7 +75,10 @@
},
{
"url": "https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3141.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3141.json
index 8d1c67baac4..ae021f76c67 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3141.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3141.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3141",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-09T20:15:10.327",
- "lastModified": "2023-09-28T19:03:11.420",
+ "lastModified": "2023-10-29T02:42:59.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -150,6 +150,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -177,6 +192,14 @@
"VDB Entry"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw@mail.gmail.com/t/",
"source": "secalert@redhat.com",
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3154.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3154.json
index 2d8665f8412..ca3b0dde209 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3154.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3154.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3154",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:14.507",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:22:56.277",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento WordPress Gallery Plugin para WordPress anterior a 3.39 es vulnerable a PHAR Deserialization debido a la falta de validaci\u00f3n de par\u00e1metros de entrada en la funci\u00f3n `gallery_edit`, lo que permite a un atacante acceder a recursos arbitrarios en el servidor."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.39",
+ "matchCriteriaId": "0BB8ED8B-A2AF-4B3F-BEF4-7735A33AF4A8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/ed099489-1db4-4b42-9f72-77de39c9e01e",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3155.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3155.json
index 705dad3173b..6430eaa0e65 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3155.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3155.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3155",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:14.597",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:19:58.947",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,10 +14,33 @@
"value": "El complemento WordPress Gallery Plugin para WordPress anterior a 3.39 es vulnerable a la lectura y eliminaci\u00f3n arbitraria de archivos debido a la falta de validaci\u00f3n de par\u00e1metros de entrada en la funci\u00f3n `gallery_edit`, lo que permite a un atacante acceder a recursos arbitrarios en el servidor."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
- "source": "contact@wpscan.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -25,12 +48,44 @@
"value": "CWE-552"
}
]
+ },
+ {
+ "source": "contact@wpscan.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-552"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.39",
+ "matchCriteriaId": "0BB8ED8B-A2AF-4B3F-BEF4-7735A33AF4A8"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/5c8473f4-4b52-430b-9140-b81b0a0901da",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3187.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3187.json
index cc0d3f019d1..adac63c0bf3 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3187.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3187.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3187",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-09T21:15:09.583",
- "lastModified": "2023-06-16T03:46:24.830",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T14:15:09.820",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -111,15 +111,6 @@
}
],
"references": [
- {
- "url": "http://packetstormsecurity.com/files/172909/Teachers-Record-Management-System-1.0-Validation-Bypass.html",
- "source": "cna@vuldb.com",
- "tags": [
- "Exploit",
- "Third Party Advisory",
- "VDB Entry"
- ]
- },
{
"url": "https://github.com/ctflearner/Vulnerability/blob/main/Teacher_Record_Management_System/trms.md",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32087.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32087.json
new file mode 100644
index 00000000000..67b945d850d
--- /dev/null
+++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32087.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-32087",
+ "sourceIdentifier": "security@pega.com",
+ "published": "2023-10-18T12:15:09.200",
+ "lastModified": "2023-10-25T17:31:11.327",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nPega Platform versions 8.1 to Infinity 23.1.0 are affected by an XSS issue with task creation\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones 8.1 a Infinity 23.1.0 de Pega Platform se ven afectadas por un problema XSS con la creaci\u00f3n de tareas"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@pega.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.6,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@pega.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pega:platform:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.1.0",
+ "versionEndExcluding": "8.7.5",
+ "matchCriteriaId": "180E01BA-C5AD-471B-91D6-5A202988565F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pega:platform:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.8.0",
+ "versionEndExcluding": "8.8.3",
+ "matchCriteriaId": "09107B04-CE0B-4E89-ADCF-47001DEF68F0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.pega.com/support-doc/pega-security-advisory-e23-vulnerability-remediation-note",
+ "source": "security@pega.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32088.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32088.json
new file mode 100644
index 00000000000..581192edb66
--- /dev/null
+++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32088.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-32088",
+ "sourceIdentifier": "security@pega.com",
+ "published": "2023-10-18T12:15:09.287",
+ "lastModified": "2023-10-25T17:38:47.987",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nPega Platform versions 8.1 to Infinity 23.1.0 are affected by an XSS issue with ad-hoc case creation\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones 8.1 a Infinity 23.1.0 de Pega Platform se ven afectadas por un problema XSS con la creaci\u00f3n de casos ad-hoc"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@pega.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.6,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@pega.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pega:platform:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.1.0",
+ "versionEndExcluding": "8.7.5",
+ "matchCriteriaId": "180E01BA-C5AD-471B-91D6-5A202988565F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pega:platform:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.8.0",
+ "versionEndExcluding": "8.8.3",
+ "matchCriteriaId": "09107B04-CE0B-4E89-ADCF-47001DEF68F0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.pega.com/support-doc/pega-security-advisory-e23-vulnerability-remediation-note",
+ "source": "security@pega.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32089.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32089.json
new file mode 100644
index 00000000000..8878eab0fdb
--- /dev/null
+++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32089.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-32089",
+ "sourceIdentifier": "security@pega.com",
+ "published": "2023-10-18T12:15:09.350",
+ "lastModified": "2023-10-25T17:10:38.400",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nPega Platform versions 8.1 to 8.8.2 are affected by an XSS issue with Pin description\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones 8.1 a 8.8.2 de Pega Platform se ven afectadas por un problema XSS con la descripci\u00f3n del Pin"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@pega.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.6,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@pega.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pega:platform:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.1.0",
+ "versionEndIncluding": "8.8.2",
+ "matchCriteriaId": "F0C5F266-348E-4416-86F3-AF292B052C3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.pega.com/support-doc/pega-security-advisory-e23-vulnerability-remediation-note",
+ "source": "security@pega.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32116.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32116.json
new file mode 100644
index 00000000000..751b1b10c39
--- /dev/null
+++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32116.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-32116",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T13:15:09.413",
+ "lastModified": "2023-10-26T15:32:27.440",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in TotalPress.Org Custom post types, Custom Fields & more plugin <=\u00a04.0.12 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenada autenticada (con privilegios de administrador o superior) en el complemento TotalPress.Org Custom post types, Custom Fields & more en versiones <= 4.0.12."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/custom-post-types/wordpress-custom-post-types-plugin-4-0-12-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32275.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32275.json
index 32a6a5044f2..b2c5301f017 100644
--- a/CVE-2023/CVE-2023-322xx/CVE-2023-32275.json
+++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32275.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-32275",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-12T16:15:11.840",
- "lastModified": "2023-10-12T16:52:07.503",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:58:18.027",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An information disclosure vulnerability exists in the CtEnumCa() functionality of SoftEther VPN 4.41-9782-beta and 5.01.9674. Specially crafted network packets can lead to a disclosure of sensitive information. An attacker can send packets to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la funcionalidad CtEnumCa() de SoftEther VPN 4.41-9782-beta y 5.01.9674. Los paquetes de red especialmente manipulados pueden dar lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial. Un atacante puede enviar paquetes para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-668"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,14 +80,43 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:4.41-9782:beta:*:*:*:*:*:*",
+ "matchCriteriaId": "79C47EE5-1B55-4FDD-A5B5-E10FF3337100"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CF5CF13-B22F-494B-BDC0-B59371979251"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1753",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.softether.org/9-about/News/904-SEVPN202301",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32359.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32359.json
new file mode 100644
index 00000000000..96daff498c1
--- /dev/null
+++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32359.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-32359",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.053",
+ "lastModified": "2023-10-25T23:15:16.043",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2. A user's password may be read aloud by VoiceOver."
+ },
+ {
+ "lang": "es",
+ "value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en iOS 16.7.2 y iPadOS 16.7.2. VoiceOver puede leer en voz alta la contrase\u00f1a de un usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json
index ae4ae205733..9652caa6ca0 100644
--- a/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json
+++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-32434",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-06-23T18:15:13.720",
- "lastModified": "2023-07-27T04:15:38.893",
+ "lastModified": "2023-10-25T23:15:16.097",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-06-23",
"cisaActionDue": "2023-07-14",
@@ -123,6 +123,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/20",
+ "source": "product-security@apple.com"
+ },
{
"url": "https://support.apple.com/en-us/HT213808",
"source": "product-security@apple.com",
@@ -178,6 +182,10 @@
"Release Notes",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213990",
+ "source": "product-security@apple.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32559.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32559.json
index 6b5ad2b43ca..e4a9b7b05f1 100644
--- a/CVE-2023/CVE-2023-325xx/CVE-2023-32559.json
+++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32559.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-32559",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-08-24T02:15:09.210",
- "lastModified": "2023-10-06T15:15:13.657",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:48:55.097",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-269"
+ "value": "NVD-CWE-noinfo"
}
]
}
@@ -94,7 +94,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231006-0006/",
- "source": "support@hackerone.com"
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32611.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32611.json
index d389c34dc82..763c2388440 100644
--- a/CVE-2023/CVE-2023-326xx/CVE-2023-32611.json
+++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32611.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-32611",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-14T20:15:09.550",
- "lastModified": "2023-09-25T20:15:11.170",
+ "lastModified": "2023-10-27T15:15:13.293",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -114,6 +114,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html",
"source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0005/",
+ "source": "secalert@redhat.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32634.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32634.json
index 0099932d7c4..effcdae48fd 100644
--- a/CVE-2023/CVE-2023-326xx/CVE-2023-32634.json
+++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32634.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-32634",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-12T16:15:11.920",
- "lastModified": "2023-10-12T16:52:07.503",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:56:33.150",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability exists in the CiRpcServerThread() functionality of SoftEther VPN 5.01.9674 and 4.41-9782-beta. An attacker can perform a local man-in-the-middle attack to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en la funcionalidad CiRpcServerThread() de SoftEther VPN 5.01.9674 y 4.41-9782-beta. Un atacante puede realizar un ataque de intermediario local para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.4,
+ "impactScore": 5.9
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,14 +80,44 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:4.41-9782:beta:*:*:*:*:*:*",
+ "matchCriteriaId": "79C47EE5-1B55-4FDD-A5B5-E10FF3337100"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CF5CF13-B22F-494B-BDC0-B59371979251"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1755",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.softether.org/9-about/News/904-SEVPN202301",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32675.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32675.json
index 1479bd37076..d3f7d7d0fdd 100644
--- a/CVE-2023/CVE-2023-326xx/CVE-2023-32675.json
+++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32675.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-32675",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-19T20:15:09.230",
- "lastModified": "2023-10-04T14:15:10.663",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T18:00:05.593",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -87,7 +87,10 @@
"references": [
{
"url": "https://github.com/vyperlang/vyper/commit/02339dfda0f3caabad142060d511d10bfe93c520",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-vxmm-cwh2-q762",
diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32707.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32707.json
index acf951901b1..acc8d3c9129 100644
--- a/CVE-2023/CVE-2023-327xx/CVE-2023-32707.json
+++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32707.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-32707",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-06-01T17:15:10.117",
- "lastModified": "2023-10-13T01:05:56.517",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T15:15:13.397",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -110,6 +110,10 @@
}
],
"references": [
+ {
+ "url": "http://packetstormsecurity.com/files/175386/Splunk-edit_user-Capability-Privilege-Escalation.html",
+ "source": "prodsec@splunk.com"
+ },
{
"url": "https://advisory.splunk.com/advisories/SVD-2023-0602",
"source": "prodsec@splunk.com",
diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32722.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32722.json
index ba43a7b4b7c..874749571dd 100644
--- a/CVE-2023/CVE-2023-327xx/CVE-2023-32722.json
+++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32722.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-32722",
"sourceIdentifier": "security@zabbix.com",
"published": "2023-10-12T07:15:10.217",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T15:07:53.753",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open."
+ },
+ {
+ "lang": "es",
+ "value": "El m\u00f3dulo zabbix/src/libs/zbxjson es vulnerable a un desbordamiento del b\u00fafer al analizar archivos JSON a trav\u00e9s de zbx_json_open."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "security@zabbix.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
{
"source": "security@zabbix.com",
"type": "Secondary",
@@ -46,10 +80,54 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0.0",
+ "versionEndIncluding": "6.0.20",
+ "matchCriteriaId": "531CCCBF-46AD-4988-8A9D-ED4FD5208C71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.4.0",
+ "versionEndIncluding": "6.4.5",
+ "matchCriteriaId": "868F271E-2595-4D01-BF53-46460F98891A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
+ "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
+ "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
+ "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://support.zabbix.com/browse/ZBX-23390",
- "source": "security@zabbix.com"
+ "source": "security@zabbix.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32723.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32723.json
index cc3ce380d74..02c382839e8 100644
--- a/CVE-2023/CVE-2023-327xx/CVE-2023-32723.json
+++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32723.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-32723",
"sourceIdentifier": "security@zabbix.com",
"published": "2023-10-12T07:15:10.620",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T15:08:25.737",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Request to LDAP is sent before user permissions are checked."
+ },
+ {
+ "lang": "es",
+ "value": "La solicitud a LDAP se env\u00eda antes de que se verifiquen los permisos del usuario."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
{
"source": "security@zabbix.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ },
{
"source": "security@zabbix.com",
"type": "Secondary",
@@ -46,10 +80,54 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.0.0",
+ "versionEndExcluding": "4.0.19",
+ "matchCriteriaId": "F3F90B06-C5E5-4A17-8712-677CB8F23A56"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.4.0",
+ "versionEndExcluding": "4.4.7",
+ "matchCriteriaId": "67089C6F-1FB9-4F56-B0E1-3C61A26E6511"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:4.0.19:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EBFE946-4EA3-4709-80C5-3F19AC6E6FC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:4.4.7:rc1:*:*:*:*:*:*",
+ "matchCriteriaId": "6B7EC65B-FDE3-479E-B3D2-8CBB408DE38C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:5.0.0:alpha3:*:*:*:*:*:*",
+ "matchCriteriaId": "2934AECC-D265-4986-BEC2-ADC43626B3B0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://support.zabbix.com/browse/ZBX-23230",
- "source": "security@zabbix.com"
+ "source": "security@zabbix.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32724.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32724.json
index dd5210d355c..cd709cdaafa 100644
--- a/CVE-2023/CVE-2023-327xx/CVE-2023-32724.json
+++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32724.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-32724",
"sourceIdentifier": "security@zabbix.com",
"published": "2023-10-12T07:15:10.713",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T15:08:48.400",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation."
+ },
+ {
+ "lang": "es",
+ "value": "El puntero de memoria est\u00e1 en una propiedad del objeto Ducktape. Esto conduce a m\u00faltiples vulnerabilidades relacionadas con el acceso directo y la manipulaci\u00f3n de la memoria."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security@zabbix.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ },
{
"source": "security@zabbix.com",
"type": "Secondary",
@@ -46,10 +80,61 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.0.0",
+ "versionEndIncluding": "5.0.36",
+ "matchCriteriaId": "9CAED9EA-BFA1-4BCF-8323-97AD46AC28C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0.0",
+ "versionEndIncluding": "6.0.20",
+ "matchCriteriaId": "531CCCBF-46AD-4988-8A9D-ED4FD5208C71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.4.0",
+ "versionEndIncluding": "6.4.5",
+ "matchCriteriaId": "868F271E-2595-4D01-BF53-46460F98891A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
+ "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
+ "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
+ "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://support.zabbix.com/browse/ZBX-23391",
- "source": "security@zabbix.com"
+ "source": "security@zabbix.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32738.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32738.json
new file mode 100644
index 00000000000..9594d62c0fc
--- /dev/null
+++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32738.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-32738",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T21:15:08.437",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alkaweb Eonet Manual User Approve plugin <=\u00a02.1.3 versions."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/eonet-manual-user-approve/wordpress-eonet-manual-user-approve-plugin-2-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32785.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32785.json
new file mode 100644
index 00000000000..14b3fdba8ac
--- /dev/null
+++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32785.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-32785",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T22:15:10.497",
+ "lastModified": "2023-10-27T21:44:09.590",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In Langchain through 0.0.155, prompt injection allows execution of arbitrary code against the SQL service provided by the chain."
+ },
+ {
+ "lang": "es",
+ "value": "En Langchain hasta 0.0.155, la inyecci\u00f3n r\u00e1pida permite la ejecuci\u00f3n de c\u00f3digo arbitrario contra el servicio SQL proporcionado por la cadena."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-74"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "0.0.155",
+ "matchCriteriaId": "02E32772-8A62-461E-A121-F894FD16B540"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://gist.github.com/rharang/9c58d39db8c01db5b7c888e467c0533f",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32786.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32786.json
new file mode 100644
index 00000000000..a5ba549b1f5
--- /dev/null
+++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32786.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-32786",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T22:15:10.553",
+ "lastModified": "2023-10-27T21:44:28.833",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In Langchain through 0.0.155, prompt injection allows an attacker to force the service to retrieve data from an arbitrary URL, essentially providing SSRF and potentially injecting content into downstream tasks."
+ },
+ {
+ "lang": "es",
+ "value": "En Langchain hasta 0.0.155, la inyecci\u00f3n r\u00e1pida permite a un atacante forzar al servicio a recuperar datos de una URL arbitraria, esencialmente proporcionando SSRF y potencialmente inyectando contenido en tareas posteriores."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-74"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "0.0.155",
+ "matchCriteriaId": "02E32772-8A62-461E-A121-F894FD16B540"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://gist.github.com/rharang/d265f46fc3161b31ac2e81db44d662e1",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32970.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32970.json
index 2927bfc0f82..0839b8f8682 100644
--- a/CVE-2023/CVE-2023-329xx/CVE-2023-32970.json
+++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32970.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-32970",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2023-10-13T20:15:09.830",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T15:42:09.663",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to launch a denial-of-service (DoS) attack via a network.\nQES is not affected.\n\nWe have already fixed the vulnerability in the following versions:\nQuTS hero h5.0.1.2515 build 20230907 and later\nQuTS hero h5.1.0.2453 build 20230708 and later\nQuTS hero h4.5.4.2476 build 20230728 and later\nQuTScloud c5.1.0.2498 and later\nQTS 5.1.0.2444 build 20230629 and later\nQTS 4.5.4.2467 build 20230718 and later\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se ha informado que una vulnerabilidad de desreferencia del puntero NULL afecta a varias versiones del sistema operativo QNAP. Si se explota, la vulnerabilidad podr\u00eda permitir a los administradores autenticados lanzar un ataque de Denegaci\u00f3n de Servicio (DoS) a trav\u00e9s de una red. QES no se ve afectado. Ya se ha solucionado la vulnerabilidad en las siguientes versiones: QuTS hero h5.0.1.2515 build 20230907 y posteriores QuTS hero h5.1.0.2453 build 20230708 y posteriores QuTS hero h4.5.4.2476 build 20230728 y posteriores QuTScloud c5.1.0.2498 y posteriores QTS 5.1.0.2444 build 20230629 y posteriores QTS 4.5.4.2467 build 20230718 y posteriores"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -46,10 +80,74 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.5.1",
+ "versionEndExcluding": "4.5.4.2467",
+ "matchCriteriaId": "01EE6DE4-F216-49F8-9961-3DF29E7D9109"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.0.0.1716",
+ "versionEndExcluding": "5.0.1.2425",
+ "matchCriteriaId": "5512CD56-38D0-4575-B863-603523C8A020"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.1.0",
+ "versionEndExcluding": "5.1.0.2444",
+ "matchCriteriaId": "834347F5-87D2-479E-81BF-C5F23534E0F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "h4.5.0",
+ "versionEndExcluding": "h4.5.4.2476",
+ "matchCriteriaId": "039CB063-5347-4F85-B6DE-430A94C0B3DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "h5.0.0",
+ "versionEndExcluding": "h5.0.1.2515",
+ "matchCriteriaId": "703732BD-834B-4529-A2E8-AF956F5AD674"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "h5.1.0",
+ "versionEndExcluding": "h5.1.0.2424",
+ "matchCriteriaId": "757BF20E-81DA-447A-B90C-06D096EBACD1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "c5.0.0.1919",
+ "versionEndExcluding": "c5.1.0.2498",
+ "matchCriteriaId": "2D504C77-393C-4298-9B8E-4408FAA067E1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-23-41",
- "source": "security@qnapsecurity.com.tw"
+ "source": "security@qnapsecurity.com.tw",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32973.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32973.json
index 71c5a7ea5a0..d6e27d09d5d 100644
--- a/CVE-2023/CVE-2023-329xx/CVE-2023-32973.json
+++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32973.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-32973",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2023-10-13T20:15:09.930",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T15:42:31.877",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.0.1.2425 build 20230609 and later\nQTS 5.1.0.2444 build 20230629 and later\nQTS 4.5.4.2467 build 20230718 and later\nQuTS hero h5.0.1.2515 build 20230907 and later\nQuTS hero h5.1.0.2424 build 20230609 and later\nQuTS hero h4.5.4.2476 build 20230728 and later\nQuTScloud c5.1.0.2498 and later\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se ha informado que una copia del b\u00fafer sin verificar el tama\u00f1o de la vulnerabilidad de entrada afecta a varias versiones del sistema operativo QNAP. Si se explota, la vulnerabilidad podr\u00eda permitir a los administradores autenticados ejecutar c\u00f3digo a trav\u00e9s de una red. Ya hemos solucionado la vulnerabilidad en las siguientes versiones: QTS 5.0.1.2425 build 20230609 y posteriores QTS 5.1.0.2444 build 20230629 y posteriores QTS 4.5.4.2467 build 20230718 y posteriores QuTS hero h5.0.1.2515 build 20230907 y posteriores QuTS hero h5. 1.0.2424 build 20230609 y posteriores QuTS hero h4.5.4.2476 build 20230728 y posteriores QuTScloud c5.1.0.2498 y posteriores"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -50,10 +84,74 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.5.1",
+ "versionEndExcluding": "4.5.4.2467",
+ "matchCriteriaId": "01EE6DE4-F216-49F8-9961-3DF29E7D9109"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.0.0.1716",
+ "versionEndExcluding": "5.0.1.2425",
+ "matchCriteriaId": "5512CD56-38D0-4575-B863-603523C8A020"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.1.0",
+ "versionEndExcluding": "5.1.0.2444",
+ "matchCriteriaId": "834347F5-87D2-479E-81BF-C5F23534E0F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "h4.5.0",
+ "versionEndExcluding": "h4.5.4.2476",
+ "matchCriteriaId": "039CB063-5347-4F85-B6DE-430A94C0B3DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "h5.0.0",
+ "versionEndExcluding": "h5.0.1.2515",
+ "matchCriteriaId": "703732BD-834B-4529-A2E8-AF956F5AD674"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "h5.1.0",
+ "versionEndExcluding": "h5.1.0.2424",
+ "matchCriteriaId": "757BF20E-81DA-447A-B90C-06D096EBACD1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "c5.0.0.1919",
+ "versionEndExcluding": "c5.1.0.2498",
+ "matchCriteriaId": "2D504C77-393C-4298-9B8E-4408FAA067E1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-23-41",
- "source": "security@qnapsecurity.com.tw"
+ "source": "security@qnapsecurity.com.tw",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32974.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32974.json
index b098167ca41..a38357aad2b 100644
--- a/CVE-2023/CVE-2023-329xx/CVE-2023-32974.json
+++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32974.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-32974",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2023-10-13T20:15:10.007",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T15:58:32.913",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to read the contents of unexpected files and expose sensitive data via a network.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.0.2444 build 20230629 and later\nQuTS hero h5.1.0.2424 build 20230609 and later\nQuTScloud c5.1.0.2498 and later\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se ha informado que una vulnerabilidad de path traversal afecta a varias versiones del sistema operativo QNAP. Si se explota, la vulnerabilidad podr\u00eda permitir a los usuarios leer el contenido de archivos inesperados y exponer datos confidenciales a trav\u00e9s de una red. Ya hemos solucionado la vulnerabilidad en las siguientes versiones: QTS 5.1.0.2444 build 20230629 y posteriores QuTS hero h5.1.0.2424 build 20230609 y posteriores QuTScloud c5.1.0.2498 y posteriores"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -46,10 +80,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.1.0",
+ "versionEndExcluding": "5.1.0.2444",
+ "matchCriteriaId": "834347F5-87D2-479E-81BF-C5F23534E0F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "h5.1.0",
+ "versionEndExcluding": "h5.1.0.2424",
+ "matchCriteriaId": "757BF20E-81DA-447A-B90C-06D096EBACD1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "c5.0.0.1919",
+ "versionEndExcluding": "c5.1.0.2498",
+ "matchCriteriaId": "2D504C77-393C-4298-9B8E-4408FAA067E1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-23-42",
- "source": "security@qnapsecurity.com.tw"
+ "source": "security@qnapsecurity.com.tw",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32976.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32976.json
index 960c9de8a08..fb843fa6084 100644
--- a/CVE-2023/CVE-2023-329xx/CVE-2023-32976.json
+++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32976.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-32976",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2023-10-13T20:15:10.077",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:48:00.450",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been reported to affect Container Station. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.\n\nWe have already fixed the vulnerability in the following version:\nContainer Station 2.6.7.44 and later\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se ha informado que una vulnerabilidad de inyecci\u00f3n de comandos del Sistema Operativo afecta a Container Station. Si se explota, la vulnerabilidad podr\u00eda permitir a los administradores autenticados ejecutar comandos a trav\u00e9s de una red. Ya se ha solucionado la vulnerabilidad en la siguiente versi\u00f3n: Container Station 2.6.7.44 y posteriores."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -46,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:qnap:container_station:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.6.7.44",
+ "matchCriteriaId": "71F234EC-9AD0-4965-8F8B-849B33C18061"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-23-44",
- "source": "security@qnapsecurity.com.tw"
+ "source": "security@qnapsecurity.com.tw",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3212.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3212.json
index c279203b0ae..2811c608da9 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3212.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3212.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3212",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-23T20:15:09.563",
- "lastModified": "2023-09-29T22:15:11.783",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:17:44.710",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -112,6 +112,166 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -131,17 +291,34 @@
"Patch"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20230929-0005/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5448",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3223.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3223.json
index 5d60f7877c9..88ff839d82b 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3223.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3223.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3223",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-27T15:18:56.457",
- "lastModified": "2023-09-28T17:43:18.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T15:15:13.597",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -312,6 +312,10 @@
"Issue Tracking",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0004/",
+ "source": "secalert@redhat.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3254.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3254.json
new file mode 100644
index 00000000000..579a866aaf8
--- /dev/null
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3254.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-3254",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-18T05:15:07.937",
+ "lastModified": "2023-10-18T12:46:22.630",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Widgets for Google Reviews plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 10.9. This is due to missing or incorrect nonce validation within setup_no_reg_header.php. This makes it possible for unauthenticated attackers to reset plugin settings and remove reviews via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Widgets for Google Reviews para WordPress es vulnerable a Cross-Site Request Forgery en versiones hasta la 10.9 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta dentro de setup_no_reg_header.php. Esto hace posible que atacantes no autenticados restablezcan la configuraci\u00f3n del complemento y eliminen rese\u00f1as mediante una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2980022%40wp-reviews-plugin-for-google%2Ftrunk&old=2977531%40wp-reviews-plugin-for-google%2Ftrunk&sfp_email=&sfph_mail=#file8",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/70968476-b064-477f-999f-4aa2c51d89cc?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3255.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3255.json
index fa5ed3869e7..8ba31c19776 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3255.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3255.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-3255",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-13T17:15:09.877",
- "lastModified": "2023-09-15T19:10:53.080",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:11.750",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una falla en el servidor VNC integrado de QEMU al procesar mensajes ClientCutText. Una condici\u00f3n de salida incorrecta puede provocar un bucle infinito al inflar un b\u00fafer zlib controlado por un atacante en la funci\u00f3n `inflate_buffer`. Esto podr\u00eda permitir que un cliente remoto autenticado que pueda enviar un portapapeles al servidor VNC active una denegaci\u00f3n de servicio."
}
],
"metrics": {
@@ -135,6 +139,10 @@
"Patch",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0008/",
+ "source": "secalert@redhat.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3268.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3268.json
index 5bd04158496..48104dd6711 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3268.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3268.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3268",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-16T19:15:14.707",
- "lastModified": "2023-08-24T19:15:40.330",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:23:07.813",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -72,20 +72,64 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Release Notes"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc@wangsu.com/T/",
@@ -99,15 +143,24 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230824-0006/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5448",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3279.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3279.json
index aad8198a577..194e8270fc3 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3279.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3279.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3279",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:14.690",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:27:40.983",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento WordPress Gallery Plugin para WordPress anterior a 3.39 no valida algunos atributos de bloque antes de usarlos para generar rutas pasadas para incluir funciones, lo que permite a los usuarios administradores realizar ataques LFI"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.39",
+ "matchCriteriaId": "0BB8ED8B-A2AF-4B3F-BEF4-7735A33AF4A8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/3b7a7070-8d61-4ff8-b003-b4ff06221635",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33517.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33517.json
new file mode 100644
index 00000000000..d68040be27a
--- /dev/null
+++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33517.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-33517",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T23:15:38.980",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "carRental 1.0 is vulnerable to Incorrect Access Control (Arbitrary File Read on the Back-end System)."
+ },
+ {
+ "lang": "es",
+ "value": "carRental 1.0 es vulnerable a un control de acceso incorrecto (lectura arbitraria de archivos en el Back-end System)."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/wushigudan/288ab32566615d8897c1da7ce7204838",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33558.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33558.json
new file mode 100644
index 00000000000..55fa457b273
--- /dev/null
+++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33558.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-33558",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T21:15:07.767",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An information disclosure vulnerability in the component users-grid-data.php of Ocomon before v4.0.1 allows attackers to obtain sensitive information such as e-mails and usernames."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el componente users-grid-data.php de Ocomon anterior a v4.0.1 permite a los atacantes obtener informaci\u00f3n confidencial como correos electr\u00f3nicos y nombres de usuarios."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/ninj4c0d3r/OcoMon-Research",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/ninj4c0d3r/OcoMon-Research/commit/6357def478b11119270b89329fceb115f12c69fc",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33559.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33559.json
new file mode 100644
index 00000000000..a95a3ae974f
--- /dev/null
+++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33559.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-33559",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T21:15:07.810",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A local file inclusion vulnerability via the lang parameter in OcoMon before v4.0.1 allows attackers to execute arbitrary code by supplying a crafted PHP file."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de inclusi\u00f3n de archivo local a trav\u00e9s del par\u00e1metro lang en OcoMon anterior a v4.0.1 permite a los atacantes ejecutar c\u00f3digo arbitrario proporcionando un archivo PHP manipulado."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/ninj4c0d3r/OcoMon-Research",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/ninj4c0d3r/OcoMon-Research/commit/7459ff397f48b5356930c16c522331e39158461dv",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33836.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33836.json
index c1976495024..6e8b6e21946 100644
--- a/CVE-2023/CVE-2023-338xx/CVE-2023-33836.json
+++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33836.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-33836",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T01:15:09.670",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:27:02.050",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Governance 10.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 256016."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Verify Governance 10.0 contiene credenciales codificadas, como una contrase\u00f1a o clave criptogr\u00e1fica, que utiliza para su propia autenticaci\u00f3n entrante, comunicaci\u00f3n saliente con componentes externos o cifrado de datos internos. ID de IBM X-Force: 256016."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,41 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_governance:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0",
+ "versionEndExcluding": "10.0.2",
+ "matchCriteriaId": "2F71600E-74AE-4A57-B9F6-2773CBD8761D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://https://exchange.xforce.ibmcloud.com/vulnerabilities/256016",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047640",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33837.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33837.json
new file mode 100644
index 00000000000..332c63075a5
--- /dev/null
+++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33837.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-33837",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-23T20:15:08.910",
+ "lastModified": "2023-10-28T03:33:15.203",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Security Verify Governance 10.0 does not encrypt sensitive or critical information before storage or transmission. IBM X-Force ID: 256020."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Verify Governance 10.0 no cifra informaci\u00f3n confidencial o cr\u00edtica antes del almacenamiento o la transmisi\u00f3n. ID de IBM X-Force: 256020."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.5,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-311"
+ }
+ ]
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-311"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8497FD1-40B6-4BA1-B536-E2138D0AFA80"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/256020",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7057377",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33839.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33839.json
new file mode 100644
index 00000000000..b0b17ab173e
--- /dev/null
+++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33839.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-33839",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-23T20:15:08.983",
+ "lastModified": "2023-10-28T03:31:20.867",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Security Verify Governance 10.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 256036."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Verify Governance 10.0 podr\u00eda permitir que un atacante remoto autenticado ejecute comandos arbitrarios en el sistema enviando una solicitud especialmente manipulada. ID de IBM X-Force: 256036."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8497FD1-40B6-4BA1-B536-E2138D0AFA80"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BFFE5199-0FDA-476D-A93F-BFD4172EC20F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/256036",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7057377",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33840.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33840.json
new file mode 100644
index 00000000000..24546df8e0b
--- /dev/null
+++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33840.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-33840",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-23T20:15:09.057",
+ "lastModified": "2023-10-28T03:32:15.907",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Security Verify Governance 10.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 256037."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Verify Governance 10.0 es vulnerable a cross-site scripting. Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista, lo que podr\u00eda conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. ID de IBM X-Force: 256037."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8497FD1-40B6-4BA1-B536-E2138D0AFA80"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BFFE5199-0FDA-476D-A93F-BFD4172EC20F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/256037",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7057377",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3301.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3301.json
index 95246e774a0..353f27c87b8 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3301.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3301.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-3301",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-13T17:15:10.063",
- "lastModified": "2023-09-15T19:22:46.217",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:11.847",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una falla en QEMU. La naturaleza as\u00edncrona de la desconexi\u00f3n en caliente permite un escenario de ejecuci\u00f3n en el que el backend del dispositivo de red se borra antes de que se haya desconectado el frontend pci de virtio-net. Un invitado malintencionado podr\u00eda utilizar esta ventana de tiempo para desencadenar una aserci\u00f3n y provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {
@@ -120,6 +124,10 @@
"Issue Tracking",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0008/",
+ "source": "secalert@redhat.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3338.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3338.json
index 44041e8fae5..c04f11d9e9a 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3338.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3338.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3338",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-30T22:15:10.270",
- "lastModified": "2023-08-24T19:15:40.833",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:27:37.137",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -75,8 +75,44 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*",
- "matchCriteriaId": "0B3E6E4D-E24E-4630-B00C-8C9901C597B0"
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5",
+ "matchCriteriaId": "98C491C7-598A-4D36-BA4F-3505A5727ED1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
+ "matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
@@ -102,6 +138,15 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "secalert@redhat.com",
"tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
"Third Party Advisory"
]
},
@@ -116,11 +161,17 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230824-0005/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3354.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3354.json
index 8f34313dfdc..fc1130f1baa 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3354.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3354.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3354",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-11T17:15:13.387",
- "lastModified": "2023-08-29T03:15:08.197",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T12:56:24.197",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -75,8 +75,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "6D9E0C78-9678-4CEE-9389-962CF618A51F"
+ "criteria": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "8.1.0",
+ "matchCriteriaId": "A178AFEF-359C-427C-99C6-EC003039FF3B"
}
]
}
@@ -116,6 +117,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -136,7 +152,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3375.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3375.json
index 53ad4c265f1..fc7ddab8e15 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3375.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3375.json
@@ -2,18 +2,22 @@
"id": "CVE-2023-3375",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-09-05T17:15:09.497",
- "lastModified": "2023-09-08T14:26:17.933",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T08:15:07.840",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Unisign Bookreen allows OS Command Injection.This issue affects Bookreen: before 3.0.0.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de carga de archivos sin restricciones con tipo peligroso en Unisign Bookreen permite la inyecci\u00f3n de comandos en el sistema operativo. Este problema afecta a Bookreen anterior a la versi\u00f3n 3.0.0. "
}
],
"metrics": {
"cvssMetricV31": [
{
- "source": "nvd@nist.gov",
+ "source": "cve@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -33,24 +37,24 @@
"impactScore": 5.9
},
{
- "source": "cve@usom.gov.tr",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
- "scope": "CHANGED",
+ "scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
- "baseScore": 9.1,
- "baseSeverity": "CRITICAL"
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
},
- "exploitabilityScore": 2.3,
- "impactScore": 6.0
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
}
]
},
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3389.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3389.json
index 7b385f26567..c7664cb9613 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3389.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3389.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-3389",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-06-28T20:15:09.773",
- "lastModified": "2023-09-11T19:15:43.383",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:28:28.367",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.\n\nRacing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\n\nWe recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and\u00a00e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de use-after-free en el subsistema de io_uring del kernel de Linux puede ser explotada para lograr la escalada de privilegios locales. Ejecutar una solicitud de io_uring cancelar sondeo con un tiempo de espera vinculado puede provocar una UAF en un hrtimer. Recomendamos actualizar al commit anterior ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 para 5.10 stable y 0e388fce7aec40992eadee654193cad345d62663 para 5.15 stable)."
}
],
"metrics": {
@@ -100,12 +104,71 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=4716c73b188566865bdd79c3a6709696a224ac04",
@@ -152,13 +215,27 @@
"Patch"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20230731-0001/",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3392.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3392.json
index 94f2b2bf276..b2ee31e86d7 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3392.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3392.json
@@ -2,15 +2,42 @@
"id": "CVE-2023-3392",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T09:15:10.337",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:58:05.917",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Read More & Accordion WordPress plugin before 3.2.7 unserializes user input provided via the settings, which could allow high-privilege users such as admin to perform PHP Object Injection when a suitable gadget is present."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Read More & Accordion de WordPress anterior a la versi\u00f3n 3.2.7 deserializa la entrada del usuario proporcionada a trav\u00e9s de la configuraci\u00f3n, lo que podr\u00eda permitir a los usuarios con altos privilegios, como el administrador, realizar la inyecci\u00f3n de objetos PHP cuando hay un dispositivo adecuado presente."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -23,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:edmonsoft:read_more_\\&_accordion:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.2.7",
+ "matchCriteriaId": "2D87CFCE-A1DA-48E9-A4CE-BAC386FABC4B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/1e733ccf-8026-4831-9863-e505c2aecba6",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34039.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34039.json
index 92aec67480b..c0d931959ad 100644
--- a/CVE-2023/CVE-2023-340xx/CVE-2023-34039.json
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34039.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-34039",
"sourceIdentifier": "security@vmware.com",
"published": "2023-08-29T18:15:08.680",
- "lastModified": "2023-09-02T15:15:27.437",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T18:17:27.823",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -90,6 +90,10 @@
"url": "http://packetstormsecurity.com/files/174452/VMWare-Aria-Operations-For-Networks-Remote-Code-Execution.html",
"source": "security@vmware.com"
},
+ {
+ "url": "http://packetstormsecurity.com/files/175320/VMWare-Aria-Operations-For-Networks-SSH-Private-Key-Exposure.html",
+ "source": "security@vmware.com"
+ },
{
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0018.html",
"source": "security@vmware.com",
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34040.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34040.json
index aa99272cd32..ae0c5220f1f 100644
--- a/CVE-2023/CVE-2023-340xx/CVE-2023-34040.json
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34040.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-34040",
"sourceIdentifier": "security@vmware.com",
"published": "2023-08-24T13:15:07.453",
- "lastModified": "2023-08-29T15:58:37.853",
+ "lastModified": "2023-10-18T17:56:38.093",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -85,17 +85,17 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:vmware:spring:*:*:*:*:*:apache_kafka:*:*",
+ "criteria": "cpe:2.3:a:vmware:spring_for_apache_kafka:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.8.1",
"versionEndIncluding": "2.9.10",
- "matchCriteriaId": "1361B78E-D74D-4364-8FEC-B0AC38BD6F83"
+ "matchCriteriaId": "64FF6651-21A4-4403-A1EF-69338BC1AA08"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:vmware:spring:*:*:*:*:*:apache_kafka:*:*",
+ "criteria": "cpe:2.3:a:vmware:spring_for_apache_kafka:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndIncluding": "3.0.9",
- "matchCriteriaId": "1C465BBD-271A-4B82-84E0-3DF61690CAAB"
+ "matchCriteriaId": "A5C022D3-095C-4E35-A0EF-70906F307169"
}
]
}
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34044.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34044.json
new file mode 100644
index 00000000000..9f5f6efc292
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34044.json
@@ -0,0 +1,130 @@
+{
+ "id": "CVE-2023-34044",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-20T09:15:12.600",
+ "lastModified": "2023-10-28T03:34:06.763",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds \nread vulnerability that exists in the functionality for sharing host \nBluetooth devices with the virtual machine.\u00a0A malicious actor with local administrative privileges on a virtual \nmachine may be able to read privileged information contained in \nhypervisor memory from a virtual machine."
+ },
+ {
+ "lang": "es",
+ "value": "VMware Workstation (17.x anterior a 17.5) y Fusion (13.x anterior a 13.5) contienen una vulnerabilidad de lectura fuera de l\u00edmites que existe en la funcionalidad para compartir dispositivos Bluetooth host con la m\u00e1quina virtual. Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede leer informaci\u00f3n privilegiada contenida en la memoria del hipervisor desde una m\u00e1quina virtual."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.0,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.5,
+ "impactScore": 4.0
+ },
+ {
+ "source": "security@vmware.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0.0",
+ "versionEndExcluding": "17.5",
+ "matchCriteriaId": "118254F1-8F14-4573-B3A4-56EE365A41ED"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.0.0",
+ "versionEndExcluding": "13.5",
+ "matchCriteriaId": "F574C812-1E1F-4991-9442-74E799DACAD8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html",
+ "source": "security@vmware.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34045.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34045.json
new file mode 100644
index 00000000000..ca75136d619
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34045.json
@@ -0,0 +1,113 @@
+{
+ "id": "CVE-2023-34045",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-20T10:15:12.787",
+ "lastModified": "2023-10-28T03:34:24.963",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "VMware Fusion(13.x prior to 13.5)\u00a0contains a local privilege escalation vulnerability that occurs during \ninstallation for the first time (the user needs to drag or copy the \napplication to a folder from the '.dmg' volume) or when installing an \nupgrade.\u00a0A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time."
+ },
+ {
+ "lang": "es",
+ "value": "VMware Fusion (13.x anterior a 13.5) contiene una vulnerabilidad de escalada de privilegios local que ocurre durante la instalaci\u00f3n por primera vez (el usuario necesita arrastrar o copiar la aplicaci\u00f3n a una carpeta desde el volumen '.dmg') o al instalar una actualizaci\u00f3n. Un actor malicioso con privilegios de usuario local no administrativo puede aprovechar esta vulnerabilidad para escalar privilegios a root en el System donde Fusion est\u00e1 instalado o donde se instala por primera vez."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@vmware.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.6,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.0.0",
+ "versionEndExcluding": "13.5",
+ "matchCriteriaId": "F574C812-1E1F-4991-9442-74E799DACAD8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html",
+ "source": "security@vmware.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34046.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34046.json
new file mode 100644
index 00000000000..54318c54441
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34046.json
@@ -0,0 +1,113 @@
+{
+ "id": "CVE-2023-34046",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-20T09:15:12.717",
+ "lastModified": "2023-10-28T03:34:15.293",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) \nvulnerability that occurs during installation for the first time (the \nuser needs to drag or copy the application to a folder from the '.dmg' \nvolume) or when installing an upgrade.\u00a0A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time."
+ },
+ {
+ "lang": "es",
+ "value": "VMware Fusion (13.x anterior a 13.5) contiene una vulnerabilidad TOCTOU (Tiempo de verificaci\u00f3n, Tiempo de uso) que ocurre durante la instalaci\u00f3n por primera vez (el usuario debe arrastrar o copiar la aplicaci\u00f3n a una carpeta desde ' .dmg' volume) o al instalar una actualizaci\u00f3n. Un actor malicioso con privilegios de usuario local no administrativo puede aprovechar esta vulnerabilidad para escalar privilegios a root en el System donde Fusion est\u00e1 instalado o donde se instala por primera vez."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@vmware.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-367"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.0.0",
+ "versionEndExcluding": "13.5",
+ "matchCriteriaId": "F574C812-1E1F-4991-9442-74E799DACAD8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html",
+ "source": "security@vmware.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34047.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34047.json
index af90bf5e904..3806422bff2 100644
--- a/CVE-2023/CVE-2023-340xx/CVE-2023-34047.json
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34047.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-34047",
"sourceIdentifier": "security@vmware.com",
"published": "2023-09-20T10:15:14.247",
- "lastModified": "2023-09-26T14:13:48.703",
+ "lastModified": "2023-10-18T18:04:30.410",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -79,17 +79,17 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:spring:spring:*:*:*:*:*:graphql:*:*",
+ "criteria": "cpe:2.3:a:vmware:spring_for_graphql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.0",
"versionEndIncluding": "1.1.5",
- "matchCriteriaId": "A6102CDA-D93F-4EE2-9B63-DC3254FB705B"
+ "matchCriteriaId": "49D2097C-3900-4B29-9308-9F9649B2EF1C"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:spring:spring:*:*:*:*:*:graphql:*:*",
+ "criteria": "cpe:2.3:a:vmware:spring_for_graphql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.2.0",
"versionEndIncluding": "1.2.2",
- "matchCriteriaId": "BE140B29-6DCE-43FA-BF2D-C61A8D8F7C76"
+ "matchCriteriaId": "6FE36EDA-2CA3-4390-BF83-E532BAEA7807"
}
]
}
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34048.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34048.json
new file mode 100644
index 00000000000..0ea820a2f1e
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34048.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-34048",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-25T18:17:27.897",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution."
+ },
+ {
+ "lang": "es",
+ "value": "vCenter Server contiene una vulnerabilidad de escritura fuera de los l\u00edmites en la implementaci\u00f3n del protocolo DCERPC. Un actor malintencionado con acceso a la red de vCenter Server puede desencadenar una escritura fuera de los l\u00edmites que podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@vmware.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.vmware.com/security/advisories/VMSA-2023-0023.html",
+ "source": "security@vmware.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34050.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34050.json
new file mode 100644
index 00000000000..995b129d05a
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34050.json
@@ -0,0 +1,109 @@
+{
+ "id": "CVE-2023-34050",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-19T08:15:08.357",
+ "lastModified": "2023-10-25T16:54:31.770",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\n\n\n\n\n\nIn spring AMQP versions 1.0.0 to\n2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class\nnames were added to Spring AMQP, allowing users to lock down deserialization of\ndata in messages from untrusted sources; however by default, when no allowed\nlist was provided, all classes could be deserialized.\n\n\n\nSpecifically, an application is\nvulnerable if\n\n\n\n\n * the\n SimpleMessageConverter or SerializerMessageConverter is used\n\n * the user\n does not configure allowed list patterns\n\n * untrusted\n message originators gain permissions to write messages to the RabbitMQ\n broker to send malicious content\n\n\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En las versiones Spring AMQP 1.0.0 a 2.4.16 y 3.0.0 a 3.0.9, se agregaron a Spring AMQP patrones de listas permitidas para nombres de clases deserializables, lo que permite a los usuarios bloquear la deserializaci\u00f3n de datos en mensajes de fuentes no confiables; sin embargo, de forma predeterminada, cuando no se proporcionaba una lista permitida, se pod\u00edan deserializar todas las clases. Espec\u00edficamente, una aplicaci\u00f3n es vulnerable si * se utiliza SimpleMessageConverter o SerializerMessageConverter * el usuario no configura los patrones de lista permitidos * los originadores de mensajes que no son de confianza obtienen permisos para escribir mensajes al agente RabbitMQ para enviar contenido malicioso"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@vmware.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.0,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.7,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.0.0",
+ "versionEndExcluding": "2.4.16",
+ "matchCriteriaId": "4750D156-5059-46DE-A787-62DA3319F372"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.0.0",
+ "versionEndExcluding": "3.0.9",
+ "matchCriteriaId": "D7E11342-A840-4A93-822A-2DAC86B9D4A5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://spring.io/security/cve-2023-34050",
+ "source": "security@vmware.com",
+ "tags": [
+ "Mitigation",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34051.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34051.json
new file mode 100644
index 00000000000..97c072767c7
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34051.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-34051",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-20T05:15:07.943",
+ "lastModified": "2023-10-20T11:27:23.627",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "VMware Aria Operations for Logs contains an authentication bypass vulnerability.\u00a0An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.\n"
+ },
+ {
+ "lang": "es",
+ "value": "VMware Aria Operations for Logs contiene una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n. Un actor malicioso no autenticado puede inyectar archivos en el sistema operativo de un dispositivo afectado, lo que puede resultar en la ejecuci\u00f3n remota de c\u00f3digo."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.vmware.com/security/advisories/VMSA-2023-0021.html",
+ "source": "security@vmware.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34052.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34052.json
new file mode 100644
index 00000000000..e0c7f02561d
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34052.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-34052",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-20T05:15:08.420",
+ "lastModified": "2023-10-20T11:27:23.627",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "VMware Aria Operations for Logs contains a deserialization vulnerability.\u00a0A malicious actor with non-administrative access to the local system can trigger the deserialization of data which could result in authentication bypass.\n"
+ },
+ {
+ "lang": "es",
+ "value": "VMware Aria Operations for Logs contiene una vulnerabilidad de deserializaci\u00f3n. Un actor malintencionado con acceso no administrativo al sistema local puede desencadenar la deserializaci\u00f3n de datos, lo que podr\u00eda provocar una omisi\u00f3n de autenticaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.vmware.com/security/advisories/VMSA-2023-0021.html",
+ "source": "security@vmware.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34056.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34056.json
new file mode 100644
index 00000000000..6053b5a34a7
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34056.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-34056",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-25T18:17:27.953",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "vCenter Server contains a partial information disclosure vulnerability.\u00a0A malicious actor with non-administrative privileges to vCenter Server may leverage this issue to access unauthorized data."
+ },
+ {
+ "lang": "es",
+ "value": "vCenter Server contiene una vulnerabilidad de divulgaci\u00f3n parcial de informaci\u00f3n. Un actor malintencionado con privilegios no administrativos para vCenter Server puede aprovechar este problema para acceder a datos no autorizados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@vmware.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.vmware.com/security/advisories/VMSA-2023-0023.html",
+ "source": "security@vmware.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34057.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34057.json
new file mode 100644
index 00000000000..9d305bce67c
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34057.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-34057",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-27T05:15:38.837",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "VMware Tools contains a local privilege escalation vulnerability.\u00a0A malicious actor with local user access to a guest virtual machine may elevate privileges within the virtual machine.\n\n\n\n\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "VMware Tools contiene una vulnerabilidad de escalada de privilegios local. Un actor malintencionado con acceso de usuario local a una m\u00e1quina virtual invitada puede elevar los privilegios dentro de la m\u00e1quina virtual."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@vmware.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.vmware.com/security/advisories/VMSA-2023-0024.html",
+ "source": "security@vmware.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json
new file mode 100644
index 00000000000..7b5fbde8b9a
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json
@@ -0,0 +1,51 @@
+{
+ "id": "CVE-2023-34058",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-27T05:15:38.957",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "VMware Tools contains a SAML token signature bypass vulnerability.\u00a0A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html \u00a0in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html ."
+ },
+ {
+ "lang": "es",
+ "value": "VMware Tools contiene una vulnerabilidad de omisi\u00f3n de firma de token SAML. Un actor malicioso al que se le han otorgado privilegios de operaci\u00f3n de invitado https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html en una m\u00e1quina virtual de destino es posible que pueda elevar sus privilegios si a esa m\u00e1quina virtual de destino se le ha asignado un Alias de Invitado m\u00e1s privilegiado https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@vmware.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/27/1",
+ "source": "security@vmware.com"
+ },
+ {
+ "url": "https://www.vmware.com/security/advisories/VMSA-2023-0024.html",
+ "source": "security@vmware.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json
new file mode 100644
index 00000000000..a4b0b257c54
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-34059",
+ "sourceIdentifier": "security@vmware.com",
+ "published": "2023-10-27T05:15:39.013",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper.\u00a0A malicious actor with non-root privileges may be able to hijack the \n/dev/uinput file descriptor allowing them to simulate user inputs."
+ },
+ {
+ "lang": "es",
+ "value": "open-vm-tools contiene una vulnerabilidad de secuestro de descriptores de archivos en vmware-user-suid-wrapper. Un actor malintencionado con privilegios no root puede secuestrar el descriptor del archivo /dev/uinput, permiti\u00e9ndole simular las entradas del usuario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@vmware.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.4,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/27/2",
+ "source": "security@vmware.com"
+ },
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/27/3",
+ "source": "security@vmware.com"
+ },
+ {
+ "url": "https://www.vmware.com/security/advisories/VMSA-2023-0024.html",
+ "source": "security@vmware.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34085.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34085.json
new file mode 100644
index 00000000000..24dc3e79561
--- /dev/null
+++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34085.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-34085",
+ "sourceIdentifier": "responsible-disclosure@pingidentity.com",
+ "published": "2023-10-25T18:17:28.010",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "When an AWS DynamoDB table is used for user attribute storage, it is possible to retrieve the attributes of another user using a maliciously crafted request\n"
+ },
+ {
+ "lang": "es",
+ "value": "Cuando se utiliza una tabla de AWS DynamoDB para el almacenamiento de atributos de usuario, es posible recuperar los atributos de otro usuario mediante una solicitud manipulada con fines malintencionados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "responsible-disclosure@pingidentity.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 2.6,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "responsible-disclosure@pingidentity.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-359"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://docs.pingidentity.com/r/en-us/pingfederate-113/gyk1689105783244",
+ "source": "responsible-disclosure@pingidentity.com"
+ },
+ {
+ "url": "https://www.pingidentity.com/en/resources/downloads/pingfederate.html",
+ "source": "responsible-disclosure@pingidentity.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34207.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34207.json
index 8e79ece92bd..dd36ba364d4 100644
--- a/CVE-2023/CVE-2023-342xx/CVE-2023-34207.json
+++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34207.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-34207",
"sourceIdentifier": "ART@zuso.ai",
"published": "2023-10-17T04:15:11.937",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:09:10.790",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "ART@zuso.ai",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ },
{
"source": "ART@zuso.ai",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:easyuse:mailhunter_ultimate:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023",
+ "matchCriteriaId": "94D027C5-7AB4-4652-A7E8-4F979194ED01"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://zuso.ai/Advisory/ZA-2023-04",
- "source": "ART@zuso.ai"
+ "source": "ART@zuso.ai",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34208.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34208.json
index 8a9de0eac5b..bc0c75ef9e4 100644
--- a/CVE-2023/CVE-2023-342xx/CVE-2023-34208.json
+++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34208.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-34208",
"sourceIdentifier": "ART@zuso.ai",
"published": "2023-10-17T04:15:12.077",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:09:22.363",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
{
"source": "ART@zuso.ai",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
{
"source": "ART@zuso.ai",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:easyuse:mailhunter_ultimate:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023",
+ "matchCriteriaId": "94D027C5-7AB4-4652-A7E8-4F979194ED01"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://zuso.ai/Advisory/ZA-2023-05",
- "source": "ART@zuso.ai"
+ "source": "ART@zuso.ai",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34209.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34209.json
index 1229ae91360..29081d76778 100644
--- a/CVE-2023/CVE-2023-342xx/CVE-2023-34209.json
+++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34209.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-34209",
"sourceIdentifier": "ART@zuso.ai",
"published": "2023-10-17T05:15:50.207",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:09:35.410",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "ART@zuso.ai",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ },
{
"source": "ART@zuso.ai",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:easyuse:mailhunter_ultimate:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023",
+ "matchCriteriaId": "94D027C5-7AB4-4652-A7E8-4F979194ED01"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://zuso.ai/Advisory/ZA-2023-06",
- "source": "ART@zuso.ai"
+ "source": "ART@zuso.ai",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34210.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34210.json
index 1c21e355b6b..021d5fef51a 100644
--- a/CVE-2023/CVE-2023-342xx/CVE-2023-34210.json
+++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34210.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-34210",
"sourceIdentifier": "ART@zuso.ai",
"published": "2023-10-17T05:15:50.300",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:10:16.097",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "ART@zuso.ai",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
{
"source": "ART@zuso.ai",
"type": "Secondary",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:easyuse:mailhunter_ultimate:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023",
+ "matchCriteriaId": "94D027C5-7AB4-4652-A7E8-4F979194ED01"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://zuso.ai/Advisory/ZA-2023-07",
- "source": "ART@zuso.ai"
+ "source": "ART@zuso.ai",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34256.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34256.json
index aebe4fe7b15..36338c1ed39 100644
--- a/CVE-2023/CVE-2023-342xx/CVE-2023-34256.json
+++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34256.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-34256",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T20:15:10.817",
- "lastModified": "2023-07-27T21:15:13.920",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:13.867",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -123,6 +123,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "cve@mitre.org"
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://syzkaller.appspot.com/bug?extid=8785e41224a3afd04321",
"source": "cve@mitre.org",
diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34319.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34319.json
index 7959ddce97d..360cbbedd20 100644
--- a/CVE-2023/CVE-2023-343xx/CVE-2023-34319.json
+++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34319.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-34319",
"sourceIdentifier": "security@xen.org",
"published": "2023-09-22T14:15:45.627",
- "lastModified": "2023-09-26T16:11:56.963",
+ "lastModified": "2023-10-29T02:42:22.617",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -66,13 +66,29 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
- "url": "https://xenbits.xenproject.org/xsa/advisory-438.html",
+ "url": "https://xenbits.xenproject.org/xsa/advisory-432.html",
"source": "security@xen.org",
"tags": [
+ "Mitigation",
"Patch",
"Vendor Advisory"
]
diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34354.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34354.json
index 30e6dcb3676..52f360ebfb7 100644
--- a/CVE-2023/CVE-2023-343xx/CVE-2023-34354.json
+++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34354.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-34354",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-11T16:15:13.233",
- "lastModified": "2023-10-11T16:37:00.913",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T20:43:40.507",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability exists in the upload_brand.cgi functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to execution of arbitrary javascript in another user's browser. An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) almacenada en la funcionalidad upload_brand.cgi de peplink Surf SOHO HW1 v6.3.5 (en QEMU). Una solicitud HTTP especialmente manipulada puede provocar la ejecuci\u00f3n de JavaScript arbitrario en el navegador de otro usuario. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,10 +80,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:peplink:surf_soho_firmware:6.3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F47DB73-DEB9-4191-9C70-BFD620575394"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:peplink:surf_soho:hw1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2313EA09-B0EA-4591-B4EA-2B80E7C60422"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1781",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Product",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34356.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34356.json
index 835b9ad92b8..dc148a43c19 100644
--- a/CVE-2023/CVE-2023-343xx/CVE-2023-34356.json
+++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34356.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-34356",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-11T16:15:13.320",
- "lastModified": "2023-10-11T16:37:00.913",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T14:59:43.587",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funcionalidad data.cgi xfer_dns de peplink Surf SOHO HW1 v6.3.5 (en QEMU). Una solicitud HTTP especialmente manipulada puede conducir a la ejecuci\u00f3n de un comando. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,10 +80,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:peplink:surf_soho_firmware:6.3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F47DB73-DEB9-4191-9C70-BFD620575394"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:peplink:surf_soho:hw1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2313EA09-B0EA-4591-B4EA-2B80E7C60422"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Product",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34366.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34366.json
new file mode 100644
index 00000000000..f9f36493fc5
--- /dev/null
+++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34366.json
@@ -0,0 +1,207 @@
+{
+ "id": "CVE-2023-34366",
+ "sourceIdentifier": "talos-cna@cisco.com",
+ "published": "2023-10-19T18:15:08.983",
+ "lastModified": "2023-10-25T14:30:07.750",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A use-after-free vulnerability exists in the Figure stream parsing functionality of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause memory corruption, resulting in arbitrary code execution. Victim would need to open a malicious file to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de use-after-free en la funcionalidad de an\u00e1lisis de flujo de figuras de Ichitaro 2023 1.0.1.59372. Un documento especialmente manipulado puede causar da\u00f1os en la memoria, lo que resulta en la ejecuci\u00f3n de c\u00f3digo arbitrario. La v\u00edctima necesitar\u00eda abrir un archivo malicioso para activar esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "talos-cna@cisco.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ },
+ {
+ "source": "talos-cna@cisco.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:easy_postcard_max:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D68E98B0-38CA-4148-825D-CF7C8AABB5BE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2021:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1755383C-2B74-4DD7-9C9B-DB19C12CA94D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1274E0AB-BDE0-45FB-B3A2-522E3AE4E41A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2023:1.0.1.59372:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15B1DC82-380D-4CF4-AF35-4AF2A1CBF778"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A1C403A-6787-4347-AF6F-69F225944011"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_8:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E401B098-6551-4101-9906-19C2AB7A5504"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_9:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65A56D02-7438-4319-BFD1-64FB11BC758C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "36AE4633-5418-4009-B51D-4A1F542B1A88"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "21A4F85C-EA95-4853-9A8C-C3C9142243A8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76FAE0E6-1037-45AC-A277-8F32338A50AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "552D41EF-A5DB-4ED0-B404-FF2649969B11"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F61D3C1-0011-4D78-83F8-2349D46AFE59"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC99A5A2-32B0-4F38-A2B1-FAC50A05FBEF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7814DB96-4078-47B8-93B2-5066029B6F65"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D8E2A1A-7C06-491F-8A28-BE70EFCDDFFF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD6F3523-7059-4591-9D04-97D287128D6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ED46089-ED5B-4314-B079-A8932377475E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3B6B97E-B202-4B1F-9B81-367CB7172DEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B5D80C5-5821-416E-A3E3-ADC7F221B093"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://jvn.jp/en/jp/JVN28846531/index.html",
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1758",
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34437.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34437.json
new file mode 100644
index 00000000000..faef21efa16
--- /dev/null
+++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34437.json
@@ -0,0 +1,122 @@
+{
+ "id": "CVE-2023-34437",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T00:15:16.053",
+ "lastModified": "2023-10-25T14:04:18.780",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\nBaker Hughes \u2013 Bently Nevada 3500 System TDI Firmware version 5.05\n\n contains\u00a0a vulnerability in their password retrieval functionality which could allow an attacker to access passwords stored on the device."
+ },
+ {
+ "lang": "es",
+ "value": "Baker Hughes en Bently Nevada 3500 System TDI Firmware versi\u00f3n 5.05 contiene una vulnerabilidad en su funcionalidad de recuperaci\u00f3n de contrase\u00f1as que podr\u00eda permitir a un atacante acceder a las contrase\u00f1as almacenadas en el dispositivo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:bakerhughes:bentley_nevada_3500_system_firmware:5.0.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9329A00C-D768-442F-9CDE-0027886D9F3E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:bakerhughes:bentley_nevada_3500_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDE17D85-8ABE-45B6-9FFB-66B74CCFF1CD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-05",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34441.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34441.json
new file mode 100644
index 00000000000..6c283b851a4
--- /dev/null
+++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34441.json
@@ -0,0 +1,122 @@
+{
+ "id": "CVE-2023-34441",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T00:15:16.130",
+ "lastModified": "2023-10-25T14:14:16.710",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\nBaker Hughes \u2013 Bently Nevada 3500 System TDI Firmware version 5.05\n\n contains\u00a0a cleartext transmission vulnerability which could allow an attacker to \n\nsteal the authentication secret from communication traffic to the device and reuse it for arbitrary requests.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Baker Hughes en Bently Nevada 3500 System TDI Firmware versi\u00f3n 5.05 contiene una vulnerabilidad de transmisi\u00f3n de texto plano que podr\u00eda permitir a un atacante robar el secreto de autenticaci\u00f3n del tr\u00e1fico de comunicaci\u00f3n al dispositivo y reutilizarlo para solicitudes arbitrarias."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.2
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:bakerhughes:bentley_nevada_3500_system_firmware:5.0.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9329A00C-D768-442F-9CDE-0027886D9F3E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:bakerhughes:bentley_nevada_3500_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDE17D85-8ABE-45B6-9FFB-66B74CCFF1CD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-05",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34446.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34446.json
new file mode 100644
index 00000000000..31ade4dcfef
--- /dev/null
+++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34446.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-34446",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:28.077",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, when displaying `pages/preferences.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0.\n"
+ },
+ {
+ "lang": "es",
+ "value": "iTop es una plataforma de gesti\u00f3n de servicios de TI basada en web y de c\u00f3digo abierto. Antes de las versiones 3.0.4 y 3.1.0, al mostrar `pages/preferences.php`, era posible realizar Cross-Site Scripting (XSS). Este problema se solucion\u00f3 en las versiones 3.0.4 y 3.1.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/Combodo/iTop/commit/e3ba826e5dfd3b724f1ee97bebfd20ded3c70b10",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-q4pp-j46r-gm68",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34447.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34447.json
new file mode 100644
index 00000000000..2e6dbab80ed
--- /dev/null
+++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34447.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-34447",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:28.147",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, on `pages/UI.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0."
+ },
+ {
+ "lang": "es",
+ "value": "iTop es una plataforma de gesti\u00f3n de servicios de TI basada en web y de c\u00f3digo abierto. Antes de las versiones 3.0.4 y 3.1.0, en `pages/UI.php`, era posible realizar Cross-Site Scripting (XSS). Este problema se solucion\u00f3 en las versiones 3.0.4 y 3.1.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/Combodo/iTop/commit/519751faa10b2fc5b75ea4516a1b8ef13ca35b33",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/Combodo/iTop/commit/b8f61362f570e1ef8127175331012b7fc8aba802",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-6rfm-2rwg-mj7p",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34969.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34969.json
index c4ad2c67aba..b25442797a2 100644
--- a/CVE-2023/CVE-2023-349xx/CVE-2023-34969.json
+++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34969.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-34969",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-08T03:15:08.970",
- "lastModified": "2023-06-24T03:15:09.013",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-23T16:15:08.950",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -95,6 +95,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/",
"source": "cve@mitre.org"
diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34975.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34975.json
index f30071f290f..27c766a074f 100644
--- a/CVE-2023/CVE-2023-349xx/CVE-2023-34975.json
+++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34975.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-34975",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2023-10-13T20:15:10.153",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T19:54:57.237",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.\n\nWe have already fixed the vulnerability in the following version:\nVideo Station 5.7.0 ( 2023/07/27 ) and later\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se ha informado que una vulnerabilidad de inyecci\u00f3n SQL afecta a Video Station. Si se explota, la vulnerabilidad podr\u00eda permitir a los usuarios autenticados inyectar c\u00f3digo malicioso a trav\u00e9s de una red. Ya se ha solucionado la vulnerabilidad en la siguiente versi\u00f3n: Video Station 5.7.0 (2023/07/27) y posteriores"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -46,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.7.0",
+ "matchCriteriaId": "41493329-139C-4B96-9C16-19DCF1698ACC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-23-52",
- "source": "security@qnapsecurity.com.tw"
+ "source": "security@qnapsecurity.com.tw",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34976.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34976.json
index e7176d22d60..f8646a1f942 100644
--- a/CVE-2023/CVE-2023-349xx/CVE-2023-34976.json
+++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34976.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-34976",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2023-10-13T20:15:10.230",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T19:56:09.990",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.\n\nWe have already fixed the vulnerability in the following version:\nVideo Station 5.7.0 ( 2023/07/27 ) and later\n"
+ },
+ {
+ "lang": "es",
+ "value": "Se ha informado que una vulnerabilidad de inyecci\u00f3n SQL afecta a Video Station. Si se explota, la vulnerabilidad podr\u00eda permitir a los usuarios autenticados inyectar c\u00f3digo malicioso a trav\u00e9s de una red. Ya se ha solucionado la vulnerabilidad en la siguiente versi\u00f3n: Video Station 5.7.0 (2023/07/27) y posteriores"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@@ -46,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.7.0",
+ "matchCriteriaId": "41493329-139C-4B96-9C16-19DCF1698ACC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-23-52",
- "source": "security@qnapsecurity.com.tw"
+ "source": "security@qnapsecurity.com.tw",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3487.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3487.json
new file mode 100644
index 00000000000..3e53e57585c
--- /dev/null
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3487.json
@@ -0,0 +1,125 @@
+{
+ "id": "CVE-2023-3487",
+ "sourceIdentifier": "product-security@silabs.com",
+ "published": "2023-10-20T15:15:11.967",
+ "lastModified": "2023-10-27T18:50:10.740",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nAn integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Un desbordamiento de enteros en Silicon Labs Gecko Bootloader versi\u00f3n 4.3.1 y anteriores permite acceso ilimitado a la memoria al leer o escribir en ranuras de almacenamiento."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "product-security@silabs.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.7,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ },
+ {
+ "source": "product-security@silabs.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:silabs:gecko_bootloader:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "4.3.1",
+ "matchCriteriaId": "CC6CEA66-303E-4E36-8F75-6AFF06A17639"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://community.silabs.com/s/contentdocument/0698Y00000ZmXqLQAV",
+ "source": "product-security@silabs.com",
+ "tags": [
+ "Permissions Required"
+ ]
+ },
+ {
+ "url": "https://github.com/SiliconLabs/gecko_sdk/releases",
+ "source": "product-security@silabs.com",
+ "tags": [
+ "Release Notes"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35013.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35013.json
index 580f0342422..e1b8f0060fe 100644
--- a/CVE-2023/CVE-2023-350xx/CVE-2023-35013.json
+++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35013.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-35013",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T00:15:10.420",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:42:30.197",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Governance 10.0, Identity Manager could allow a local privileged user to obtain sensitive information from source code. IBM X-Force ID: 257769."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Verify Governance 10.0, Identity Manager podr\u00eda permitir que un usuario privilegiado local obtenga informaci\u00f3n confidencial del c\u00f3digo fuente. ID de IBM X-Force: 257769."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-668"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,41 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_governance:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0",
+ "versionEndExcluding": "10.0.2",
+ "matchCriteriaId": "2F71600E-74AE-4A57-B9F6-2773CBD8761D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/257769",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7050358",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35018.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35018.json
index 7bede96e857..7b41e9600bd 100644
--- a/CVE-2023/CVE-2023-350xx/CVE-2023-35018.json
+++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35018.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-35018",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T00:15:10.510",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:20:10.327",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Governance 10.0 could allow a privileged use to upload arbitrary files due to improper file validation. IBM X-Force ID: 259382."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Security Verify Governance 10.0 podr\u00eda permitir un uso privilegiado para cargar archivos arbitrarios debido a una validaci\u00f3n de archivos incorrecta. ID de IBM X-Force: 259382."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,41 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:security_verify_governance:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0",
+ "versionEndExcluding": "10.0.2",
+ "matchCriteriaId": "2F71600E-74AE-4A57-B9F6-2773CBD8761D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/259382",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7050358",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35024.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35024.json
index c4c425a96e8..8ca5d994fe1 100644
--- a/CVE-2023/CVE-2023-350xx/CVE-2023-35024.json
+++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35024.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-35024",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-14T16:15:10.670",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T21:04:02.917",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 258349."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Cloud Pak para Automatizaci\u00f3n Empresarial 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1 y 22.0.2 son vulnerables a Cross-Site Scripting (XSS). Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista, lo que podr\u00eda conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. ID de IBM X-Force: 258349."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.6,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 4.7
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,104 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D419EF8-4D41-4FBE-A41B-9F9EAF7F72EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C27956AA-CCEE-4073-A8D7-D1B9575EE25C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "12A70646-ADD3-4CF7-A591-8BE96FBEF5A9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DF6CB2C4-800F-487A-B0E5-8A0A9718549D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D52711AA-0F11-47E7-8EE8-6B8D65403F8A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE2C6F84-C83F-4AE1-B0A7-740568F52C04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC8A641D-B7AB-41FA-AFDB-2C8EBDA6A1A7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "250AC4D5-1D25-4EEE-B1CA-AA8E104BBF7B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C5B7FA4-A27C-40CA-AA53-183909D18C13"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "AF7E2601-47E6-4111-9DE0-C3C01705884A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "BA799229-3577-409F-BFCC-0ABA541EA710"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "A8D6EB68-3804-494D-B12A-2E96E31D1B1A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "F22E2017-86A6-4CD1-8192-7A5DF0A1D818"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "517C5EDE-5104-4E22-B9C6-64DFBA7650C3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/258349",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047198",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35074.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35074.json
index 0bd74c3eb07..5bc6289054b 100644
--- a/CVE-2023/CVE-2023-350xx/CVE-2023-35074.json
+++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35074.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-35074",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-27T15:18:52.800",
- "lastModified": "2023-10-14T03:15:09.803",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:09:02.390",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -96,6 +96,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -117,15 +132,27 @@
},
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/3",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/8",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/9",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/28/3",
@@ -136,7 +163,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT213936",
diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35083.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35083.json
new file mode 100644
index 00000000000..cfdb885111a
--- /dev/null
+++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35083.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-35083",
+ "sourceIdentifier": "support@hackerone.com",
+ "published": "2023-10-18T04:15:10.900",
+ "lastModified": "2023-10-25T00:14:42.067",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Allows an authenticated attacker with network access to read arbitrary files on Endpoint Manager recently discovered on 2022 SU3 and all previous versions potentially leading to the leakage of sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "Permite que un atacante autenticado con acceso a la red lea archivos arbitrarios en Endpoint Manager descubierto recientemente en 2022 SU3 y todas las versiones anteriores, lo que podr\u00eda provocar la fuga de informaci\u00f3n confidencial."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2022",
+ "matchCriteriaId": "B1F6549B-CF5D-4607-B67D-5489905A1705"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*",
+ "matchCriteriaId": "46580865-5177-4E55-BDAC-73DA4B472B35"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*",
+ "matchCriteriaId": "E57E12B5-B789-450C-9476-6C4C151E6993"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*",
+ "matchCriteriaId": "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*",
+ "matchCriteriaId": "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-35083?language=en_US",
+ "source": "support@hackerone.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35084.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35084.json
new file mode 100644
index 00000000000..e1dfdcd14a2
--- /dev/null
+++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35084.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-35084",
+ "sourceIdentifier": "support@hackerone.com",
+ "published": "2023-10-18T04:15:11.027",
+ "lastModified": "2023-10-25T00:17:27.200",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unsafe Deserialization of User Input could lead to Execution of Unauthorized Operations in Ivanti Endpoint Manager 2022 su3 and all previous versions, which could allow an attacker to execute commands remotely."
+ },
+ {
+ "lang": "es",
+ "value": "La Deserializaci\u00f3n Insegura de la Entrada del Usuario podr\u00eda provocar la ejecuci\u00f3n de operaciones no autorizadas en Ivanti Endpoint Manager 2022 su3 y todas las versiones anteriores, lo que podr\u00eda permitir a un atacante ejecutar comandos de forma remota."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ivanti:endpoint_manager:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2022",
+ "matchCriteriaId": "B1F6549B-CF5D-4607-B67D-5489905A1705"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:-:*:*:*:*:*:*",
+ "matchCriteriaId": "46580865-5177-4E55-BDAC-73DA4B472B35"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su1:*:*:*:*:*:*",
+ "matchCriteriaId": "E57E12B5-B789-450C-9476-6C4C151E6993"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su2:*:*:*:*:*:*",
+ "matchCriteriaId": "E47C65B3-56DD-4D65-8B4B-6AFFE28E94F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ivanti:endpoint_manager:2022:su3:*:*:*:*:*:*",
+ "matchCriteriaId": "10D6EAB7-B14B-45E9-92B9-4FADFBBB08AF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://forums.ivanti.com/s/article/SA-2023-08-08-CVE-2023-35084?language=en_US",
+ "source": "support@hackerone.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35126.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35126.json
new file mode 100644
index 00000000000..934cc8ca5f9
--- /dev/null
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35126.json
@@ -0,0 +1,215 @@
+{
+ "id": "CVE-2023-35126",
+ "sourceIdentifier": "talos-cna@cisco.com",
+ "published": "2023-10-19T17:15:10.000",
+ "lastModified": "2023-10-25T14:48:30.890",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An out-of-bounds write vulnerability exists within the parsers for both the \"DocumentViewStyles\" and \"DocumentEditStyles\" streams of Ichitaro 2023 1.0.1.59372 when processing types 0x0000-0x0009 of a style record with the type 0x2008. A specially crafted document can cause memory corruption, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de escritura fuera de l\u00edmites dentro de los analizadores para las secuencias \"DocumentViewStyles\" y \"DocumentEditStyles\" de Ichitaro 2023 1.0.1.59372 al procesar los tipos 0x0000-0x0009 de un registro de estilo con el tipo 0x2008. Un documento especialmente manipulado puede provocar da\u00f1os en la memoria, lo que puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede proporcionar un archivo malicioso para desencadenar esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "talos-cna@cisco.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "talos-cna@cisco.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-129"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:easy_postcard_max:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D68E98B0-38CA-4148-825D-CF7C8AABB5BE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2021:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1755383C-2B74-4DD7-9C9B-DB19C12CA94D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1274E0AB-BDE0-45FB-B3A2-522E3AE4E41A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2023:1.0.1.59372:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15B1DC82-380D-4CF4-AF35-4AF2A1CBF778"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A1C403A-6787-4347-AF6F-69F225944011"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_8:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E401B098-6551-4101-9906-19C2AB7A5504"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_9:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65A56D02-7438-4319-BFD1-64FB11BC758C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "36AE4633-5418-4009-B51D-4A1F542B1A88"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "21A4F85C-EA95-4853-9A8C-C3C9142243A8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76FAE0E6-1037-45AC-A277-8F32338A50AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "552D41EF-A5DB-4ED0-B404-FF2649969B11"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F61D3C1-0011-4D78-83F8-2349D46AFE59"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC99A5A2-32B0-4F38-A2B1-FAC50A05FBEF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7814DB96-4078-47B8-93B2-5066029B6F65"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D8E2A1A-7C06-491F-8A28-BE70EFCDDFFF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD6F3523-7059-4591-9D04-97D287128D6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ED46089-ED5B-4314-B079-A8932377475E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3B6B97E-B202-4B1F-9B81-367CB7172DEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B5D80C5-5821-416E-A3E3-ADC7F221B093"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://jvn.jp/en/jp/JVN28846531/index.html",
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1825",
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1825",
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35180.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35180.json
new file mode 100644
index 00000000000..c26c16d6e07
--- /dev/null
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35180.json
@@ -0,0 +1,108 @@
+{
+ "id": "CVE-2023-35180",
+ "sourceIdentifier": "psirt@solarwinds.com",
+ "published": "2023-10-19T15:15:08.823",
+ "lastModified": "2023-10-25T17:38:08.880",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows authenticated users to abuse SolarWinds ARM API."
+ },
+ {
+ "lang": "es",
+ "value": "SolarWinds Access Rights Manager era susceptible a una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. Esta vulnerabilidad permite a los usuarios autenticados abusar de la API ARM de SolarWinds."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.2.0.73",
+ "matchCriteriaId": "D2286244-6B0B-40D7-BC8B-8F843005B66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-1_release_notes.htm",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35180",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35181.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35181.json
new file mode 100644
index 00000000000..d1f9f1237ad
--- /dev/null
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35181.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-35181",
+ "sourceIdentifier": "psirt@solarwinds.com",
+ "published": "2023-10-19T15:15:08.983",
+ "lastModified": "2023-10-25T19:14:40.357",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The SolarWinds Access Rights Manager was susceptible to Privilege Escalation Vulnerability. This vulnerability allows users to abuse incorrect folder permission resulting in Privilege Escalation."
+ },
+ {
+ "lang": "es",
+ "value": "SolarWinds Access Rights Manager era susceptible a una vulnerabilidad de escalada de privilegios. Esta vulnerabilidad permite a los usuarios abusar de permisos de carpeta incorrectos, lo que resulta en una escalada de privilegios."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-276"
+ }
+ ]
+ },
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-276"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.2.0.73",
+ "matchCriteriaId": "D2286244-6B0B-40D7-BC8B-8F843005B66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35181",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35182.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35182.json
new file mode 100644
index 00000000000..64e7a36426e
--- /dev/null
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35182.json
@@ -0,0 +1,108 @@
+{
+ "id": "CVE-2023-35182",
+ "sourceIdentifier": "psirt@solarwinds.com",
+ "published": "2023-10-19T15:15:09.070",
+ "lastModified": "2023-10-25T19:17:56.583",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability can be abused by unauthenticated users on SolarWinds ARM Server."
+ },
+ {
+ "lang": "es",
+ "value": "SolarWinds Access Rights Manager era susceptible a una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. Esta vulnerabilidad puede ser aprovechada por usuarios no autenticados en SolarWinds ARM Server."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.2.0.73",
+ "matchCriteriaId": "D2286244-6B0B-40D7-BC8B-8F843005B66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-1_release_notes.htm",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35182",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35183.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35183.json
new file mode 100644
index 00000000000..f0cf06e62cb
--- /dev/null
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35183.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-35183",
+ "sourceIdentifier": "psirt@solarwinds.com",
+ "published": "2023-10-19T15:15:09.157",
+ "lastModified": "2023-10-25T19:28:54.903",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The SolarWinds Access Rights Manager was susceptible to Privilege Escalation Vulnerability. This vulnerability allows authenticated users to abuse local resources to Privilege Escalation."
+ },
+ {
+ "lang": "es",
+ "value": "SolarWinds Access Rights Manager era susceptible a una vulnerabilidad de escalada de privilegios. Esta vulnerabilidad permite a los usuarios autenticados abusar de los recursos locales para escalar privilegios."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-276"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.2.0.73",
+ "matchCriteriaId": "D2286244-6B0B-40D7-BC8B-8F843005B66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-1_release_notes.htm",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35183",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35184.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35184.json
new file mode 100644
index 00000000000..dfc1005474a
--- /dev/null
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35184.json
@@ -0,0 +1,108 @@
+{
+ "id": "CVE-2023-35184",
+ "sourceIdentifier": "psirt@solarwinds.com",
+ "published": "2023-10-19T15:15:09.247",
+ "lastModified": "2023-10-25T19:29:44.983",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse a SolarWinds service resulting in a remote code execution."
+ },
+ {
+ "lang": "es",
+ "value": "SolarWinds Access Rights Manager era susceptible a una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. Esta vulnerabilidad permite que un usuario no autenticado abuse de un servicio de SolarWinds, lo que resulta en la ejecuci\u00f3n remota de c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.2.0.73",
+ "matchCriteriaId": "D2286244-6B0B-40D7-BC8B-8F843005B66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-1_release_notes.htm",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35184",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35185.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35185.json
new file mode 100644
index 00000000000..86e8def129b
--- /dev/null
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35185.json
@@ -0,0 +1,108 @@
+{
+ "id": "CVE-2023-35185",
+ "sourceIdentifier": "psirt@solarwinds.com",
+ "published": "2023-10-19T15:15:09.330",
+ "lastModified": "2023-10-25T20:19:07.667",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The SolarWinds Access Rights Manager was susceptible to a Directory Traversal Remote Code Vulnerability using SYSTEM privileges. "
+ },
+ {
+ "lang": "es",
+ "value": "SolarWinds Access Rights Manager era susceptible a una vulnerabilidad de Directory Traversal Remote Code utilizando privilegios de SYSTEM."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.2.0.73",
+ "matchCriteriaId": "D2286244-6B0B-40D7-BC8B-8F843005B66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-1_release_notes.htm",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35185",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35186.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35186.json
new file mode 100644
index 00000000000..49018356f9f
--- /dev/null
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35186.json
@@ -0,0 +1,108 @@
+{
+ "id": "CVE-2023-35186",
+ "sourceIdentifier": "psirt@solarwinds.com",
+ "published": "2023-10-19T15:15:09.410",
+ "lastModified": "2023-10-25T19:39:42.820",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an authenticated user to abuse SolarWinds service resulting in remote code execution."
+ },
+ {
+ "lang": "es",
+ "value": "SolarWinds Access Rights Manager era susceptible a una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. Esta vulnerabilidad permite que un usuario autenticado abuse del servicio SolarWinds, lo que resulta en la ejecuci\u00f3n remota de c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.2.0.73",
+ "matchCriteriaId": "D2286244-6B0B-40D7-BC8B-8F843005B66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-1_release_notes.htm",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35186",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35187.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35187.json
new file mode 100644
index 00000000000..a3106e13078
--- /dev/null
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35187.json
@@ -0,0 +1,108 @@
+{
+ "id": "CVE-2023-35187",
+ "sourceIdentifier": "psirt@solarwinds.com",
+ "published": "2023-10-19T15:15:09.500",
+ "lastModified": "2023-10-25T19:43:00.663",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The SolarWinds Access Rights Manager was susceptible to a Directory Traversal Remote Code Vulnerability. This vulnerability allows an unauthenticated user to achieve the Remote Code Execution."
+ },
+ {
+ "lang": "es",
+ "value": "SolarWinds Access Rights Manager era susceptible a una vulnerabilidad de Directory Traversal Remote Code. Esta vulnerabilidad permite que un usuario no autenticado logre la ejecuci\u00f3n remota de c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@solarwinds.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.2.0.73",
+ "matchCriteriaId": "D2286244-6B0B-40D7-BC8B-8F843005B66B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-1_release_notes.htm",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Release Notes",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35187",
+ "source": "psirt@solarwinds.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35193.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35193.json
index 778e75ea416..32a4ac7c90c 100644
--- a/CVE-2023/CVE-2023-351xx/CVE-2023-35193.json
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35193.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-35193",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-11T16:15:13.723",
- "lastModified": "2023-10-11T16:37:00.913",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T14:59:29.847",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset 0x4bddb8."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funcionalidad api.cgi cmd.mvpn.x509.write de peplink Surf SOHO HW1 v6.3.5 (en QEMU). Una solicitud HTTP especialmente manipulada puede conducir a la ejecuci\u00f3n de un comando. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad. Esta vulnerabilidad es espec\u00edficamente para la llamada \"system\" en el archivo \"/web/MANGA/cgi-bin/api.cgi\" para la versi\u00f3n de firmware 6.3.5 en el desplazamiento 0x4bddb8."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,10 +80,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:peplink:surf_soho_firmware:6.3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F47DB73-DEB9-4191-9C70-BFD620575394"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:peplink:surf_soho:hw1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2313EA09-B0EA-4591-B4EA-2B80E7C60422"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Product",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35194.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35194.json
index 8e498e14068..a3063789897 100644
--- a/CVE-2023/CVE-2023-351xx/CVE-2023-35194.json
+++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35194.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-35194",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-11T16:15:13.797",
- "lastModified": "2023-10-11T16:37:00.913",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T14:59:10.533",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset `0x4bde44`."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funcionalidad api.cgi cmd.mvpn.x509.write de peplink Surf SOHO HW1 v6.3.5 (en QEMU). Una solicitud HTTP especialmente manipulada puede conducir a la ejecuci\u00f3n de un comando. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad. Esta vulnerabilidad es espec\u00edficamente para la llamada del `system` en el archivo `/web/MANGA/cgi-bin/api.cgi` para la versi\u00f3n de firmware 6.3.5 en el desplazamiento `0x4bde44 `."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@@ -46,10 +80,44 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:peplink:surf_soho_firmware:6.3.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F47DB73-DEB9-4191-9C70-BFD620575394"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:peplink:surf_soho:hw1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2313EA09-B0EA-4591-B4EA-2B80E7C60422"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Product",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35649.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35649.json
index 23851e4af1e..630aea95e48 100644
--- a/CVE-2023/CVE-2023-356xx/CVE-2023-35649.json
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35649.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-35649",
"sourceIdentifier": "security@android.com",
"published": "2023-10-11T20:15:10.140",
- "lastModified": "2023-10-11T21:04:47.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T14:17:02.757",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In several functions of Exynos modem files, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En varias funciones de los archivos del m\u00f3dem Exynos, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo con los privilegios de ejecuci\u00f3n del sistema necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2023-10-01",
- "source": "security@android.com"
+ "source": "security@android.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35656.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35656.json
new file mode 100644
index 00000000000..6ca93e27d82
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35656.json
@@ -0,0 +1,79 @@
+{
+ "id": "CVE-2023-35656",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-18T20:15:08.933",
+ "lastModified": "2023-10-25T10:02:58.693",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": " In multiple functions of protocolembmsadapter.cpp, there is a possible out\n of bounds read due to a missing bounds check. This could lead to remote\n information disclosure with no additional execution privileges needed. User\n interaction is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En m\u00faltiples funciones de protocolembmsadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://source.android.com/security/bulletin/pixel/2023-10-01",
+ "source": "security@android.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35660.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35660.json
index 7ad15a731a2..446880015e4 100644
--- a/CVE-2023/CVE-2023-356xx/CVE-2023-35660.json
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35660.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-35660",
"sourceIdentifier": "security@android.com",
"published": "2023-10-11T20:15:10.380",
- "lastModified": "2023-10-11T21:04:47.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T01:42:58.543",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In lwis_transaction_client_cleanup of lwis_transaction.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En lwis_transaction_client_cleanup de lwis_transaction.c, existe una posible forma de da\u00f1ar la memoria debido a un use after free. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2023-10-01",
- "source": "security@android.com"
+ "source": "security@android.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35661.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35661.json
index 619d4aaa464..a16e43dd11a 100644
--- a/CVE-2023/CVE-2023-356xx/CVE-2023-35661.json
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35661.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-35661",
"sourceIdentifier": "security@android.com",
"published": "2023-10-11T20:15:10.427",
- "lastModified": "2023-10-11T21:04:47.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T01:45:44.173",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In ProfSixDecomTcpSACKoption of RohcPacketCommon.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En ProfSixDecomTcpSACKoption de RohcPacketCommon.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2023-10-01",
- "source": "security@android.com"
+ "source": "security@android.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35662.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35662.json
index eb884201749..aee489971c7 100644
--- a/CVE-2023/CVE-2023-356xx/CVE-2023-35662.json
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35662.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-35662",
"sourceIdentifier": "security@android.com",
"published": "2023-10-11T20:15:10.477",
- "lastModified": "2023-10-11T21:04:47.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T01:49:22.293",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "there is a possible out of bounds write due to buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento del b\u00fafer. Esto podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de actuaci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2023-10-01",
- "source": "security@android.com"
+ "source": "security@android.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35663.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35663.json
new file mode 100644
index 00000000000..5253b3ab80c
--- /dev/null
+++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35663.json
@@ -0,0 +1,79 @@
+{
+ "id": "CVE-2023-35663",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-18T20:15:08.993",
+ "lastModified": "2023-10-25T10:33:09.410",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": " In Init of protocolnetadapter.cpp, there is a possible out of bounds read\n due to a missing bounds check. This could lead to remote information\n disclosure with no additional execution privileges needed. User interaction\n is not needed for exploitation."
+ },
+ {
+ "lang": "es",
+ "value": "En el inicio de protocolnetadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://source.android.com/security/bulletin/pixel/2023-10-01",
+ "source": "security@android.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35788.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35788.json
index d82bffefdfa..48f4556d185 100644
--- a/CVE-2023/CVE-2023-357xx/CVE-2023-35788.json
+++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35788.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-35788",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-16T21:15:09.340",
- "lastModified": "2023-09-11T19:15:42.757",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T00:15:14.027",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en fl_set_geneve_opt en net/sched/cls_flower.c en el kernel de Linux antes de 6.3.7. Permite una escritura fuera de los l\u00edmites en el c\u00f3digo flower classifier a trav\u00e9s de paquetes TCA_FLOWER_KEY_ENC_OPTS_GENEVE. Esto puede resultar en denegaci\u00f3n de servicio o escalada de privilegios.\n"
}
],
"metrics": {
@@ -246,6 +250,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "cve@mitre.org"
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20230714-0002/",
"source": "cve@mitre.org",
diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35794.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35794.json
new file mode 100644
index 00000000000..0bc0ad18d05
--- /dev/null
+++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35794.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-35794",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T21:15:08.513",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/Dodge-MPTC/CVE-2023-35794-WebSSH-Hijacking",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.cassianetworks.com/products/iot-access-controller/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35796.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35796.json
index fd91738c696..3cec6e91330 100644
--- a/CVE-2023/CVE-2023-357xx/CVE-2023-35796.json
+++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35796.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-35796",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-10-10T11:15:11.733",
- "lastModified": "2023-10-10T12:16:32.703",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T12:25:01.420",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "productcert@siemens.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
+ },
+ {
+ "source": "productcert@siemens.com",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
@@ -50,10 +70,30 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:siemens:sinema_server:14.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85D4624C-8FF6-43E7-9098-5BD106EF6972"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-594373.pdf",
- "source": "productcert@siemens.com"
+ "source": "productcert@siemens.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35823.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35823.json
index ad06c3b63fc..b62bce11c9e 100644
--- a/CVE-2023/CVE-2023-358xx/CVE-2023-35823.json
+++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35823.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-35823",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-18T22:15:09.187",
- "lastModified": "2023-08-03T15:15:26.330",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-29T02:42:43.460",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,6 +66,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -87,7 +102,19 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947@xs4all.nl/",
@@ -105,7 +132,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230803-0002/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35824.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35824.json
index 185d1cd95dd..56c7d7d6780 100644
--- a/CVE-2023/CVE-2023-358xx/CVE-2023-35824.json
+++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35824.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-35824",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-18T22:15:09.240",
- "lastModified": "2023-08-03T15:15:26.610",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-29T02:42:48.027",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,6 +66,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -87,7 +102,19 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947@xs4all.nl/",
@@ -105,7 +132,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230803-0002/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35945.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35945.json
index 01a0e74272c..a074b58a1a4 100644
--- a/CVE-2023/CVE-2023-359xx/CVE-2023-35945.json
+++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35945.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-35945",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-13T21:15:08.880",
- "lastModified": "2023-07-25T18:36:37.267",
+ "lastModified": "2023-10-24T17:26:30.973",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -113,6 +113,22 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.55.1",
+ "matchCriteriaId": "2BE13342-76A9-4B62-941D-39C1FE18E19D"
+ }
+ ]
+ }
+ ]
}
],
"references": [
diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35986.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35986.json
new file mode 100644
index 00000000000..fa3235fc280
--- /dev/null
+++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35986.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-35986",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T18:15:09.320",
+ "lastModified": "2023-10-25T14:28:44.120",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nSante DICOM Viewer Pro lacks proper validation of user-supplied data when parsing DICOM files. This could lead to a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Sante DICOM Viewer Pro carece de una validaci\u00f3n adecuada de los datos proporcionados por el usuario al analizar archivos DICOM. Esto podr\u00eda provocar un desbordamiento del b\u00fafer basado en pila. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "12.2.6",
+ "matchCriteriaId": "5D4EC8EE-4148-43B2-8E1A-EAE05484DDF4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-285-01",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3567.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3567.json
index 400605f8dcb..0078e6bbbfc 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3567.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3567.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3567",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-24T16:15:12.990",
- "lastModified": "2023-10-11T19:15:10.337",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-26T18:08:49.270",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -132,12 +132,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-3567",
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3575.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3575.json
index 6ac62d6832c..5a52f5b372a 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3575.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3575.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3575",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-08-07T15:15:11.460",
- "lastModified": "2023-10-11T09:15:10.320",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-29T02:31:30.007",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -75,7 +75,10 @@
},
{
"url": "https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3589.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3589.json
index 141ec77ce1f..22126357083 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3589.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3589.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3589",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2023-10-09T09:15:10.507",
- "lastModified": "2023-10-13T10:15:10.090",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T20:22:07.120",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -11,7 +11,7 @@
},
{
"lang": "es",
- "value": "Una vulnerabilidad de Cross-Site Request Forgery (CSRF) que afecta a Teamwork Cloud desde No Magic Release 2021x hasta No Magic Release 2022x permite a un atacante enviar una consulta espec\u00edficamente manipulada al servidor."
+ "value": "Una vulnerabilidad de Cross-Site Request Forgery (CSRF) que afecta a Teamwork Cloud desde No Magic Release 2021x hasta No Magic Release 2022x podr\u00eda permitir, con algunas condiciones muy espec\u00edficas, que un atacante env\u00ede una consulta espec\u00edficamente manipulada al servidor."
}
],
"metrics": {
@@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
- "attackComplexity": "LOW",
+ "attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
- "baseScore": 8.8,
+ "baseScore": 7.5,
"baseSeverity": "HIGH"
},
- "exploitabilityScore": 2.8,
+ "exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36053.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36053.json
index 7372a91b4b7..0fc242eafc6 100644
--- a/CVE-2023/CVE-2023-360xx/CVE-2023-36053.json
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36053.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-36053",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-03T13:15:09.737",
- "lastModified": "2023-10-15T04:15:11.993",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-23T04:15:11.267",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -116,6 +116,10 @@
"Mailing List"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/",
"source": "cve@mitre.org"
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36054.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36054.json
index d2a880f2433..3f19f8ecb3c 100644
--- a/CVE-2023/CVE-2023-360xx/CVE-2023-36054.json
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36054.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-36054",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-07T19:15:09.840",
- "lastModified": "2023-09-08T17:15:27.567",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-22T23:15:07.923",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -96,6 +96,10 @@
"Patch"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00031.html",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0004/",
"source": "cve@mitre.org"
diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36085.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36085.json
new file mode 100644
index 00000000000..ee7f3be2eba
--- /dev/null
+++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36085.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-36085",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:28.223",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The sisqualWFM 7.1.319.103 thru 7.1.319.111 for Android, has a host header injection vulnerability in its \"/sisqualIdentityServer/core/\" endpoint. By modifying the HTTP Host header, an attacker can change webpage links and even redirect users to arbitrary or malicious locations. This can lead to phishing attacks, malware distribution, and unauthorized access to sensitive resources."
+ },
+ {
+ "lang": "es",
+ "value": "SisqualWFM 7.1.319.103 a 7.1.319.111 para Android tiene una vulnerabilidad de inyecci\u00f3n de encabezado de host en su endpoint \"/sisqualIdentityServer/core/\". Al modificar el encabezado del host HTTP, un atacante puede cambiar los enlaces de las p\u00e1ginas web e incluso redirigir a los usuarios a ubicaciones arbitrarias o maliciosas. Esto puede provocar ataques de phishing, distribuci\u00f3n de malware y acceso no autorizado a recursos confidenciales."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/omershaik0/Handmade_Exploits/tree/main/SISQUALWFM-Host-Header-Injection-CVE-2023-36085",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-361xx/CVE-2023-36193.json b/CVE-2023/CVE-2023-361xx/CVE-2023-36193.json
index d30b5bd88db..aacd44c0d71 100644
--- a/CVE-2023/CVE-2023-361xx/CVE-2023-36193.json
+++ b/CVE-2023/CVE-2023-361xx/CVE-2023-36193.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-36193",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-23T02:15:09.703",
- "lastModified": "2023-06-30T17:31:02.620",
+ "lastModified": "2023-10-24T16:06:23.780",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:gifsicle_project:gifsicle:1.93:*:*:*:*:*:*:*",
- "matchCriteriaId": "A319ACEB-3148-493D-B050-FF4E6D3C4156"
+ "criteria": "cpe:2.3:a:lcdf:gifsicle:1.93:*:*:*:*:*:*:*",
+ "matchCriteriaId": "14BC6A04-1F0C-48A3-BB79-9113D6CFB96F"
}
]
}
diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36321.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36321.json
new file mode 100644
index 00000000000..ebfb89806b9
--- /dev/null
+++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36321.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-36321",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T23:15:11.513",
+ "lastModified": "2023-10-24T23:40:13.823",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Connected Vehicle Systems Alliance (COVESA) up to v2.18.8 was discovered to contain a buffer overflow via the component /shared/dlt_common.c."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Connected Vehicle Systems Alliance (COVESA) hasta v2.18.8 conten\u00eda un desbordamiento de b\u00fafer a trav\u00e9s del componente /shared/dlt_common.c."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:covesa:dlt-daemon:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.18.8",
+ "matchCriteriaId": "66004448-7EF2-4593-88DC-D85CB481BD06"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/COVESA/dlt-daemon/issues/436",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking"
+ ]
+ },
+ {
+ "url": "https://github.com/michael-methner/dlt-daemon/commit/8ac9a080bee25e67e49bd138d81c992ce7b6d899",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36340.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36340.json
index 734e1e25b27..965403e29d5 100644
--- a/CVE-2023/CVE-2023-363xx/CVE-2023-36340.json
+++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36340.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-36340",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T05:15:49.633",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:10:01.763",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain a stack overflow via the http_host parameter in the function loginAuth."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK NR1800X V9.1.0u.6279_B20210910 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro http_host en la funci\u00f3n loginAuth."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:nr1800x_firmware:9.1.0u.6279_b20210910:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CFB91EF-6C07-45CB-AA17-A3D937FC9D7C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D2D0E8-2678-4238-8229-83450ECA1153"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/TOTOLINK-NR1800X.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36380.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36380.json
index 62c569ff35d..76b7154aaed 100644
--- a/CVE-2023/CVE-2023-363xx/CVE-2023-36380.json
+++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36380.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-36380",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-10-10T11:15:11.817",
- "lastModified": "2023-10-10T12:16:32.703",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T14:23:25.010",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
- "source": "productcert@siemens.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "productcert@siemens.com",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
@@ -50,10 +70,72 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:siemens:cp-8050_firmware:*:*:*:*:cpci85:*:*:*",
+ "versionEndExcluding": "05.11",
+ "matchCriteriaId": "5DDCBDDD-3936-462A-A93A-696AAEBB4EBA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:siemens:cp-8050:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "929EF3DE-C8E6-49DA-98C0-13AB4C966AA7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:siemens:cp-8031_firmware:*:*:*:*:cpci85:*:*:*",
+ "versionEndExcluding": "05.11",
+ "matchCriteriaId": "36A1AC2A-A6D1-4C2F-9439-FA093EB6B44D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:siemens:cp-8031:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D24F9EDC-DA14-477D-B9C1-C9BF56E9B057"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134651.pdf",
- "source": "productcert@siemens.com"
+ "source": "productcert@siemens.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36387.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36387.json
index a791e80faab..23c4a691b3e 100644
--- a/CVE-2023/CVE-2023-363xx/CVE-2023-36387.json
+++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36387.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-36387",
"sourceIdentifier": "security@apache.org",
"published": "2023-09-06T13:15:08.537",
- "lastModified": "2023-10-17T08:15:09.210",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T18:47:21.623",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -60,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security@apache.org",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -70,12 +70,12 @@
]
},
{
- "source": "nvd@nist.gov",
+ "source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-281"
+ "value": "CWE-863"
}
]
}
@@ -101,7 +101,10 @@
"references": [
{
"url": "https://github.com/apache/superset/pull/24185",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://lists.apache.org/thread/tt6s6hm8nv6s11z8bfsk3r3d9ov0ogw3",
diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36478.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36478.json
index 0704d91d42a..de4cb0889c5 100644
--- a/CVE-2023/CVE-2023-364xx/CVE-2023-36478.json
+++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36478.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-36478",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-10T17:15:11.737",
- "lastModified": "2023-10-10T17:52:17.703",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-27T19:12:19.247",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to\nexceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295\nwill overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), and this length value is a very large positive number when multiplied by 2, then the user can cause a very large buffer to be allocated on the server. Users of HTTP/2 can be impacted by a remote denial of service attack. The issue has been fixed in versions 11.0.16, 10.0.16, and 9.4.53. There are no known workarounds."
+ },
+ {
+ "lang": "es",
+ "value": "Eclipse Jetty proporciona un servidor web y un contenedor de servlets. En las versiones 11.0.0 a 11.0.15, 10.0.0 a 10.0.15 y 9.0.0 a 9.4.52, un desbordamiento de enteros en `MetaDataBuilder.checkSize` permite que los valores del encabezado HTTP/2 HPACK excedan su l\u00edmite de tama\u00f1o. `MetaDataBuilder.java` determina si el nombre o valor de un encabezado excede el l\u00edmite de tama\u00f1o y genera una excepci\u00f3n si se excede el l\u00edmite. Sin embargo, cuando la longitud es muy grande y Huffman es verdadera, la multiplicaci\u00f3n por 4 en la l\u00ednea 295 se desbordar\u00e1 y la longitud se volver\u00e1 negativa. `(_size+length)` ahora ser\u00e1 negativo y la verificaci\u00f3n en la l\u00ednea 296 no se activar\u00e1. Adem\u00e1s, `MetaDataBuilder.checkSize` permite que los tama\u00f1os de los valores del encabezado HPACK ingresados por el usuario sean negativos, lo que podr\u00eda generar una asignaci\u00f3n de b\u00fafer muy grande m\u00e1s adelante cuando el tama\u00f1o ingresado por el usuario se multiplique por 2. Esto significa que si un usuario proporciona un tama\u00f1o con valor de longitud negativo (o, m\u00e1s precisamente, un valor de longitud que, cuando se multiplica por el factor de manipulaci\u00f3n 4/3, es negativo), y este valor de longitud es un n\u00famero positivo muy grande cuando se multiplica por 2, entonces el usuario puede causar un valor de longitud muy grande de b\u00fafer que se asignar\u00e1 en el servidor. Los usuarios de HTTP/2 pueden verse afectados por un ataque remoto de denegaci\u00f3n de servicio. El problema se solucion\u00f3 en las versiones 11.0.16, 10.0.16 y 9.4.53. No se conocen workarounds."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -36,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -50,26 +84,106 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.3.0",
+ "versionEndExcluding": "9.4.53",
+ "matchCriteriaId": "0780793A-2F4A-452B-BCC8-1945E57C3C49"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0.0",
+ "versionEndExcluding": "10.0.16",
+ "matchCriteriaId": "1D15B5CF-CDFA-4303-8A9F-CF2FAD8E10CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.0.0",
+ "versionEndExcluding": "11.0.16",
+ "matchCriteriaId": "9153C468-135C-49C4-B33B-1828E37AF483"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
+ "versionEndExcluding": "2.414.3",
+ "matchCriteriaId": "16B24AD0-318F-4E5D-B2BF-DD61A7C033CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
+ "versionEndExcluding": "2.428",
+ "matchCriteriaId": "156AD017-ABC8-49EC-BB4F-79C55D6B2BC1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/18/4",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://github.com/eclipse/jetty.project/pull/9634",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
},
{
"url": "https://github.com/eclipse/jetty.project/releases/tag/jetty-10.0.16",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/eclipse/jetty.project/releases/tag/jetty-11.0.16",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.53.v20231009",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgh7-54f2-x98r",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36559.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36559.json
index 8e54f074a4b..21cd29a25f5 100644
--- a/CVE-2023/CVE-2023-365xx/CVE-2023-36559.json
+++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36559.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-36559",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-10-13T21:15:51.583",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:01:09.807",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Suplantaci\u00f3n de Identidad en Microsoft Edge (basado en Chromium)"
}
],
"metrics": {
@@ -34,10 +38,44 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "118.0.2088.46",
+ "matchCriteriaId": "14DD85C8-A45D-4A05-82D4-F7C614177054"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36559",
- "source": "secure@microsoft.com"
+ "source": "secure@microsoft.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36806.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36806.json
index 99e73998b6e..e29e6585261 100644
--- a/CVE-2023/CVE-2023-368xx/CVE-2023-36806.json
+++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36806.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-36806",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T19:15:11.550",
- "lastModified": "2023-08-02T15:59:40.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-21T01:15:07.817",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -127,6 +127,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://herolab.usd.de/security-advisories/usd-2023-0020/",
+ "source": "security-advisories@github.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36841.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36841.json
index 07d711c8b73..9f785935630 100644
--- a/CVE-2023/CVE-2023-368xx/CVE-2023-36841.json
+++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36841.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-36841",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-12T23:15:10.967",
- "lastModified": "2023-10-13T12:47:48.873",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T16:03:01.293",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows a unauthenticated network-based attacker to cause an infinite loop, resulting in a Denial of Service (DoS).\n\nAn attacker who sends malformed TCP traffic via an interface configured with PPPoE, causes an infinite loop on the respective PFE. This results in consuming all resources and a manual restart is needed to recover.\n\nThis issue affects interfaces with PPPoE configured and tcp-mss enabled.\n\nThis issue affects Juniper Networks Junos OS\n\n\n\n * All versions prior to 20.4R3-S7;\n * 21.1 version 21.1R1 and later versions;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S3;\n * 22.1 versions prior to 22.1R3-S4;\n * 22.2 versions prior to 22.2R3;\n * 22.3 versions prior to 22.3R2-S2;\n * 22.4 versions prior to 22.4R2;\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una verificaci\u00f3n inadecuada de la vulnerabilidad de condiciones inusuales o excepcionales en Packet Forwarding Engine (pfe) de Juniper Networks Junos OS en la serie MX permite que un atacante basado en red no autenticado provoque un bucle infinito, lo que resulta en una Denegaci\u00f3n de Servicio (DoS). Un atacante que env\u00eda tr\u00e1fico TCP con formato incorrecto a trav\u00e9s de una interfaz configurada con PPPoE provoca un bucle infinito en el PFE respectivo. Esto da como resultado el consumo de todos los recursos y es necesario un reinicio manual para recuperarse. Este problema afecta a las interfaces con PPPoE configurado y tcp-mss habilitado. Este problema afecta a Juniper Networks Junos OS * Todas las versiones anteriores a 20.4R3-S7; * 21.1 versi\u00f3n 21.1R1 y versiones posteriores; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S3; * Versiones 22.1 anteriores a 22.1R3-S4; * Versiones 22.2 anteriores a 22.2R3; * Versiones 22.3 anteriores a 22.3R2-S2; * Versiones 22.4 anteriores a 22.4R2;"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,446 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73172",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36843.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36843.json
index e86fb801143..9e11e63c086 100644
--- a/CVE-2023/CVE-2023-368xx/CVE-2023-36843.json
+++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36843.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-36843",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-12T23:15:11.053",
- "lastModified": "2023-10-13T12:47:48.873",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T15:58:59.760",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Handling of Inconsistent Special Elements vulnerability in the Junos Services Framework (jsf) module of Juniper Networks Junos OS allows an unauthenticated network based attacker to cause a crash in the Packet Forwarding Engine (pfe) and thereby resulting in a Denial of Service (DoS).\n\nUpon receiving malformed SSL traffic, the PFE crashes. A manual restart will be needed to recover the device.\n\nThis issue only affects devices with Juniper Networks Advanced Threat Prevention (ATP) Cloud enabled with Encrypted Traffic Insights (configured via \u2018security-metadata-streaming policy\u2019).\n\nThis issue affects Juniper Networks Junos OS:\n\n\n\n * All versions prior to 20.4R3-S8, 20.4R3-S9;\n * 21.1 version 21.1R1 and later versions;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S5;\n * 22.1 versions prior to 22.1R3-S4;\n * 22.2 versions prior to 22.2R3-S2;\n * 22.3 versions prior to 22.3R2-S2, 22.3R3;\n * 22.4 versions prior to 22.4R2-S1, 22.4R3;\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de manejo inadecuado de elementos especiales inconsistentes en el m\u00f3dulo Junos Services Framework (jsf) de Juniper Networks Junos OS permite que un atacante basado en red no autenticado cause una falla en Packet Forwarding Engine (pfe) y, por lo tanto, resulte en una Denegaci\u00f3n de Servicio (DoS). ). Al recibir tr\u00e1fico SSL con formato incorrecto, el PFE falla. Ser\u00e1 necesario un reinicio manual para recuperar el dispositivo. Este problema solo afecta a los dispositivos con Juniper Networks Advanced Threat Prevention (ATP) Cloud habilitado con Encrypted Traffic Insights (configurado a trav\u00e9s de la 'pol\u00edtica de transmisi\u00f3n de metadatos de seguridad'). Este problema afecta a Juniper Networks Junos OS: * Todas las versiones anteriores a 20.4R3-S8, 20.4R3-S9; * 21.1 versi\u00f3n 21.1R1 y versiones posteriores; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S5; * Versiones 22.1 anteriores a 22.1R3-S4; * Versiones 22.2 anteriores a 22.2R3-S2; * Versiones 22.3 anteriores a 22.3R2-S2, 22.3R3; * Versiones 22.4 anteriores a 22.4R2-S1, 22.4R3;"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,481 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s9:*:*:*:*:*:*",
+ "matchCriteriaId": "0CED6FFE-1854-4BB0-8DB5-D2D756E68CAC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "7E5688D6-DCA4-4550-9CD1-A3D792252129"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73174",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36857.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36857.json
new file mode 100644
index 00000000000..f8f385a5f04
--- /dev/null
+++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36857.json
@@ -0,0 +1,122 @@
+{
+ "id": "CVE-2023-36857",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T00:15:16.203",
+ "lastModified": "2023-10-25T14:28:53.610",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\nBaker Hughes \u2013 Bently Nevada 3500 System TDI Firmware version 5.05\n\n contains\u00a0a replay vulnerability which could allow an attacker to \n\n\n\nreplay older captured packets of traffic to the device to gain access.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Baker Hughes en Bently Nevada 3500 System TDI Firmware versi\u00f3n 5.05 contiene una vulnerabilidad de reproducci\u00f3n que podr\u00eda permitir a un atacante reproducir paquetes de tr\u00e1fico capturados m\u00e1s antiguos en el dispositivo para obtener acceso."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-294"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-294"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:bakerhughes:bentley_nevada_3500_system_firmware:5.0.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9329A00C-D768-442F-9CDE-0027886D9F3E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:bakerhughes:bentley_nevada_3500_system:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDE17D85-8ABE-45B6-9FFB-66B74CCFF1CD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-269-05",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36947.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36947.json
index 2623aed6126..9a45bbc2967 100644
--- a/CVE-2023/CVE-2023-369xx/CVE-2023-36947.json
+++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36947.json
@@ -2,19 +2,118 @@
"id": "CVE-2023-36947",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T05:15:49.740",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:10:15.513",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the File parameter in the function UploadCustomModule."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0u.6118_B20201102 y TOTOLINK A7000R V9.1.0u.6115_B20201022 conten\u00edan un desbordamiento de pila a trav\u00e9s del par\u00e1metro File en la funci\u00f3n UploadCustomModule."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AFCC3B52-0985-4F61-BBCC-16A271E15CD4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A5BB152D-5E33-4158-BFFD-68AED6A174E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "603DA206-05D4-48FD-A506-F3BD8B4383B2"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/UploadCustomModule.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36950.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36950.json
index faeb67f7b64..410360c0ab4 100644
--- a/CVE-2023/CVE-2023-369xx/CVE-2023-36950.json
+++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36950.json
@@ -2,19 +2,118 @@
"id": "CVE-2023-36950",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T06:15:10.253",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:10:37.533",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the http_host parameter in the function loginAuth."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0u.6118_B20201102 y TOTOLINK A7000R V9.1.0u.6115_B20201022 conten\u00edan un desbordamiento de pila a trav\u00e9s del par\u00e1metro http_host en la funci\u00f3n loginAuth."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AFCC3B52-0985-4F61-BBCC-16A271E15CD4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A5BB152D-5E33-4158-BFFD-68AED6A174E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "603DA206-05D4-48FD-A506-F3BD8B4383B2"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/loginauth.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36952.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36952.json
index 652fd165ec3..18d01fac648 100644
--- a/CVE-2023/CVE-2023-369xx/CVE-2023-36952.json
+++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36952.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-36952",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T05:15:49.787",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:10:31.540",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK CP300+ V5.2cu.7594_B20200910 was discovered to contain a stack overflow via the pingIp parameter in the function setDiagnosisCfg."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK CP300+ V5.2cu.7594_B20200910 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro pingIp en la funci\u00f3n setDiagnosisCfg."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:cp300\\+_firmware:5.2cu.7594_b20200910:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD24E6CF-29AF-4828-8219-9EB5A54D62F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:cp300\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B07884CE-EB34-46ED-9361-F0228D3EB758"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_1.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36953.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36953.json
index 24c0968f472..ed8714d544e 100644
--- a/CVE-2023/CVE-2023-369xx/CVE-2023-36953.json
+++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36953.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-36953",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T06:15:10.713",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:10:43.373",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK CP300+ V5.2cu.7594_B20200910 and before is vulnerable to command injection."
+ },
+ {
+ "lang": "es",
+ "value": "TOTOLINK CP300+ V5.2cu.7594_B20200910 y anteriores son vulnerables a la inyecci\u00f3n de comandos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-77"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:cp300\\+_firmware:5.2cu.7594_b20200910:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD24E6CF-29AF-4828-8219-9EB5A54D62F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:cp300\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B07884CE-EB34-46ED-9361-F0228D3EB758"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_2.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36954.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36954.json
index ad2c160dbc7..223dfe9f9ab 100644
--- a/CVE-2023/CVE-2023-369xx/CVE-2023-36954.json
+++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36954.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-36954",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T06:15:10.937",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:10:49.327",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK CP300+ V5.2cu.7594_B20200910 and before is vulnerable to command injection."
+ },
+ {
+ "lang": "es",
+ "value": "TOTOLINK CP300+ V5.2cu.7594_B20200910 y anteriores son vulnerables a la inyecci\u00f3n de comandos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-77"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:cp300\\+_firmware:5.2cu.7594_b20200910:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD24E6CF-29AF-4828-8219-9EB5A54D62F2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:cp300\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B07884CE-EB34-46ED-9361-F0228D3EB758"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_3.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36955.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36955.json
index 0a8715dbe23..1d88d8bb15d 100644
--- a/CVE-2023/CVE-2023-369xx/CVE-2023-36955.json
+++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36955.json
@@ -2,19 +2,92 @@
"id": "CVE-2023-36955",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T06:15:11.217",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:11:05.543",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK CP300+ <=V5.2cu.7594_B20200910 was discovered to contain a stack overflow via the File parameter in the function UploadCustomModule."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK CP300+ en versiones <=V5.2cu.7594_B20200910 conten\u00eda un desbordamiento de pila a trav\u00e9s del par\u00e1metro File en la funci\u00f3n UploadCustomModule."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:cp300\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "5.2cu.7594_b20200910",
+ "matchCriteriaId": "41D56968-7E76-458C-A545-BA7425C63D86"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:cp300\\+:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B07884CE-EB34-46ED-9361-F0228D3EB758"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_4.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3609.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3609.json
index 299427a7749..7bb30eb8b79 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3609.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3609.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3609",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-07-21T21:15:11.743",
- "lastModified": "2023-10-11T19:15:10.437",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-26T18:15:13.193",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -123,12 +123,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc",
@@ -146,13 +170,27 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20230818-0005/",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3611.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3611.json
index 2f0d5fd5eda..6e86484d7b6 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3611.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3611.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3611",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-07-21T21:15:11.897",
- "lastModified": "2023-09-10T12:15:45.677",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:28:57.463",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -98,6 +98,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -118,17 +143,34 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://security.netapp.com/advisory/ntap-20230908-0002/",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3635.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3635.json
index 72cb606614f..97313ca6025 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3635.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3635.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3635",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2023-07-12T19:15:08.983",
- "lastModified": "2023-07-26T16:24:46.917",
+ "lastModified": "2023-10-25T15:17:42.170",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -90,8 +90,16 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squareup:okio:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "0.5.0",
+ "versionEndExcluding": "1.17.6",
+ "matchCriteriaId": "03403B65-FE42-46FB-B8DA-2AAFAD29C5F4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:squareup:okio:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
"versionEndExcluding": "3.4.0",
- "matchCriteriaId": "BA7992EF-23C5-476A-854B-562FE1C3742A"
+ "matchCriteriaId": "CC8A3FE6-BD81-4D3D-9568-E364F5D35668"
}
]
}
diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37283.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37283.json
new file mode 100644
index 00000000000..c554a3675a1
--- /dev/null
+++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37283.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-37283",
+ "sourceIdentifier": "responsible-disclosure@pingidentity.com",
+ "published": "2023-10-25T18:17:28.270",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Under a very specific and highly unrecommended configuration, authentication bypass is possible in the PingFederate Identifier First Adapter\n"
+ },
+ {
+ "lang": "es",
+ "value": "Bajo una configuraci\u00f3n muy espec\u00edfica y altamente no recomendada, la omisi\u00f3n de autenticaci\u00f3n es posible en PingFederate Identifier First Adapter"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "responsible-disclosure@pingidentity.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "responsible-disclosure@pingidentity.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://docs.pingidentity.com/r/en-us/pingfederate-113/gyk1689105783244",
+ "source": "responsible-disclosure@pingidentity.com"
+ },
+ {
+ "url": "https://www.pingidentity.com/en/resources/downloads/pingfederate.html",
+ "source": "responsible-disclosure@pingidentity.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37502.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37502.json
new file mode 100644
index 00000000000..68b49fa5851
--- /dev/null
+++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37502.json
@@ -0,0 +1,113 @@
+{
+ "id": "CVE-2023-37502",
+ "sourceIdentifier": "psirt@hcl.com",
+ "published": "2023-10-18T23:15:08.230",
+ "lastModified": "2023-10-25T10:32:58.407",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "HCL Compass is vulnerable to lack of file upload security. \u00a0An attacker could upload files containing active code that can be executed by the server or by a user's web browser.\n"
+ },
+ {
+ "lang": "es",
+ "value": "HCL Compass es vulnerable a la falta de seguridad en la carga de archivos. Un atacante podr\u00eda cargar archivos que contengan c\u00f3digo activo que pueda ser ejecutado por el servidor o por el navegador web de un usuario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@hcl.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:hcl_compass:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndIncluding": "2.0.3",
+ "matchCriteriaId": "165427EA-5DFF-4A41-B983-4729032F0B61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:hcl_compass:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.2.0",
+ "versionEndExcluding": "2.2.3",
+ "matchCriteriaId": "E6F50039-8D68-43FC-B45C-8FF9187A8244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:hcl_compass:2.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC1BF706-4767-4FEB-81A5-E498DEDAC90C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107510",
+ "source": "psirt@hcl.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37503.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37503.json
new file mode 100644
index 00000000000..4c9c1d4afd1
--- /dev/null
+++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37503.json
@@ -0,0 +1,113 @@
+{
+ "id": "CVE-2023-37503",
+ "sourceIdentifier": "psirt@hcl.com",
+ "published": "2023-10-19T03:15:08.163",
+ "lastModified": "2023-10-25T10:14:41.613",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "HCL Compass is vulnerable to insecure password requirements. An attacker could easily guess the password and gain access to user accounts.\n"
+ },
+ {
+ "lang": "es",
+ "value": "HCL Compass es vulnerable a requisitos de contrase\u00f1a inseguros. Un atacante podr\u00eda adivinar f\u00e1cilmente la contrase\u00f1a y obtener acceso a las cuentas de usuario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@hcl.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-521"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:hcl_compass:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndIncluding": "2.0.3",
+ "matchCriteriaId": "165427EA-5DFF-4A41-B983-4729032F0B61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:hcl_compass:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.2.0",
+ "versionEndExcluding": "2.2.3",
+ "matchCriteriaId": "E6F50039-8D68-43FC-B45C-8FF9187A8244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:hcl_compass:2.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC1BF706-4767-4FEB-81A5-E498DEDAC90C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107512",
+ "source": "psirt@hcl.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37504.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37504.json
new file mode 100644
index 00000000000..1db4cdabd2d
--- /dev/null
+++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37504.json
@@ -0,0 +1,113 @@
+{
+ "id": "CVE-2023-37504",
+ "sourceIdentifier": "psirt@hcl.com",
+ "published": "2023-10-19T01:15:08.117",
+ "lastModified": "2023-10-25T10:15:03.807",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "HCL Compass is vulnerable to failure to invalidate sessions. The application does not invalidate authenticated sessions when the log out functionality is called. \u00a0If the session identifier can be discovered, it could be replayed to the application and used to impersonate the user.\n"
+ },
+ {
+ "lang": "es",
+ "value": "HCL Compass es vulnerable a no invalidar las sesiones. La aplicaci\u00f3n no invalida las sesiones autenticadas cuando se llama a la funci\u00f3n de cierre de sesi\u00f3n. Si se puede descubrir el identificador de sesi\u00f3n, podr\u00eda reproducirse en la aplicaci\u00f3n y usarse para hacerse pasar por el usuario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ },
+ {
+ "source": "psirt@hcl.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-613"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:hcl_compass:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndIncluding": "2.0.3",
+ "matchCriteriaId": "165427EA-5DFF-4A41-B983-4729032F0B61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:hcl_compass:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.2.0",
+ "versionEndExcluding": "2.2.3",
+ "matchCriteriaId": "E6F50039-8D68-43FC-B45C-8FF9187A8244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:hcl_compass:2.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC1BF706-4767-4FEB-81A5-E498DEDAC90C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107511",
+ "source": "psirt@hcl.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37532.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37532.json
new file mode 100644
index 00000000000..1fa7b450e2e
--- /dev/null
+++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37532.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-37532",
+ "sourceIdentifier": "psirt@hcl.com",
+ "published": "2023-10-23T17:15:08.450",
+ "lastModified": "2023-10-23T18:18:33.750",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "HCL Commerce Remote Store server could allow a remote attacker, using a specially-crafted URL, to read arbitrary files on the system.\n"
+ },
+ {
+ "lang": "es",
+ "value": "El servidor HCL Commerce Remote Store podr\u00eda permitir que un atacante remoto, utilizando una URL especialmente manipulada, lea archivos arbitrarios en el system."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@hcl.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108094",
+ "source": "psirt@hcl.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37536.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37536.json
index eda592c58b8..af94af745cc 100644
--- a/CVE-2023/CVE-2023-375xx/CVE-2023-37536.json
+++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37536.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-37536",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-10-11T07:15:10.580",
- "lastModified": "2023-10-11T12:54:12.883",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T04:15:11.837",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "psirt@hcl.com",
"type": "Secondary",
@@ -38,10 +58,60 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:xerces-c\\+\\+:3.2.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D12DE323-B495-4294-B491-D18A2134D3E3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:bigfix_platform:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.0.0",
+ "versionEndExcluding": "9.5.23",
+ "matchCriteriaId": "C944AE77-DEF5-4AF7-A900-F82CB023F5FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:bigfix_platform:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0.0",
+ "versionEndExcluding": "10.0.10",
+ "matchCriteriaId": "5D9C29D2-7B7C-4040-9451-BAB1FB5E4D28"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
- "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107791",
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAOSSJ72CUJ535VRWTCVQKUYT2LYR3OM/",
"source": "psirt@hcl.com"
+ },
+ {
+ "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107791",
+ "source": "psirt@hcl.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37537.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37537.json
new file mode 100644
index 00000000000..adad2248216
--- /dev/null
+++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37537.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-37537",
+ "sourceIdentifier": "psirt@hcl.com",
+ "published": "2023-10-17T15:15:10.953",
+ "lastModified": "2023-10-24T20:39:25.043",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An unquoted service path vulnerability in HCL AppScan Presence, deployed as a Windows service in HCL AppScan on Cloud (ASoC), may allow a local attacker to gain elevated privileges. \n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de ruta de servicio no citada en HCL AppScan Presence, implementada como un servicio de Windows en HCL AppScan on Cloud (ASoC), puede permitir que un atacante local obtenga privilegios elevados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "psirt@hcl.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-428"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:appscan_presence:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.1.37",
+ "matchCriteriaId": "0A9D8BFA-DD07-4B30-88DE-C3576BBBEDBB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108018",
+ "source": "psirt@hcl.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37538.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37538.json
index adf86194db8..0fcca8456f1 100644
--- a/CVE-2023/CVE-2023-375xx/CVE-2023-37538.json
+++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37538.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-37538",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-10-11T13:15:09.557",
- "lastModified": "2023-10-11T14:23:06.207",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T16:40:26.580",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "HCL Digital Experience is susceptible to cross site scripting (XSS). One subcomponent is vulnerable to reflected XSS. In reflected XSS, an attacker must induce a victim to click on a crafted URL from some delivery mechanism (email, other web site).\n"
+ },
+ {
+ "lang": "es",
+ "value": "HCL Digital Experience es susceptible a Cross-Site Scripting (XSS). Un subcomponente es vulnerable al XSS reflejado. En XSS reflejado, un atacante debe inducir a la v\u00edctima a hacer click en una URL manipulada desde alg\u00fan mecanismo de entrega (correo electr\u00f3nico, otro sitio web)."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "psirt@hcl.com",
"type": "Secondary",
@@ -34,10 +58,53 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:digital_experience:8.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C66F09E2-2B02-4968-AEE7-7AC61F49E770"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:digital_experience:9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "48F32E9E-34AA-4009-AE1E-593D37CAD690"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hcltech:digital_experience:9.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E62500C2-18E4-437C-952C-5012C52B2888"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108006",
- "source": "psirt@hcl.com"
+ "source": "psirt@hcl.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-376xx/CVE-2023-37635.json b/CVE-2023/CVE-2023-376xx/CVE-2023-37635.json
new file mode 100644
index 00000000000..42acd19711b
--- /dev/null
+++ b/CVE-2023/CVE-2023-376xx/CVE-2023-37635.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-37635",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T21:15:08.757",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "UVDesk Community Skeleton v1.1.1 allows unauthenticated attackers to perform brute force attacks on the login page to gain access to the application."
+ },
+ {
+ "lang": "es",
+ "value": "UVDesk Community Skeleton v1.1.1 permite a atacantes no autenticados realizar ataques de fuerza bruta en la p\u00e1gina de inicio de sesi\u00f3n para obtener acceso a la aplicaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.esecforte.com/cve-2023-37635-login-bruteforce/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-376xx/CVE-2023-37636.json b/CVE-2023/CVE-2023-376xx/CVE-2023-37636.json
new file mode 100644
index 00000000000..b4274b51483
--- /dev/null
+++ b/CVE-2023/CVE-2023-376xx/CVE-2023-37636.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-37636",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T21:15:08.800",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A stored cross-site scripting (XSS) vulnerability in UVDesk Community Skeleton v1.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Message field when creating a ticket."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) almacenada en UVDesk Community Skeleton v1.1.1 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado que se inyecta en el campo Mensaje al crear un ticket."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.esecforte.com/cve-2023-37636-stored-cross-site-scripting/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37744.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37744.json
index dc60ea3ea21..52e25e55b70 100644
--- a/CVE-2023/CVE-2023-377xx/CVE-2023-37744.json
+++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37744.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-37744",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-13T16:15:09.163",
- "lastModified": "2023-07-21T15:09:47.617",
+ "lastModified": "2023-10-18T15:32:55.333",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:maid_hiring_management_system_project:maid_hiring_management_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "DDE79296-E232-4F02-AF0D-9EB087E31689"
+ "criteria": "cpe:2.3:a:anujkumar:maid_hiring_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C81E4116-3C7C-4A40-A247-E9ADCE473738"
}
]
}
diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37745.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37745.json
index 8b7bae49ce1..85d0389fe18 100644
--- a/CVE-2023/CVE-2023-377xx/CVE-2023-37745.json
+++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37745.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-37745",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-13T16:15:09.217",
- "lastModified": "2023-07-21T14:48:36.520",
+ "lastModified": "2023-10-18T15:17:12.303",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:maid_hiring_management_system_project:maid_hiring_management_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "DDE79296-E232-4F02-AF0D-9EB087E31689"
+ "criteria": "cpe:2.3:a:anujkumar:maid_hiring_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C81E4116-3C7C-4A40-A247-E9ADCE473738"
}
]
}
diff --git a/CVE-2023/CVE-2023-377xx/CVE-2023-37746.json b/CVE-2023/CVE-2023-377xx/CVE-2023-37746.json
index 920e8039c5a..8ec867b2675 100644
--- a/CVE-2023/CVE-2023-377xx/CVE-2023-37746.json
+++ b/CVE-2023/CVE-2023-377xx/CVE-2023-37746.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-37746",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-13T17:15:09.340",
- "lastModified": "2023-07-21T15:03:32.790",
+ "lastModified": "2023-10-18T15:19:56.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -59,8 +59,8 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:maid_hiring_management_system_project:maid_hiring_management_system:1.0:*:*:*:*:*:*:*",
- "matchCriteriaId": "DDE79296-E232-4F02-AF0D-9EB087E31689"
+ "criteria": "cpe:2.3:a:anujkumar:maid_hiring_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C81E4116-3C7C-4A40-A247-E9ADCE473738"
}
]
}
diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37824.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37824.json
new file mode 100644
index 00000000000..3a5bb4f8cc3
--- /dev/null
+++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37824.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-37824",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T20:15:09.367",
+ "lastModified": "2023-10-28T03:47:39.197",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sitolog sitologapplicationconnect v7.8.a and before was discovered to contain a SQL injection vulnerability via the component /activate_hook.php."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Sitolog sitologapplicationconnect v7.8.a y anteriores conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente /activate_hook.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@mitre.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:sitolog:sitolog_application_connect:*:*:*:*:*:prestashop:*:*",
+ "versionEndIncluding": "7.8.a",
+ "matchCriteriaId": "5D31D88F-9B95-4C22-BCF5-C6785E3A40EE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://security.friendsofpresta.org/modules/2023/10/11/sitologapplicationconnect.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37908.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37908.json
new file mode 100644
index 00000000000..c3ba890bd17
--- /dev/null
+++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37908.json
@@ -0,0 +1,71 @@
+{
+ "id": "CVE-2023-37908",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:28.333",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. The cleaning of attributes during XHTML rendering, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid attribute names. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki. When a user moves the mouse over a malicious link, the malicious JavaScript code is executed in the context of the user session. When this user is a privileged user who has programming rights, this allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. While this attribute was correctly recognized as not allowed, the attribute was still printed with a prefix `data-xwiki-translated-attribute-` without further cleaning or validation. This problem has been patched in XWiki 14.10.4 and 15.0 RC1 by removing characters not allowed in data attributes and then validating the cleaned attribute again. There are no known workarounds apart from upgrading to a version including the fix."
+ },
+ {
+ "lang": "es",
+ "value": "XWiki Rendering es un sistema de renderizado gen\u00e9rico que convierte la entrada de texto en una sintaxis determinada en otra sintaxis. La limpieza de atributos durante la representaci\u00f3n XHTML, introducida en la versi\u00f3n 14.6-rc-1, permiti\u00f3 la inyecci\u00f3n de c\u00f3digo HTML arbitrario y, por lo tanto, Cross-Site Scripting (XSS) a trav\u00e9s de nombres de atributos no v\u00e1lidos. Esto se puede explotar, por ejemplo, a trav\u00e9s de la sintaxis de enlace en cualquier contenido que admita la sintaxis XWiki, como comentarios en XWiki. Cuando un usuario mueve el mouse sobre un enlace malicioso, el c\u00f3digo JavaScript malicioso se ejecuta en el contexto de la sesi\u00f3n del usuario. Cuando este usuario es un usuario privilegiado que tiene derechos de programaci\u00f3n, esto permite la ejecuci\u00f3n de c\u00f3digo del lado del servidor con derechos de programaci\u00f3n, lo que afecta la confidencialidad, integridad y disponibilidad de la instancia de XWiki. Si bien este atributo se reconoci\u00f3 correctamente como no permitido, a\u00fan as\u00ed se imprimi\u00f3 con un prefijo `data-xwiki-translated-attribute-` sin m\u00e1s limpieza o validaci\u00f3n. Este problema se solucion\u00f3 en XWiki 14.10.4 y 15.0 RC1 eliminando caracteres no permitidos en los atributos de datos y luego validando el atributo limpio nuevamente. No se conocen workarounds aparte de actualizar a una versi\u00f3n que incluya la soluci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-83"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/xwiki/xwiki-rendering/commit/f4d5acac451dccaf276e69f0b49b72221eef5d2f",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-663w-2xp3-5739",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-6gf5-c898-7rxp",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XRENDERING-697",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37909.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37909.json
new file mode 100644
index 00000000000..c4e082df474
--- /dev/null
+++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37909.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-37909",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:28.407",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 5.1-rc-1 and prior to versions 14.10.8 and 15.3-rc-1, any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This has been patched in XWiki 14.10.8 and 15.3-rc-1 by adding proper escaping. As a workaround, the patch can be manually applied to the document `Menu.UIExtensionSheet`; only three lines need to be changed."
+ },
+ {
+ "lang": "es",
+ "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. A partir de la versi\u00f3n 5.1-rc-1 y antes de las versiones 14.10.8 y 15.3-rc-1, cualquier usuario que pueda editar su propio perfil de usuario puede ejecutar macros de script arbitrarias, incluidas macros Groovy y Python, que permiten la ejecuci\u00f3n remota de c\u00f3digo, incluida la lectura y visualizaci\u00f3n sin restricciones. acceso de escritura a todos los contenidos de la wiki. Esto se ha parcheado en XWiki 14.10.8 y 15.3-rc-1 agregando un escape adecuado. Como workaround, el parche se puede aplicar manualmente al documento `Menu.UIExtensionSheet`; s\u00f3lo es necesario cambiar tres l\u00edneas."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.9,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-95"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/commit/9e8f080094333dec63a8583229a3799208d773be",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v2rr-xw95-wcjx",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XWIKI-20746",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37910.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37910.json
new file mode 100644
index 00000000000..cdcb5cad3eb
--- /dev/null
+++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37910.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-37910",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:28.477",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with the introduction of attachment move support in version 14.0-rc-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, an attacker with edit access on any document (can be the user profile which is editable by default) can move any attachment of any other document to this attacker-controlled document. This allows the attacker to access and possibly publish any attachment of which the name is known, regardless if the attacker has view or edit rights on the source document of this attachment. Further, the attachment is deleted from the source document. This vulnerability has been patched in XWiki 14.4.8, 14.10.4, and 15.0 RC1. There is no workaround apart from upgrading to a fixed version."
+ },
+ {
+ "lang": "es",
+ "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. A partir de la introducci\u00f3n de la compatibilidad con el movimiento de archivos adjuntos en la versi\u00f3n 14.0-rc-1 y antes de las versiones 14.4.8, 14.10.4 y 15.0-rc-1, un atacante con acceso de edici\u00f3n a cualquier documento (puede ser el perfil de usuario que est\u00e1 editable de forma predeterminada) puede mover cualquier archivo adjunto de cualquier otro documento a este documento controlado por el atacante. Esto permite al atacante acceder y posiblemente publicar cualquier archivo adjunto cuyo nombre se conozca, independientemente de si el atacante tiene derechos de visualizaci\u00f3n o edici\u00f3n sobre el documento fuente de este archivo adjunto. Adem\u00e1s, el archivo adjunto se elimina del documento fuente. Esta vulnerabilidad ha sido parcheada en XWiki 14.4.8, 14.10.4 y 15.0 RC1. No existe otro workaround aparte de actualizar a una versi\u00f3n fija."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/commit/d7720219d60d7201c696c3196c9d4a86d0881325",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rwwx-6572-mp29",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XWIKI-20334",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37911.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37911.json
new file mode 100644
index 00000000000..bce541651c7
--- /dev/null
+++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37911.json
@@ -0,0 +1,79 @@
+{
+ "id": "CVE-2023-37911",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:28.543",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 9.4-rc-1 and prior to versions 14.10.8 and 15.3-rc-1, when a document has been deleted and re-created, it is possible for users with view right on the re-created document but not on the deleted document to view the contents of the deleted document. Such a situation might arise when rights were added to the deleted document. This can be exploited through the diff feature and, partially, through the REST API by using versions such as `deleted:1` (where the number counts the deletions in the wiki and is thus guessable). Given sufficient rights, the attacker can also re-create the deleted document, thus extending the scope to any deleted document as long as the attacker has edit right in the location of the deleted document. This vulnerability has been patched in XWiki 14.10.8 and 15.3 RC1 by properly checking rights when deleted revisions of a document are accessed. The only workaround is to regularly clean deleted documents to minimize the potential exposure. Extra care should be taken when deleting sensitive documents that are protected individually (and not, e.g., by being placed in a protected space) or deleting a protected space as a whole."
+ },
+ {
+ "lang": "es",
+ "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. A partir de la versi\u00f3n 9.4-rc-1 y anteriores a las versiones 14.10.8 y 15.3-rc-1, cuando un documento se elimina y se vuelve a crear, es posible que los usuarios con derecho de visualizaci\u00f3n en el documento recreado pero no en el documento eliminado para ver el contenido del documento eliminado. Esta situaci\u00f3n podr\u00eda surgir cuando se agregaron derechos al documento eliminado. Esto se puede explotar a trav\u00e9s de la funci\u00f3n de diferenciaci\u00f3n y, parcialmente, a trav\u00e9s de la API REST mediante el uso de versiones como `deleted:1` (donde el n\u00famero cuenta las eliminaciones en la wiki y, por lo tanto, se puede adivinar). Con derechos suficientes, el atacante tambi\u00e9n puede volver a crear el documento eliminado, ampliando as\u00ed el alcance a cualquier documento eliminado siempre que el atacante tenga derecho de edici\u00f3n en la ubicaci\u00f3n del documento eliminado. Esta vulnerabilidad se ha solucionado en XWiki 14.10.8 y 15.3 RC1 comprobando correctamente los derechos cuando se accede a revisiones eliminadas de un documento. El \u00fanico workaround es limpiar peri\u00f3dicamente los documentos eliminados para minimizar la posible exposici\u00f3n. Se debe tener especial cuidado al eliminar documentos confidenciales que est\u00e1n protegidos individualmente (y no, por ejemplo, al colocarlos en un espacio protegido) o al eliminar un espacio protegido en su totalidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-668"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://extensions.xwiki.org/xwiki/bin/view/Extension/Index%20Application#HPermanentlydeleteallpages",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/commit/f471f2a392aeeb9e51d59fdfe1d76fccf532523f",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gh64-qxh5-4m33",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XWIKI-20684",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XWIKI-20685",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XWIKI-20817",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37912.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37912.json
new file mode 100644
index 00000000000..934a99c9b5e
--- /dev/null
+++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37912.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-37912",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:28.613",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. Prior to version 14.10.6 of `org.xwiki.platform:xwiki-core-rendering-macro-footnotes` and `org.xwiki.platform:xwiki-rendering-macro-footnotes` and prior to version 15.1-rc-1 of `org.xwiki.platform:xwiki-rendering-macro-footnotes`, the footnote macro executed its content in a potentially different context than the one in which it was defined. In particular in combination with the include macro, this allows privilege escalation from a simple user account in XWiki to programming rights and thus remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.6 and 15.1-rc-1. There is no workaround apart from upgrading to a fixed version of the footnote macro."
+ },
+ {
+ "lang": "es",
+ "value": "XWiki Rendering es un sistema de renderizado gen\u00e9rico que convierte la entrada de texto en una sintaxis determinada en otra sintaxis. Antes de la versi\u00f3n 14.10.6 de `org.xwiki.platform:xwiki-core-rendering-macro-footnotes` y `org.xwiki.platform:xwiki-rendering-macro-footnotes` y antes de la versi\u00f3n 15.1-rc-1 de `org.xwiki.platform:xwiki-rendering-macro-footnotes`, la macro de nota al pie ejecut\u00f3 su contenido en un contexto potencialmente diferente a aquel en el que se defini\u00f3. En particular, en combinaci\u00f3n con la macro de inclusi\u00f3n, esto permite escalar privilegios desde una simple cuenta de usuario en XWiki hasta derechos de programaci\u00f3n y, por lo tanto, ejecuci\u00f3n remota de c\u00f3digo, lo que afecta la confidencialidad, integridad y disponibilidad de toda la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.6 y 15.1-rc-1. No existe otro workaround aparte de actualizar a una versi\u00f3n fija de la macro de notas al pie."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.9,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-270"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/xwiki/xwiki-rendering/commit/5f558b8fac8b716d19999225f38cb8ed0814116e",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-rendering/security/advisories/GHSA-35j5-m29r-xfq5",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XRENDERING-688",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37913.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37913.json
new file mode 100644
index 00000000000..1a0512136c4
--- /dev/null
+++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37913.json
@@ -0,0 +1,71 @@
+{
+ "id": "CVE-2023-37913",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:28.687",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 3.5-milestone-1 and prior to versions 14.10.8 and 15.3-rc-1, triggering the office converter with a specially crafted file name allows writing the attachment's content to an attacker-controlled location on the server as long as the Java process has write access to that location. In particular in the combination with attachment moving, a feature introduced in XWiki 14.0, this is easy to reproduce but it also possible to reproduce in versions as old as XWiki 3.5 by uploading the attachment through the REST API which doesn't remove `/` or `\\` from the filename. As the mime type of the attachment doesn't matter for the exploitation, this could e.g., be used to replace the `jar`-file of an extension which would allow executing arbitrary Java code and thus impact the confidentiality, integrity and availability of the XWiki installation. This vulnerability has been patched in XWiki 14.10.8 and 15.3RC1. There are no known workarounds apart from disabling the office converter."
+ },
+ {
+ "lang": "es",
+ "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. A partir de la versi\u00f3n 3.5-milestone-1 y antes de las versiones 14.10.8 y 15.3-rc-1, activar el convertidor de Office con un nombre de archivo especialmente manipulado permite escribir el contenido del archivo adjunto en una ubicaci\u00f3n controlada por el atacante en el servidor siempre que el proceso Java tiene acceso de escritura a esa ubicaci\u00f3n. En particular, en la combinaci\u00f3n con el movimiento de archivos adjuntos, una caracter\u00edstica introducida en XWiki 14.0, esto es f\u00e1cil de reproducir pero tambi\u00e9n es posible reproducir en versiones tan antiguas como XWiki 3.5 cargando el archivo adjunto a trav\u00e9s de la API REST que no elimina `/` o `\\` del nombre del archivo. Como el tipo mime del archivo adjunto no importa para la explotaci\u00f3n, esto podr\u00eda usarse, por ejemplo, para reemplazar el archivo `jar` por una extensi\u00f3n que permitir\u00eda ejecutar c\u00f3digo Java arbitrario y, por lo tanto, afectar\u00eda la confidencialidad, integridad y disponibilidad de la instalaci\u00f3n de XWiki. Esta vulnerabilidad ha sido parcheada en XWiki 14.10.8 y 15.3RC1. No se conocen workarounds aparte de desactivar el convertidor de Office."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.9,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-23"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/commit/45d182a4141ff22f3ff289cf71e4669bdc714544",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vcvr-v426-3m3m",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XWIKI-20715",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37988.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37988.json
index 6934b67c56f..ee4c81b1835 100644
--- a/CVE-2023/CVE-2023-379xx/CVE-2023-37988.json
+++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37988.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-37988",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-10T11:15:12.427",
- "lastModified": "2023-10-03T18:15:10.247",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:27:48.007",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -87,7 +87,12 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/174896/WordPress-Contact-Form-Generator-2.5.5-Cross-Site-Scripting.html",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://patchstack.com/database/vulnerability/contact-form-generator/wordpress-contact-form-generator-plugin-2-5-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3706.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3706.json
index 8145b2d0eae..212a025d90a 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3706.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3706.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3706",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:14.780",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T17:56:56.103",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento ActivityPub de WordPress anterior a 1.0.0 no garantiza que los t\u00edtulos de las publicaciones que se mostrar\u00e1n sean p\u00fablicos y pertenezcan al complemento, lo que permite a cualquier usuario autenticado, como un suscriptor, recuperar el t\u00edtulo de una publicaci\u00f3n arbitraria (como borrador y privada) a trav\u00e9s de un IDOR vector"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:automattic:activitypub:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.0.0",
+ "matchCriteriaId": "78ADABE4-21BE-4F20-BE6D-BB12EDBCD26F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/daa4d93a-f8b1-4809-a18e-8ab63a05de5a",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3707.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3707.json
index 0b7af6eb3bb..4dbb1272678 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3707.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3707.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3707",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:14.883",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T17:57:04.757",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento ActivityPub de WordPress anterior a 1.0.0 no garantiza que los contenidos de las publicaciones que se mostrar\u00e1n sean p\u00fablicos y pertenezcan al complemento, lo que permite a cualquier usuario autenticado, como un suscriptor, recuperar el contenido de una publicaci\u00f3n arbitraria (como borrador y privada) a trav\u00e9s de un IDOR vector. Las publicaciones protegidas con contrase\u00f1a no se ven afectadas por este problema."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:automattic:activitypub:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.0.0",
+ "matchCriteriaId": "78ADABE4-21BE-4F20-BE6D-BB12EDBCD26F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/541bbe4c-3295-4073-901d-763556269f48",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3746.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3746.json
index ff4904a2737..22038bf74df 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3746.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3746.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3746",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:15.010",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T17:57:14.660",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento ActivityPub de WordPress anterior a 1.0.0 no sanitiza ni escapa algunos datos del contenido de la publicaci\u00f3n, lo que podr\u00eda permitir que el colaborador y el rol superior realicen ataques de Cross-Site Scripting almacenados."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:automattic:activitypub:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.0.0",
+ "matchCriteriaId": "78ADABE4-21BE-4F20-BE6D-BB12EDBCD26F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/c15a6032-6495-47a8-828c-37e55ed9665a",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3772.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3772.json
index 169f83f57bd..47684b98e2b 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3772.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3772.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3772",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-25T16:15:11.660",
- "lastModified": "2023-09-10T12:15:48.350",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-29T02:43:04.247",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -116,16 +116,45 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/08/10/1",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Exploit",
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/08/10/3",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-3772",
@@ -142,9 +171,20 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5492",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3773.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3773.json
index f155023ebec..a5e44184d6b 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3773.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3773.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3773",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-25T16:15:11.733",
- "lastModified": "2023-09-10T12:15:53.767",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-29T02:43:12.200",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -116,6 +116,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -134,9 +154,20 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5492",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3776.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3776.json
index f843a3a180d..535d81c36e8 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3776.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3776.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3776",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-07-21T21:15:11.973",
- "lastModified": "2023-10-11T19:15:10.583",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-26T18:09:58.733",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -98,12 +98,41 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f",
@@ -122,13 +151,27 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3777.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3777.json
index bc68f7a6756..d8cdd4e46e7 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3777.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3777.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3777",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-09-06T14:15:10.860",
- "lastModified": "2023-10-11T19:15:10.677",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-24T15:01:41.440",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -118,12 +118,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8",
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3781.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3781.json
index 23c6b659632..90abe3b9578 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3781.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3781.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-3781",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2023-10-11T21:15:09.733",
- "lastModified": "2023-10-11T22:13:59.567",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T01:58:47.227",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "there is a possible use-after-free write due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe una posible escritura de use-after-free debido a un bloqueo inadecuado. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-667"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2023-10-01",
- "source": "dsap-vuln-management@google.com"
+ "source": "dsap-vuln-management@google.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38041.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38041.json
new file mode 100644
index 00000000000..0115d420689
--- /dev/null
+++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38041.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-38041",
+ "sourceIdentifier": "support@hackerone.com",
+ "published": "2023-10-25T18:17:28.757",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system."
+ },
+ {
+ "lang": "es",
+ "value": "Un usuario que haya iniciado sesi\u00f3n puede elevar sus permisos abusando de una condici\u00f3n de ejecuci\u00f3n de Tiempo de Check a Tiempo de Uso (TOCTOU). Cuando se inicia un flujo de proceso particular, un atacante puede aprovechar esta condici\u00f3n para obtener privilegios elevados no autorizados en el sistema afectado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV30": [
+ {
+ "source": "support@hackerone.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://forums.ivanti.com/s/article/CVE-2023-38041-New-client-side-release-to-address-a-privilege-escalation-on-Windows-user-machines?language=en_US",
+ "source": "support@hackerone.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38059.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38059.json
index 211b1996055..20aa636f482 100644
--- a/CVE-2023/CVE-2023-380xx/CVE-2023-38059.json
+++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38059.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-38059",
"sourceIdentifier": "security@otrs.com",
"published": "2023-10-16T09:15:10.243",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:42:44.373",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The loading of external images is not blocked, even if configured, if the attacker uses protocol-relative URL in the payload. This can be used to retreive the IP of the user.This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La carga de im\u00e1genes externas no se bloquea, incluso si est\u00e1 configurada, si el atacante utiliza una URL relativa al protocolo en el payload. Esto se puede utilizar para recuperar la IP del usuario. Este problema afecta a OTRS: desde 7.0.X anterior a 7.0.47, desde 8.0.X anterior a 8.0.37; ((OTRS)) Community Edition: desde la versi\u00f3n 6.0.X hasta la 6.0.34."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "security@otrs.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "security@otrs.com",
"type": "Secondary",
@@ -46,10 +80,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*",
+ "versionStartIncluding": "6.0.0",
+ "versionEndIncluding": "6.0.34",
+ "matchCriteriaId": "F933EBB8-2E51-4E24-BB9E-64FBE0FCBFDB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.0.0",
+ "versionEndExcluding": "7.0.47",
+ "matchCriteriaId": "B1C07539-E637-4A14-97EE-9FE4CB60644F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0.0",
+ "versionEndExcluding": "8.0.37",
+ "matchCriteriaId": "400DD972-B06D-44C6-BD88-737BA162B3E1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://otrs.com/release-notes/otrs-security-advisory-2023-08/",
- "source": "security@otrs.com"
+ "source": "security@otrs.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38127.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38127.json
new file mode 100644
index 00000000000..b8e5a5ad47b
--- /dev/null
+++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38127.json
@@ -0,0 +1,207 @@
+{
+ "id": "CVE-2023-38127",
+ "sourceIdentifier": "talos-cna@cisco.com",
+ "published": "2023-10-19T18:15:09.467",
+ "lastModified": "2023-10-25T14:28:34.877",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An integer overflow exists in the \"HyperLinkFrame\" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause the parser to make an under-sized allocation, which can later allow for memory corruption, potentially resulting in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe un desbordamiento de enteros en el analizador de flujo \"HyperLinkFrame\" de Ichitaro 2023 1.0.1.59372. Un documento especialmente manipulado puede hacer que el analizador realice una asignaci\u00f3n de tama\u00f1o insuficiente, lo que posteriormente puede permitir la corrupci\u00f3n de la memoria, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede proporcionar un archivo malicioso para desencadenar esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "talos-cna@cisco.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ },
+ {
+ "source": "talos-cna@cisco.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:easy_postcard_max:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D68E98B0-38CA-4148-825D-CF7C8AABB5BE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2021:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1755383C-2B74-4DD7-9C9B-DB19C12CA94D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1274E0AB-BDE0-45FB-B3A2-522E3AE4E41A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2023:1.0.1.59372:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15B1DC82-380D-4CF4-AF35-4AF2A1CBF778"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A1C403A-6787-4347-AF6F-69F225944011"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_8:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E401B098-6551-4101-9906-19C2AB7A5504"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_9:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65A56D02-7438-4319-BFD1-64FB11BC758C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "36AE4633-5418-4009-B51D-4A1F542B1A88"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "21A4F85C-EA95-4853-9A8C-C3C9142243A8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76FAE0E6-1037-45AC-A277-8F32338A50AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "552D41EF-A5DB-4ED0-B404-FF2649969B11"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F61D3C1-0011-4D78-83F8-2349D46AFE59"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC99A5A2-32B0-4F38-A2B1-FAC50A05FBEF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7814DB96-4078-47B8-93B2-5066029B6F65"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D8E2A1A-7C06-491F-8A28-BE70EFCDDFFF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD6F3523-7059-4591-9D04-97D287128D6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ED46089-ED5B-4314-B079-A8932377475E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3B6B97E-B202-4B1F-9B81-367CB7172DEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B5D80C5-5821-416E-A3E3-ADC7F221B093"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://jvn.jp/en/jp/JVN28846531/index.html",
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808",
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38128.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38128.json
new file mode 100644
index 00000000000..1a60e7585fa
--- /dev/null
+++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38128.json
@@ -0,0 +1,215 @@
+{
+ "id": "CVE-2023-38128",
+ "sourceIdentifier": "talos-cna@cisco.com",
+ "published": "2023-10-19T18:15:09.560",
+ "lastModified": "2023-10-25T14:05:11.827",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An out-of-bounds write vulnerability exists in the \"HyperLinkFrame\" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause a type confusion, which can lead to memory corruption and eventually arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de escritura fuera de l\u00edmites en el analizador de flujo \"HyperLinkFrame\" de Ichitaro 2023 1.0.1.59372. Un documento especialmente manipulado puede causar confusi\u00f3n de tipos, lo que puede provocar da\u00f1os en la memoria y, finalmente, la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede proporcionar un archivo malicioso para desencadenar esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "talos-cna@cisco.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "talos-cna@cisco.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-843"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:easy_postcard_max:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D68E98B0-38CA-4148-825D-CF7C8AABB5BE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2021:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1755383C-2B74-4DD7-9C9B-DB19C12CA94D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1274E0AB-BDE0-45FB-B3A2-522E3AE4E41A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_2023:1.0.1.59372:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15B1DC82-380D-4CF4-AF35-4AF2A1CBF778"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A1C403A-6787-4347-AF6F-69F225944011"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_8:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E401B098-6551-4101-9906-19C2AB7A5504"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_government_9:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65A56D02-7438-4319-BFD1-64FB11BC758C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "36AE4633-5418-4009-B51D-4A1F542B1A88"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "21A4F85C-EA95-4853-9A8C-C3C9142243A8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:ichitaro_pro_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76FAE0E6-1037-45AC-A277-8F32338A50AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "552D41EF-A5DB-4ED0-B404-FF2649969B11"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F61D3C1-0011-4D78-83F8-2349D46AFE59"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_government_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC99A5A2-32B0-4F38-A2B1-FAC50A05FBEF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7814DB96-4078-47B8-93B2-5066029B6F65"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D8E2A1A-7C06-491F-8A28-BE70EFCDDFFF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_office_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD6F3523-7059-4591-9D04-97D287128D6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ED46089-ED5B-4314-B079-A8932377475E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3B6B97E-B202-4B1F-9B81-367CB7172DEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justsystems:just_police_5:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6B5D80C5-5821-416E-A3E3-ADC7F221B093"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://jvn.jp/en/jp/JVN28846531/index.html",
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1809",
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1809",
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38169.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38169.json
index 7bb43768f9a..4e0f5ea3c60 100644
--- a/CVE-2023/CVE-2023-381xx/CVE-2023-38169.json
+++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38169.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-38169",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T18:15:22.267",
- "lastModified": "2023-08-10T20:40:02.710",
+ "lastModified": "2023-10-24T17:27:34.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -203,11 +203,6 @@
"criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7339F59F-31A7-4D03-B081-5C76C49F357A"
},
- {
- "vulnerable": true,
- "criteria": "cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:19.3.1:*:*:*:*:*:*:*",
- "matchCriteriaId": "7F536A7A-9E9C-4F3C-A861-B1ECEC25A00C"
- },
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sql_server:2019:*:*:*:*:*:x64:*",
diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38190.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38190.json
new file mode 100644
index 00000000000..f25f29f04d9
--- /dev/null
+++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38190.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-38190",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-21T01:15:07.907",
+ "lastModified": "2023-10-28T03:46:57.377",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Export SQL Injection via the size parameter."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en SuperWebMailer 9.00.0.01710. Permite exportar inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de tama\u00f1o."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:superwebmailer:superwebmailer:9.00.0.01710:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B48093A-AD48-46E4-9838-2CA4FBC9D5E0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://herolab.usd.de/security-advisories/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://herolab.usd.de/security-advisories/usd-2023-0014/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38191.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38191.json
new file mode 100644
index 00000000000..afeac02df61
--- /dev/null
+++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38191.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-38191",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T22:15:10.597",
+ "lastModified": "2023-10-27T21:44:41.353",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in SuperWebMailer 9.00.0.01710. It allows spamtest_external.php XSS via a crafted filename."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en SuperWebMailer 9.00.0.01710. Permite spamtest_external.php XSS a trav\u00e9s de un nombre de archivo manipulado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:superwebmailer:superwebmailer:9.00.0.01710:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B48093A-AD48-46E4-9838-2CA4FBC9D5E0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://herolab.usd.de/security-advisories/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://herolab.usd.de/security-advisories/usd-2023-0012/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38192.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38192.json
new file mode 100644
index 00000000000..56ffbe86b3a
--- /dev/null
+++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38192.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-38192",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-21T01:15:07.953",
+ "lastModified": "2023-10-28T03:46:20.463",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in SuperWebMailer 9.00.0.01710. It allows superadmincreate.php XSS via crafted incorrect passwords."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en SuperWebMailer 9.00.0.01710. Permite superadmincreate.php XSS a trav\u00e9s de contrase\u00f1as incorrectas manipuladas."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:superwebmailer:superwebmailer:9.00.0.01710:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B48093A-AD48-46E4-9838-2CA4FBC9D5E0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://herolab.usd.de/security-advisories/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://herolab.usd.de/security-advisories/usd-2023-0011/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38193.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38193.json
new file mode 100644
index 00000000000..e5fb3ac80d6
--- /dev/null
+++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38193.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-38193",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-21T01:15:08.000",
+ "lastModified": "2023-10-28T03:45:50.750",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Remote Code Execution via a crafted sendmail command line."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en SuperWebMailer 9.00.0.01710. Permite la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de una l\u00ednea de comando de sendmail manipulada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-77"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:superwebmailer:superwebmailer:9.00.0.01710:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B48093A-AD48-46E4-9838-2CA4FBC9D5E0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://herolab.usd.de/en/security-advisories/usd-2023-0015/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://herolab.usd.de/security-advisories/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38194.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38194.json
new file mode 100644
index 00000000000..013740c3ef2
--- /dev/null
+++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38194.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-38194",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-21T01:15:08.047",
+ "lastModified": "2023-10-28T03:46:10.970",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in SuperWebMailer 9.00.0.01710. It allows keepalive.php XSS via a GET parameter."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en SuperWebMailer 9.00.0.01710. Permite keepalive.php XSS a trav\u00e9s de un par\u00e1metro GET."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:superwebmailer:superwebmailer:9.00.0.01710:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B48093A-AD48-46E4-9838-2CA4FBC9D5E0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://herolab.usd.de/security-advisories/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://herolab.usd.de/security-advisories/usd-2023-0013/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38218.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38218.json
index 90933a978b6..c4eafbce89a 100644
--- a/CVE-2023/CVE-2023-382xx/CVE-2023-38218.json
+++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38218.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-38218",
"sourceIdentifier": "psirt@adobe.com",
"published": "2023-10-13T07:15:40.047",
- "lastModified": "2023-10-14T01:47:06.707",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:28.803",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by an improper input validation vulnerability. An authenticated attacker can trigger an insecure direct object reference in the `V1/customers/me` endpoint to achieve information exposure and privilege escalation."
+ "value": "Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by an Incorrect Authorization . An authenticated attacker can exploit this to achieve information exposure and privilege escalation."
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones de Adobe Commerce 2.4.7-beta1 (y anteriores), 2.4.6-p2 (y anteriores), 2.4.5-p4 (y anteriores) y 2.4.4-p5 (y anteriores) se ven afectadas por una Autorizaci\u00f3n Incorrecta. Un atacante autenticado puede aprovechar esto para lograr exposici\u00f3n de informaci\u00f3n y escalada de privilegios."
}
],
"metrics": {
@@ -36,22 +40,22 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "CWE-639"
+ "value": "CWE-863"
}
]
},
{
- "source": "psirt@adobe.com",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "CWE-639"
}
]
}
diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38275.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38275.json
new file mode 100644
index 00000000000..fff10b65f85
--- /dev/null
+++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38275.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-38275",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-22T01:15:08.887",
+ "lastModified": "2023-10-27T19:33:05.517",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Cognos Dashboards on Cloud Pak for Data 4.7.0 exposes sensitive information in container images which could lead to further attacks against the system. IBM X-Force ID: 260730."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Cognos Dashboards en Cloud Pak for Data 4.7.0 expone informaci\u00f3n confidencial en im\u00e1genes de contenedores que podr\u00edan provocar m\u00e1s ataques contra el system. ID de IBM X-Force: 260730."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cognos_dashboards_on_cloud_pak_for_data:4.7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B9126A-A851-4AF1-B2BD-E6EEB36DC22A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260735",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7031207",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38276.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38276.json
new file mode 100644
index 00000000000..69d63d3d2a4
--- /dev/null
+++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38276.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-38276",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-22T02:15:07.533",
+ "lastModified": "2023-10-27T19:32:30.057",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Cognos Dashboards on Cloud Pak for Data 4.7.0 exposes sensitive information in environment variables which could aid in further attacks against the system. IBM X-Force ID: 260736."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Cognos Dashboards en Cloud Pak for Data 4.7.0 expone informaci\u00f3n confidencial en variables de entorno que podr\u00edan ayudar en futuros ataques contra el system. ID de IBM X-Force: 260736."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cognos_dashboards_on_cloud_pak_for_data:4.7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B9126A-A851-4AF1-B2BD-E6EEB36DC22A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260736",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7031207",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-382xx/CVE-2023-38280.json b/CVE-2023/CVE-2023-382xx/CVE-2023-38280.json
index c2c3319e39f..7c41990d9ce 100644
--- a/CVE-2023/CVE-2023-382xx/CVE-2023-38280.json
+++ b/CVE-2023/CVE-2023-382xx/CVE-2023-38280.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-38280",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T02:15:47.757",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:41:44.360",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM HMC (Hardware Management Console) 10.1.1010.0 and 10.2.1030.0 could allow a local user to escalate their privileges to root access on a restricted shell. IBM X-Force ID: 260740."
+ },
+ {
+ "lang": "es",
+ "value": "IBM HMC (Hardware Management Console) 10.1.1010.0 y 10.2.1030.0 podr\u00eda permitir a un usuario local escalar sus privilegios al acceso root en un shell restringido. ID de IBM X-Force: 260740."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -34,14 +58,56 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:hardware_management_console:10.1.1010.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C22A3289-99CC-4B5B-BFC2-9D74B0D9AE4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:hardware_management_console:10.2.1030.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47B6C836-94F8-4436-BC18-EC7ABB82148B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260740",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047713",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38312.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38312.json
index da663231587..4618f7d9d20 100644
--- a/CVE-2023/CVE-2023-383xx/CVE-2023-38312.json
+++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38312.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-38312",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-15T19:15:09.397",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:18:26.410",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A directory traversal vulnerability in Valve Counter-Strike 8684 allows a client (with remote control access to a game server) to read arbitrary files from the underlying server via the motdfile console variable."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de cruce de directorio en Valve Counter-Strike 8684 permite a un cliente (con acceso de control remoto a un servidor de juegos) leer archivos arbitrarios del servidor subyacente a trav\u00e9s de la variable de consola motdfile."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:valvesoftware:counter-strike:8684:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C69CF3D9-09FE-4E38-BA45-288024A57189"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/MikeIsAStar/Counter-Strike-Arbitrary-File-Read",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38328.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38328.json
new file mode 100644
index 00000000000..f4c6545415e
--- /dev/null
+++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38328.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-38328",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T22:15:08.613",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in eGroupWare 17.1.20190111. An Improper Password Storage vulnerability affects the setup panel of under setup/manageheader.php, which allows authenticated remote attackers with administrator credentials to read a cleartext database password."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en eGroupWare 17.1.20190111. Una vulnerabilidad de almacenamiento de contrase\u00f1as incorrectas afecta el panel de configuraci\u00f3n en setup/manageheader.php, lo que permite a atacantes remotos autenticados con credenciales de administrador leer una contrase\u00f1a de base de datos en texto plano."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.gruppotim.it/it/footer/red-team.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38403.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38403.json
index 58087396e45..ebb7ee81764 100644
--- a/CVE-2023/CVE-2023-384xx/CVE-2023-38403.json
+++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38403.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-38403",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T21:15:09.800",
- "lastModified": "2023-08-18T14:15:28.227",
+ "lastModified": "2023-10-26T00:15:10.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -112,6 +112,14 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://bugs.debian.org/1040830",
"source": "cve@mitre.org",
@@ -175,6 +183,14 @@
{
"url": "https://security.netapp.com/advisory/ntap-20230818-0016/",
"source": "cve@mitre.org"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38545.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38545.json
new file mode 100644
index 00000000000..822983ee66c
--- /dev/null
+++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38545.json
@@ -0,0 +1,90 @@
+{
+ "id": "CVE-2023-38545",
+ "sourceIdentifier": "support@hackerone.com",
+ "published": "2023-10-18T04:15:11.077",
+ "lastModified": "2023-10-28T03:15:08.207",
+ "vulnStatus": "Modified",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \"let the host resolve the name\" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Esta falla hace que curl desborde un b\u00fafer basado en el protocolo de enlace del proxy SOCKS5. Cuando se le pide a curl que pase el nombre de host al proxy SOCKS5 para permitir que resuelva la direcci\u00f3n en lugar de que lo haga curl mismo, la longitud m\u00e1xima que puede tener el nombre de host es 255 bytes. Si se detecta que el nombre de host es m\u00e1s largo, curl cambia a la resoluci\u00f3n de nombres local y en su lugar pasa solo la direcci\u00f3n resuelta. Debido a este error, la variable local que significa \"dejar que el host resuelva el nombre\" podr\u00eda obtener el valor incorrecto durante un protocolo de enlace SOCKS5 lento y, contrariamente a la intenci\u00f3n, copiar el nombre del host demasiado largo al b\u00fafer de destino en lugar de copiar solo la direcci\u00f3n resuelta all\u00ed. El b\u00fafer de destino es un b\u00fafer basado en mont\u00f3n y el nombre de host proviene de la URL con la que se le ha dicho a curl que opere."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.69.0",
+ "versionEndExcluding": "8.4.0",
+ "matchCriteriaId": "CDB9B842-1D18-4026-B62C-EEBF6F97C908"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://curl.se/docs/CVE-2023-38545.html",
+ "source": "support@hackerone.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/",
+ "source": "support@hackerone.com"
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
+ "source": "support@hackerone.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38546.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38546.json
new file mode 100644
index 00000000000..bc88d9f8a3b
--- /dev/null
+++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38546.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-38546",
+ "sourceIdentifier": "support@hackerone.com",
+ "published": "2023-10-18T04:15:11.137",
+ "lastModified": "2023-10-28T03:15:08.267",
+ "vulnStatus": "Modified",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "This flaw allows an attacker to insert cookies at will into a running program\nusing libcurl, if the specific series of conditions are met.\n\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\nthat are the individual handles for single transfers.\n\nlibcurl provides a function call that duplicates en easy handle called\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\n\nIf a transfer has cookies enabled when the handle is duplicated, the\ncookie-enable state is also cloned - but without cloning the actual\ncookies. If the source handle did not read any cookies from a specific file on\ndisk, the cloned version of the handle would instead store the file name as\n`none` (using the four ASCII letters, no quotes).\n\nSubsequent use of the cloned handle that does not explicitly set a source to\nload cookies from would then inadvertently load cookies from a file named\n`none` - if such a file exists and is readable in the current directory of the\nprogram using libcurl. And if using the correct file format of course.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Esta falla permite a un atacante insertar cookies a voluntad en un programa en ejecuci\u00f3n usando libcurl, si se cumple una serie espec\u00edfica de condiciones. libcurl realiza transferencias. En su API, una aplicaci\u00f3n crea \"easy handles\" que son identificadores individuales para transferencias individuales. libcurl proporciona una llamada de funci\u00f3n que duplica un identificador sencillo llamado [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). Si una transferencia tiene cookies habilitadas cuando el identificador est\u00e1 duplicado, el estado de habilitaci\u00f3n de cookies tambi\u00e9n se clona, pero sin clonar las cookies reales. Si el identificador de origen no ley\u00f3 ninguna cookie de un archivo espec\u00edfico en el disco, la versi\u00f3n clonada del identificador almacenar\u00eda el nombre del archivo como \"none\" (usando las cuatro letras ASCII, sin comillas). El uso posterior del identificador clonado que no establece expl\u00edcitamente una fuente desde la cual cargar cookies cargar\u00eda inadvertidamente cookies desde un archivo llamado \"none\", si dicho archivo existe y es legible en el directorio actual del programa usando libcurl. Y si utiliza el formato de archivo correcto, por supuesto."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.7,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.9.1",
+ "versionEndExcluding": "8.4.0",
+ "matchCriteriaId": "9058709C-7DD0-44D7-8224-535363E103A9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://curl.se/docs/CVE-2023-38546.html",
+ "source": "support@hackerone.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/",
+ "source": "support@hackerone.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38552.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38552.json
new file mode 100644
index 00000000000..8a3a80074de
--- /dev/null
+++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38552.json
@@ -0,0 +1,104 @@
+{
+ "id": "CVE-2023-38552",
+ "sourceIdentifier": "support@hackerone.com",
+ "published": "2023-10-18T04:15:11.200",
+ "lastModified": "2023-10-26T05:15:25.183",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check.\nImpacts:\nThis vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x.\nPlease note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js."
+ },
+ {
+ "lang": "es",
+ "value": "Cuando la funci\u00f3n de pol\u00edtica de Node.js verifica la integridad de un recurso con un manifiesto confiable, la aplicaci\u00f3n puede interceptar la operaci\u00f3n y devolver una suma de verificaci\u00f3n falsificada a la implementaci\u00f3n de la pol\u00edtica del nodo, deshabilitando as\u00ed efectivamente la verificaci\u00f3n de integridad. Impactos: esta vulnerabilidad afecta a todos los usuarios que utilizan el mecanismo de pol\u00edtica experimental en todas las l\u00edneas de versiones activas: 18.x y 20.x. Tenga en cuenta que en el momento en que se emiti\u00f3 este CVE, el mecanismo de pol\u00edtica era una caracter\u00edstica experimental de Node.js."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-345"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "18.0.0",
+ "versionEndIncluding": "18.18.1",
+ "matchCriteriaId": "F7BFC09F-B97D-4C45-939A-6EB3B1F41850"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "20.1.0",
+ "versionEndIncluding": "20.8.0",
+ "matchCriteriaId": "30646F94-FCFC-4E0C-A791-CDAF1FB0498A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://hackerone.com/reports/2094235",
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
+ "source": "support@hackerone.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
+ "source": "support@hackerone.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
+ "source": "support@hackerone.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
+ "source": "support@hackerone.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38584.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38584.json
new file mode 100644
index 00000000000..056ffc929a5
--- /dev/null
+++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38584.json
@@ -0,0 +1,298 @@
+{
+ "id": "CVE-2023-38584",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T20:15:09.047",
+ "lastModified": "2023-10-26T14:26:11.107",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\n\n\nIn Weintek's cMT3000 HMI Web CGI device, the cgi-bin command_wb.cgi contains a stack-based buffer overflow, which could allow an anonymous attacker to hijack control flow and bypass login authentication.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En el dispositivo cMT3000 HMI Web CGI de Weintek, cgi-bin command_wb.cgi contiene un desbordamiento de b\u00fafer basado en pila, que podr\u00eda permitir a un atacante an\u00f3nimo secuestrar el flujo de control y evitar la autenticaci\u00f3n de inicio de sesi\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt-fhd_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210212",
+ "matchCriteriaId": "33538560-F796-4D1D-AA52-63DB5FD817BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt-fhd:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A132B170-A1FC-4D38-9965-0FF47B944FD5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt-hdm_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210206",
+ "matchCriteriaId": "52502356-D835-4468-BCA6-875177B562F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt-hdm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E08E3518-A03F-486D-B67A-013F67026D78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt3071_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210220",
+ "matchCriteriaId": "210A03BC-C9BB-4832-BDB2-2EB5E87FD13A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt3071:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4DE53C8-09D5-4D5E-97EE-A89E1478CD65"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt3072_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210220",
+ "matchCriteriaId": "17422509-5131-48A3-8C9A-ECA4332C33F0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt3072:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E3F83A8D-1489-48AA-911B-5BA561A57896"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt3090_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210220",
+ "matchCriteriaId": "3E5B9225-364C-46BD-BCB4-E151923855CC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt3090:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79C1F694-08A2-46E7-95C2-8DFA3D64423B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt3103_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210220",
+ "matchCriteriaId": "3651EA3F-5C3F-4893-AF82-E7FDBBAF5EAA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt3103:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F607716E-7B7B-4620-819C-F44341B8C37F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt3151_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210220",
+ "matchCriteriaId": "82F72B48-B2CE-4580-B4CC-49879CA6074B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt3151:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FF5326B-5E33-4C11-9AC6-A90357078FCA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://dl.weintek.com/public/Document/TEC/TEC23005E_cMT_Web_Security_Update.pdf",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-12",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38719.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38719.json
index e7502793954..077e68ed7fd 100644
--- a/CVE-2023/CVE-2023-387xx/CVE-2023-38719.json
+++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38719.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-38719",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T00:15:10.797",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:33:59.800",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,61 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.5.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5512DD6A-9E57-4741-8F66-1C7AC7C6B593"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/261607",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047558",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38720.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38720.json
index f715e6f828d..b4041938f0c 100644
--- a/CVE-2023/CVE-2023-387xx/CVE-2023-38720.json
+++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38720.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-38720",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T21:15:10.720",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:05:54.967",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,98 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.5",
+ "versionEndExcluding": "11.5.8",
+ "matchCriteriaId": "65161064-A4A3-48E5-AC0A-388429FF2F53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "7F91EC14-CD9A-42EB-9D81-6025A1D74749"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp1:*:*:*:*:*:*",
+ "matchCriteriaId": "5D098641-0833-4718-BB6A-273E1CA0F887"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp2:*:*:*:*:*:*",
+ "matchCriteriaId": "8B451F96-2A58-4758-86E6-F8A030805C51"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp3:*:*:*:*:*:*",
+ "matchCriteriaId": "69CBC98E-BECE-41A4-A0D9-9F3AC1602ABE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp4:*:*:*:*:*:*",
+ "matchCriteriaId": "20386F14-BC32-4174-9F3A-F7406486976A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp5:*:*:*:*:*:*",
+ "matchCriteriaId": "DD0DD54B-AB2E-4C56-B348-FF87C174270A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp6:*:*:*:*:*:*",
+ "matchCriteriaId": "CC14EF40-FE00-47F9-8A78-98713F903D9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/261616",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047489",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38722.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38722.json
new file mode 100644
index 00000000000..34f1fc2c712
--- /dev/null
+++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38722.json
@@ -0,0 +1,143 @@
+{
+ "id": "CVE-2023-38722",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-23T18:15:09.940",
+ "lastModified": "2023-10-28T03:32:31.233",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.2 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 262174."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0 y 6.2.2 es vulnerable a cross-site scripting almacenado. Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista, lo que podr\u00eda conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. ID de IBM X-Force: 262174."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:essentials:*:*:*",
+ "matchCriteriaId": "3E32C714-33CB-408E-8907-FC929D751588"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:standard:*:*:*",
+ "matchCriteriaId": "95F70DD2-71D1-4C6F-BE21-AA2A99E46AE9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:essentials:*:*:*",
+ "matchCriteriaId": "6325F8BC-B7D6-4601-A2D1-B61D77BC227C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:standard:*:*:*",
+ "matchCriteriaId": "EEE81D1F-446F-4CA2-A2B1-3EF1298C80EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:essentials:*:*:*",
+ "matchCriteriaId": "430CC017-4619-4C54-883E-210221268529"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:standard:*:*:*",
+ "matchCriteriaId": "D391DA86-9F9B-416A-9406-5003938E7BD8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/262174",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7057407",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38728.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38728.json
index f1bf12f043c..577093b313b 100644
--- a/CVE-2023/CVE-2023-387xx/CVE-2023-38728.json
+++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38728.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-38728",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T22:15:11.957",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:34:59.273",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,165 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.5",
+ "versionEndExcluding": "11.5.8",
+ "matchCriteriaId": "65161064-A4A3-48E5-AC0A-388429FF2F53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:-:*:*:*:*:*:*",
+ "matchCriteriaId": "190AE881-F7BF-486E-BDAE-197337D70CDB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D1BAA43-4C77-4AC7-8561-93EDE0AED000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp10:*:*:*:*:*:*",
+ "matchCriteriaId": "F6FDF4D8-1822-43E6-AE65-3E4F8743D3A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp2:*:*:*:*:*:*",
+ "matchCriteriaId": "87C39880-D0E9-4487-9A80-B4D1A999032F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp3:*:*:*:*:*:*",
+ "matchCriteriaId": "8842A8B6-E470-4536-AB5D-DA1C62A05F58"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp3a:*:*:*:*:*:*",
+ "matchCriteriaId": "92BF0482-E4FE-454E-84DD-27074097F3F3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp4:*:*:*:*:*:*",
+ "matchCriteriaId": "3705A79B-7903-4055-9CDC-55D60D2AC2E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp5:*:*:*:*:*:*",
+ "matchCriteriaId": "CBDFCE61-EE04-4901-844D-61B8966C1B81"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp6:*:*:*:*:*:*",
+ "matchCriteriaId": "53A23363-413D-4785-B8C1-9AC2F96000EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp7:*:*:*:*:*:*",
+ "matchCriteriaId": "6E22D884-A33F-41D7-84CB-B6360A39863F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp8:*:*:*:*:*:*",
+ "matchCriteriaId": "4DA56D35-93E9-4659-B180-2FD636A39BAB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp9:*:*:*:*:*:*",
+ "matchCriteriaId": "6E7F0B02-EA0B-4BD1-AA0C-2A4735221963"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "7F91EC14-CD9A-42EB-9D81-6025A1D74749"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp1:*:*:*:*:*:*",
+ "matchCriteriaId": "5D098641-0833-4718-BB6A-273E1CA0F887"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp2:*:*:*:*:*:*",
+ "matchCriteriaId": "8B451F96-2A58-4758-86E6-F8A030805C51"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp3:*:*:*:*:*:*",
+ "matchCriteriaId": "69CBC98E-BECE-41A4-A0D9-9F3AC1602ABE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp4:*:*:*:*:*:*",
+ "matchCriteriaId": "20386F14-BC32-4174-9F3A-F7406486976A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp5:*:*:*:*:*:*",
+ "matchCriteriaId": "DD0DD54B-AB2E-4C56-B348-FF87C174270A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp6:*:*:*:*:*:*",
+ "matchCriteriaId": "CC14EF40-FE00-47F9-8A78-98713F903D9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/262258",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7047478",
+ "source": "nvd@nist.gov",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047489",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Not Applicable"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38735.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38735.json
new file mode 100644
index 00000000000..97bddeefa04
--- /dev/null
+++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38735.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-38735",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-22T02:15:07.887",
+ "lastModified": "2023-10-27T19:32:01.610",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Cognos Dashboards on Cloud Pak for Data 4.7.0 could allow a remote attacker to bypass security restrictions, caused by a reverse tabnabbing flaw. An attacker could exploit this vulnerability and redirect a victim to a phishing site. IBM X-Force ID: 262482."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Cognos Dashboards en Cloud Pak for Data 4.7.0 podr\u00eda permitir a un atacante remoto omitir las restricciones de seguridad, causadas por una falla de tabulaci\u00f3n inversa. Un atacante podr\u00eda aprovechar esta vulnerabilidad y redirigir a la v\u00edctima a un sitio de phishing. ID de IBM X-Force: 262482."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:cognos_dashboards_on_cloud_pak_for_data:4.7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83B9126A-A851-4AF1-B2BD-E6EEB36DC22A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/262482",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7031207",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-387xx/CVE-2023-38740.json b/CVE-2023/CVE-2023-387xx/CVE-2023-38740.json
index 9b1cd558a8a..9d4704c27b1 100644
--- a/CVE-2023/CVE-2023-387xx/CVE-2023-38740.json
+++ b/CVE-2023/CVE-2023-387xx/CVE-2023-38740.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-38740",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T22:15:12.057",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:34:48.020",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,70 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.5",
+ "versionEndIncluding": "11.5.8",
+ "matchCriteriaId": "8966D805-3817-488E-B692-D15838AD3469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/262613",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047489",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7047554",
+ "source": "nvd@nist.gov",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38802.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38802.json
index 84cf947c7db..1022205caa6 100644
--- a/CVE-2023/CVE-2023-388xx/CVE-2023-38802.json
+++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38802.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-38802",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-29T16:15:09.113",
- "lastModified": "2023-09-19T22:15:11.407",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:52:48.063",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation)."
+ },
+ {
+ "lang": "es",
+ "value": "FRRouting FRR 7.5.1 a 9.0 y Pica8 PICOS 4.3.3.2 permiten a un atacante remoto causar una denegaci\u00f3n de servicio a trav\u00e9s de una actualizaci\u00f3n BGP manipulada con un atributo da\u00f1ado 23 (encapsulaci\u00f3n de t\u00fanel)."
}
],
"metrics": {
@@ -68,6 +72,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -82,7 +111,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://news.ycombinator.com/item?id=37305800",
@@ -93,7 +126,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5495",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38817.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38817.json
index 128fe9a3274..13da9d56e29 100644
--- a/CVE-2023/CVE-2023-388xx/CVE-2023-38817.json
+++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38817.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-38817",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-11T19:15:10.180",
- "lastModified": "2023-10-13T17:15:09.577",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T17:03:03.400",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -11,14 +11,71 @@
},
{
"lang": "es",
- "value": "Un problema en Inspect Element Ltd Echo.ac v.5.2.1.0 permite a un atacante local obtener privilegios mediante un comando manipulado para el componente echo_driver.sys."
+ "value": "Un problema en Inspect Element Ltd Echo.ac v.5.2.1.0 permite a un atacante local obtener privilegios mediante un comando manipulado para el componente echo_driver.sys. NOTA: la posici\u00f3n del proveedor es que la capacidad informada de que las aplicaciones en modo de usuario ejecuten c\u00f3digo como NT AUTHORITY\\SYSTEM fue \"desactivada por el propio Microsoft\"."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:echo:anti_cheat_tool:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.2.1.0",
+ "matchCriteriaId": "4C2BF749-66DF-4071-9BEA-97CC696379CB"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://ioctl.fail/echo-ac-writeup/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38831.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38831.json
index ca411890ef7..1df5e422ab1 100644
--- a/CVE-2023/CVE-2023-388xx/CVE-2023-38831.json
+++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38831.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-38831",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-23T17:15:43.863",
- "lastModified": "2023-09-08T23:15:11.670",
+ "lastModified": "2023-10-23T01:15:07.550",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-08-24",
"cisaActionDue": "2023-09-14",
@@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
- "value": "RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through August 2023."
+ "value": "RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023."
}
],
"metrics": {
@@ -73,6 +73,10 @@
"url": "http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html",
"source": "cve@mitre.org"
},
+ {
+ "url": "https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://news.ycombinator.com/item?id=37236100",
"source": "cve@mitre.org",
diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38845.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38845.json
new file mode 100644
index 00000000000..f52cc4356be
--- /dev/null
+++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38845.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-38845",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T22:15:09.227",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in Anglaise Company Anglaise.Company v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en Anglaise Company Anglaise.Company v.13.6.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud GET manipulada."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-38845.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1657030660-8nDEQNbe",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38846.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38846.json
new file mode 100644
index 00000000000..d79384d0e90
--- /dev/null
+++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38846.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-38846",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T22:15:09.290",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in Marbre Lapin Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en Marbre Lapin Line v.13.6.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud GET manipulada."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-38846.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1657925980-KmmGkje5",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38847.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38847.json
new file mode 100644
index 00000000000..1029f163397
--- /dev/null
+++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38847.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-38847",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T22:15:09.340",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in CHRISTINA JAPAN Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en CHRISTINA JAPAN Line v.13.6.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud GET manipulada."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-38847.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1657631315-oX5J26Ak",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38848.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38848.json
new file mode 100644
index 00000000000..e26ca3867ea
--- /dev/null
+++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38848.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-38848",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T22:15:09.383",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in rmc R Beauty CLINIC Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en rmc R Beauty CLINIC Line v.13.6.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud GET manipulada."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-38848.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1657640647-Wk2xYj38",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38849.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38849.json
new file mode 100644
index 00000000000..27a93752db6
--- /dev/null
+++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38849.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-38849",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T22:15:09.430",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in tire-sales Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en Tire-Sales Line v.13.6.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud GET manipulada."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-38849.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1657203739-yvGg5PjN",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json
index c7813e96290..9add28d6203 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3801",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T00:15:10.453",
- "lastModified": "2023-08-01T20:14:27.200",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T19:15:11.057",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -121,13 +121,6 @@
}
],
"references": [
- {
- "url": "http://web.archive.org/web/20230722143348/https://github.com/funnn7/cve/blob/main/sql.md",
- "source": "cna@vuldb.com",
- "tags": [
- "Broken Link"
- ]
- },
{
"url": "https://github.com/Wkingxc/CVE/blob/master/ibos_OA_1.md",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json
index ee1fddf5a2e..f0009031c10 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-3814",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-09-04T12:15:09.570",
- "lastModified": "2023-09-15T19:15:09.380",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:15:53.927",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Advanced File Manager WordPress plugin before 5.1.1 does not adequately authorize its usage on multisite installations, allowing site admin users to list and read arbitrary files and folders on the server."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento de WordPress Advanced File Manager anterior a 5.1.1 no autoriza adecuadamente su uso en instalaciones multisitio, lo que permite a los usuarios administradores del sitio enumerar y leer archivos y carpetas arbitrarios en el servidor."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json
index 51811d51123..e47770984d0 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3817.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3817",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-07-31T16:15:10.497",
- "lastModified": "2023-09-23T00:15:19.610",
+ "lastModified": "2023-10-27T15:15:13.733",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -475,6 +475,10 @@
"url": "https://security.netapp.com/advisory/ntap-20230818-0014/",
"source": "openssl-security@openssl.org"
},
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0008/",
+ "source": "openssl-security@openssl.org"
+ },
{
"url": "https://www.openssl.org/news/secadv/20230731.txt",
"source": "openssl-security@openssl.org",
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3823.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3823.json
index 0da03ff5825..c530c58b30e 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3823.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3823.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3823",
"sourceIdentifier": "security@php.net",
"published": "2023-08-11T06:15:09.283",
- "lastModified": "2023-09-05T23:15:07.383",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-27T18:58:56.457",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -91,8 +91,38 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
- "versionEndExcluding": "8.2.8",
- "matchCriteriaId": "32E9658B-C729-4A49-98BE-CD0F8E782667"
+ "versionEndExcluding": "8.2.9",
+ "matchCriteriaId": "75AD1BDB-02D7-4727-8F08-8E1F794DB842"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@@ -110,18 +140,24 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html",
- "source": "security@php.net"
+ "source": "security@php.net",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/",
"source": "security@php.net",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230825-0001/",
- "source": "security@php.net"
+ "source": "security@php.net",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3824.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3824.json
index 1847a5c33d5..87b775414a5 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3824.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3824.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3824",
"sourceIdentifier": "security@php.net",
"published": "2023-08-11T06:15:10.560",
- "lastModified": "2023-09-05T23:15:07.883",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-27T18:58:24.280",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -101,8 +101,38 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
- "versionEndExcluding": "8.2.8",
- "matchCriteriaId": "32E9658B-C729-4A49-98BE-CD0F8E782667"
+ "versionEndExcluding": "8.2.9",
+ "matchCriteriaId": "75AD1BDB-02D7-4727-8F08-8E1F794DB842"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@@ -120,18 +150,24 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00002.html",
- "source": "security@php.net"
+ "source": "security@php.net",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7NBF77WN6DTVTY2RE73IGPYD6M4PIAWA/",
"source": "security@php.net",
"tags": [
- "Third Party Advisory"
+ "Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230825-0001/",
- "source": "security@php.net"
+ "source": "security@php.net",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3863.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3863.json
index d9adaeb5c45..ced4092fa44 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3863.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3863.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3863",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-24T15:15:09.397",
- "lastModified": "2023-09-10T12:16:18.967",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:29:30.773",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -108,13 +133,27 @@
"Patch"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3869.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3869.json
new file mode 100644
index 00000000000..e370d7db172
--- /dev/null
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3869.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-3869",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.073",
+ "lastModified": "2023-10-26T14:58:22.130",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the voteOnComment function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a comment."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento wpDiscuz para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de autorizaci\u00f3n en la funci\u00f3n voteOnComment en versiones hasta la 7.6.3 incluida. Esto hace posible que atacantes no autenticados aumenten o disminuyan la calificaci\u00f3n de un comentario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-639"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "7.6.3",
+ "matchCriteriaId": "B283E8CD-2054-4D79-A517-8D7228A3AE66"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wpdiscuz/trunk/utils/class.WpdiscuzHelperAjax.php#L681",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b30ac1b0-eae2-4194-bf8e-ae73b4236965?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39193.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39193.json
index 837d9f7cc68..fdbf5097d6c 100644
--- a/CVE-2023/CVE-2023-391xx/CVE-2023-39193.json
+++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39193.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39193",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-09T18:15:10.303",
- "lastModified": "2023-10-11T20:46:48.450",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T15:15:08.620",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -41,19 +41,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
- "privilegesRequired": "HIGH",
+ "privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
- "baseScore": 5.1,
+ "baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
- "exploitabilityScore": 0.8,
+ "exploitabilityScore": 1.8,
"impactScore": 4.2
}
]
diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39219.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39219.json
new file mode 100644
index 00000000000..52368a291f4
--- /dev/null
+++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39219.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-39219",
+ "sourceIdentifier": "responsible-disclosure@pingidentity.com",
+ "published": "2023-10-25T18:17:28.973",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "PingFederate Administrative Console dependency contains a weakness where console becomes unresponsive with crafted Java class loading enumeration requests\n"
+ },
+ {
+ "lang": "es",
+ "value": "La dependencia de la consola administrativa de PingFederate contiene una debilidad donde la consola deja de responder con solicitudes de enumeraci\u00f3n de carga de clases Java manipuladas"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "responsible-disclosure@pingidentity.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "responsible-disclosure@pingidentity.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://docs.pingidentity.com/r/en-us/pingfederate-113/gyk1689105783244",
+ "source": "responsible-disclosure@pingidentity.com"
+ },
+ {
+ "url": "https://www.pingidentity.com/en/resources/downloads/pingfederate.html",
+ "source": "responsible-disclosure@pingidentity.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39231.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39231.json
new file mode 100644
index 00000000000..820e39b86dc
--- /dev/null
+++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39231.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-39231",
+ "sourceIdentifier": "responsible-disclosure@pingidentity.com",
+ "published": "2023-10-25T18:17:29.030",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "PingFederate using the PingOne MFA adapter allows a new MFA device to be paired without requiring second factor authentication from an existing registered device. A threat actor may be able to exploit this vulnerability to register their own MFA device if they have knowledge of a victim user's first factor credentials."
+ },
+ {
+ "lang": "es",
+ "value": "PingFederate utilizando el adaptador PingOne MFA permite emparejar un nuevo dispositivo MFA sin requerir autenticaci\u00f3n de segundo factor de un dispositivo registrado existente. Un actor de amenazas puede aprovechar esta vulnerabilidad para registrar su propio dispositivo MFA si tiene conocimiento de las credenciales del primer factor del usuario v\u00edctima."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "responsible-disclosure@pingidentity.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "responsible-disclosure@pingidentity.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-288"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://docs.pingidentity.com/r/en-us/pingfederate-pingone-mfa-ik/bks1657303194394",
+ "source": "responsible-disclosure@pingidentity.com"
+ },
+ {
+ "url": "https://www.pingidentity.com/en/resources/downloads/pingid.html",
+ "source": "responsible-disclosure@pingidentity.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39276.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39276.json
new file mode 100644
index 00000000000..8d722ce1fa6
--- /dev/null
+++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39276.json
@@ -0,0 +1,503 @@
+{
+ "id": "CVE-2023-39276",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-17T23:15:11.573",
+ "lastModified": "2023-10-19T16:44:59.707",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nSonicOS post-authentication stack-based buffer overflow vulnerability in the getBookmarkList.json URL endpoint leads to a firewall crash.\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de desbordamiento del b\u00fafer de autenticaci\u00f3n posterior de SonicOS en el endpoint de la URL getBookmarkList.json provoca una falla del firewall."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0.1-5145",
+ "matchCriteriaId": "2C7049FD-8088-4FCE-886A-F4CF5E287D1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa2700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AFAFCEC-A61E-40EB-87B9-7449751CCAF8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa3700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC4F132-D29A-4974-86DA-6E35AB05327C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa4700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBE365CF-DBE9-4C84-AB0C-0CAB7C74ED40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "016BB564-CEFC-4E0C-9D38-D9C4C8B2E492"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D95DCC6-6F48-4A79-A9F6-BDB1AEFA2180"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp10700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15F2741F-3C32-4075-A224-BE272B50E3D9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp11700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC883B32-987C-4D34-8BBF-39E2C57A62EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp13700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C72EA66A-320C-4D5E-B3F6-6D5F8733E2F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp15700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B4A33E-8456-451E-AAF4-7F48BEDACF45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.4-44v-21-2340",
+ "matchCriteriaId": "9B91638E-FB80-4C65-8A37-827488CB3E2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.13-105n",
+ "matchCriteriaId": "0D74A465-1A72-4A02-8A54-FD502BD28119"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F86D13F9-D41E-4230-9116-A781FFAEF00D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012",
+ "source": "PSIRT@sonicwall.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39277.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39277.json
new file mode 100644
index 00000000000..af533ceaab7
--- /dev/null
+++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39277.json
@@ -0,0 +1,503 @@
+{
+ "id": "CVE-2023-39277",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-17T23:15:11.660",
+ "lastModified": "2023-10-19T16:44:50.013",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nSonicOS post-authentication stack-based buffer overflow vulnerability in the sonicflow.csv and appflowsessions.csv URL endpoints leads to a firewall crash."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de desbordamiento del b\u00fafer de autenticaci\u00f3n posterior de SonicOS en los endpoints de URL sonicflow.csv y appflowsessions.csv provoca una falla del firewall."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0.1-5145",
+ "matchCriteriaId": "2C7049FD-8088-4FCE-886A-F4CF5E287D1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa2700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AFAFCEC-A61E-40EB-87B9-7449751CCAF8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa3700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC4F132-D29A-4974-86DA-6E35AB05327C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa4700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBE365CF-DBE9-4C84-AB0C-0CAB7C74ED40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "016BB564-CEFC-4E0C-9D38-D9C4C8B2E492"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D95DCC6-6F48-4A79-A9F6-BDB1AEFA2180"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp10700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15F2741F-3C32-4075-A224-BE272B50E3D9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp11700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC883B32-987C-4D34-8BBF-39E2C57A62EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp13700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C72EA66A-320C-4D5E-B3F6-6D5F8733E2F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp15700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B4A33E-8456-451E-AAF4-7F48BEDACF45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.4-44v-21-2340",
+ "matchCriteriaId": "9B91638E-FB80-4C65-8A37-827488CB3E2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.13-105n",
+ "matchCriteriaId": "0D74A465-1A72-4A02-8A54-FD502BD28119"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F86D13F9-D41E-4230-9116-A781FFAEF00D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012",
+ "source": "PSIRT@sonicwall.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39278.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39278.json
new file mode 100644
index 00000000000..640ac00e061
--- /dev/null
+++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39278.json
@@ -0,0 +1,503 @@
+{
+ "id": "CVE-2023-39278",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-17T23:15:11.727",
+ "lastModified": "2023-10-19T16:44:45.767",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SonicOS post-authentication user assertion failure leads to Stack-Based Buffer Overflow vulnerability via main.cgi leads to a firewall crash.\n"
+ },
+ {
+ "lang": "es",
+ "value": "La falla de aserci\u00f3n del usuario posterior a la autenticaci\u00f3n de SonicOS conduce a una vulnerabilidad de desbordamiento del b\u00fafer a trav\u00e9s de main.cgi que provoca una falla del firewall."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0.1-5145",
+ "matchCriteriaId": "2C7049FD-8088-4FCE-886A-F4CF5E287D1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa2700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AFAFCEC-A61E-40EB-87B9-7449751CCAF8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa3700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC4F132-D29A-4974-86DA-6E35AB05327C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa4700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBE365CF-DBE9-4C84-AB0C-0CAB7C74ED40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "016BB564-CEFC-4E0C-9D38-D9C4C8B2E492"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D95DCC6-6F48-4A79-A9F6-BDB1AEFA2180"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp10700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15F2741F-3C32-4075-A224-BE272B50E3D9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp11700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC883B32-987C-4D34-8BBF-39E2C57A62EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp13700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C72EA66A-320C-4D5E-B3F6-6D5F8733E2F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp15700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B4A33E-8456-451E-AAF4-7F48BEDACF45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.4-44v-21-2340",
+ "matchCriteriaId": "9B91638E-FB80-4C65-8A37-827488CB3E2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.13-105n",
+ "matchCriteriaId": "0D74A465-1A72-4A02-8A54-FD502BD28119"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F86D13F9-D41E-4230-9116-A781FFAEF00D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012",
+ "source": "PSIRT@sonicwall.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39279.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39279.json
new file mode 100644
index 00000000000..4f8d8be6c9d
--- /dev/null
+++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39279.json
@@ -0,0 +1,503 @@
+{
+ "id": "CVE-2023-39279",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-17T23:15:11.790",
+ "lastModified": "2023-10-19T16:44:41.193",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SonicOS post-authentication Stack-Based Buffer Overflow vulnerability in the getPacketReplayData.json URL endpoint leads to a firewall crash."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de desbordamiento del b\u00fafer basado posterior a la autenticaci\u00f3n de SonicOS en el endpoint de URL getPacketReplayData.json provoca una falla del firewall."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0.1-5145",
+ "matchCriteriaId": "2C7049FD-8088-4FCE-886A-F4CF5E287D1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa2700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AFAFCEC-A61E-40EB-87B9-7449751CCAF8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa3700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC4F132-D29A-4974-86DA-6E35AB05327C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa4700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBE365CF-DBE9-4C84-AB0C-0CAB7C74ED40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "016BB564-CEFC-4E0C-9D38-D9C4C8B2E492"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D95DCC6-6F48-4A79-A9F6-BDB1AEFA2180"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp10700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15F2741F-3C32-4075-A224-BE272B50E3D9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp11700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC883B32-987C-4D34-8BBF-39E2C57A62EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp13700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C72EA66A-320C-4D5E-B3F6-6D5F8733E2F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp15700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B4A33E-8456-451E-AAF4-7F48BEDACF45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.4-44v-21-2340",
+ "matchCriteriaId": "9B91638E-FB80-4C65-8A37-827488CB3E2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.13-105n",
+ "matchCriteriaId": "0D74A465-1A72-4A02-8A54-FD502BD28119"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F86D13F9-D41E-4230-9116-A781FFAEF00D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012",
+ "source": "PSIRT@sonicwall.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39280.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39280.json
new file mode 100644
index 00000000000..aeb2fdc28d4
--- /dev/null
+++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39280.json
@@ -0,0 +1,503 @@
+{
+ "id": "CVE-2023-39280",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-17T23:15:11.853",
+ "lastModified": "2023-10-19T16:44:36.887",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SonicOS p\n\nost-authentication Stack-Based Buffer Overflow vulnerability in the ssoStats-s.xml, ssoStats-s.wri URL endpoints leads to a firewall crash.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de desbordamiento del b\u00fafer posterior a la autenticaci\u00f3n de SonicOS en los endpoints de URL ssoStats-s.xml y ssoStats-s.wri provoca una falla del firewall."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0.1-5145",
+ "matchCriteriaId": "2C7049FD-8088-4FCE-886A-F4CF5E287D1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa2700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AFAFCEC-A61E-40EB-87B9-7449751CCAF8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa3700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC4F132-D29A-4974-86DA-6E35AB05327C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa4700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBE365CF-DBE9-4C84-AB0C-0CAB7C74ED40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "016BB564-CEFC-4E0C-9D38-D9C4C8B2E492"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D95DCC6-6F48-4A79-A9F6-BDB1AEFA2180"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp10700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15F2741F-3C32-4075-A224-BE272B50E3D9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp11700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC883B32-987C-4D34-8BBF-39E2C57A62EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp13700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C72EA66A-320C-4D5E-B3F6-6D5F8733E2F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp15700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B4A33E-8456-451E-AAF4-7F48BEDACF45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.4-44v-21-2340",
+ "matchCriteriaId": "9B91638E-FB80-4C65-8A37-827488CB3E2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.13-105n",
+ "matchCriteriaId": "0D74A465-1A72-4A02-8A54-FD502BD28119"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F86D13F9-D41E-4230-9116-A781FFAEF00D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012",
+ "source": "PSIRT@sonicwall.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39318.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39318.json
index 78d7ab655fb..b07fc1a9132 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39318.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39318.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39318",
"sourceIdentifier": "security@golang.org",
"published": "2023-09-08T17:15:27.823",
- "lastModified": "2023-09-12T15:09:57.040",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:11.337",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack."
+ },
+ {
+ "lang": "es",
+ "value": "El paquete html/template no aplica las reglas adecuadas para controlar las ocurrencias de \". Esto puede hacer que el analizador de plantillas considere incorrectamente que los contextos de script se terminan antes de tiempo, lo que provoca que las acciones se escapen incorrectamente. Esto podr\u00eda aprovecharse para realizar un ataque XSS."
}
],
"metrics": {
@@ -109,6 +113,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0009/",
+ "source": "security@golang.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39320.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39320.json
index 3dc3e8c0592..cc1d4535622 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39320.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39320.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39320",
"sourceIdentifier": "security@golang.org",
"published": "2023-09-08T17:15:27.977",
- "lastModified": "2023-09-12T14:39:48.643",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:11.487",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software."
+ },
+ {
+ "lang": "es",
+ "value": "La directiva de cadena de herramientas go.mod, introducida en Go 1.21, se puede aprovechar para ejecutar scripts y binarios relativos a la ra\u00edz del m\u00f3dulo cuando el comando \"go\" se ejecut\u00f3 dentro del m\u00f3dulo. Esto se aplica a los m\u00f3dulos descargados utilizando el comando \"go\" desde el proxy del m\u00f3dulo, as\u00ed como a los m\u00f3dulos descargados directamente mediante el software VCS."
}
],
"metrics": {
@@ -103,6 +107,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0004/",
+ "source": "security@golang.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39321.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39321.json
index 4d6b2272b5c..67f1066fdfe 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39321.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39321.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39321",
"sourceIdentifier": "security@golang.org",
"published": "2023-09-08T17:15:28.047",
- "lastModified": "2023-09-12T14:36:06.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:11.557",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic."
+ },
+ {
+ "lang": "es",
+ "value": "El procesamiento de un mensaje post-handshake incompleto para una conexi\u00f3n QUIC puede causar un estado de p\u00e1nico."
}
],
"metrics": {
@@ -103,6 +107,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0004/",
+ "source": "security@golang.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39322.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39322.json
index e957d5c6dd9..740605409c4 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39322.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39322.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39322",
"sourceIdentifier": "security@golang.org",
"published": "2023-09-08T17:15:28.120",
- "lastModified": "2023-09-12T18:07:29.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:11.620",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size."
+ },
+ {
+ "lang": "es",
+ "value": "Las conexiones QUIC no establecen un l\u00edmite superior en la cantidad de datos almacenados en el b\u00fafer al leer mensajes post-handshake, lo que permite que una conexi\u00f3n QUIC maliciosa provoque un crecimiento ilimitado de la memoria. Con la soluci\u00f3n aplicada, las conexiones ahora rechazan sistem\u00e1ticamente los mensajes de m\u00e1s de 65 KiB de tama\u00f1o."
}
],
"metrics": {
@@ -104,6 +108,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0004/",
+ "source": "security@golang.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39323.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39323.json
index 999ca9b5388..e53a9ab1f2a 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39323.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39323.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39323",
"sourceIdentifier": "security@golang.org",
"published": "2023-10-05T21:15:11.283",
- "lastModified": "2023-10-13T15:03:42.950",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-29T04:15:10.623",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -99,12 +99,24 @@
"Release Notes"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
+ "source": "security@golang.org"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
+ "source": "security@golang.org"
+ },
{
"url": "https://pkg.go.dev/vuln/GO-2023-2095",
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0001/",
+ "source": "security@golang.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json
index d31e28b30bf..5cc6dc47ca3 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39325.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39325",
"sourceIdentifier": "security@golang.org",
"published": "2023-10-11T22:15:09.880",
- "lastModified": "2023-10-12T12:59:39.183",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-29T04:15:10.723",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function."
+ },
+ {
+ "lang": "es",
+ "value": "Un cliente HTTP/2 malicioso que crea solicitudes r\u00e1pidamente y las restablece inmediatamente puede provocar un consumo excesivo de recursos del servidor. Si bien el n\u00famero total de solicitudes est\u00e1 limitado por la configuraci\u00f3n http2.Server.MaxConcurrentStreams, restablecer una solicitud en curso permite al atacante crear una nueva solicitud mientras la existente a\u00fan se est\u00e1 ejecutando. Con la soluci\u00f3n aplicada, los servidores HTTP/2 ahora vincularon el n\u00famero de rutinas de controlador que se ejecutan simult\u00e1neamente al l\u00edmite de concurrencia de transmisi\u00f3n (MaxConcurrentStreams). Las nuevas solicitudes que lleguen cuando se encuentre en el l\u00edmite (lo que solo puede ocurrir despu\u00e9s de que el cliente haya restablecido una solicitud existente en curso) se pondr\u00e1n en cola hasta que salga un controlador. Si la cola de solicitudes crece demasiado, el servidor finalizar\u00e1 la conexi\u00f3n. Este problema tambi\u00e9n se solucion\u00f3 en golang.org/x/net/http2 para los usuarios que configuran HTTP/2 manualmente. El l\u00edmite de simultaneidad de transmisiones predeterminado es 250 transmisiones (solicitudes) por conexi\u00f3n HTTP/2. Este valor se puede ajustar utilizando el paquete golang.org/x/net/http2; consulte la configuraci\u00f3n Server.MaxConcurrentStreams y la funci\u00f3n ConfigureServer."
}
],
"metrics": {},
@@ -40,6 +44,14 @@
"url": "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ",
"source": "security@golang.org"
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
+ "source": "security@golang.org"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
+ "source": "security@golang.org"
+ },
{
"url": "https://pkg.go.dev/vuln/GO-2023-2102",
"source": "security@golang.org"
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39331.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39331.json
new file mode 100644
index 00000000000..bf018a8ba09
--- /dev/null
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39331.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-39331",
+ "sourceIdentifier": "support@hackerone.com",
+ "published": "2023-10-18T04:15:11.257",
+ "lastModified": "2023-10-26T05:15:25.277",
+ "vulnStatus": "Modified",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A previously disclosed vulnerability (CVE-2023-30584) was patched insufficiently in commit 205f1e6. The new path traversal vulnerability arises because the implementation does not protect itself against the application overwriting built-in utility functions with user-defined implementations.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad previamente revelada (CVE-2023-30584) no se parch\u00f3 suficientemente en el commit 205f1e6. La nueva vulnerabilidad de path traversal surge porque la implementaci\u00f3n no se protege a s\u00ed misma contra la sobrescritura de funciones de utilidad integradas con implementaciones definidas por el usuario. Tenga en cuenta que en el momento en que se emiti\u00f3 este CVE, el modelo de permiso es una caracter\u00edstica experimental de Node.js."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "support@hackerone.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.7,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
+ "versionEndExcluding": "20.8.0",
+ "matchCriteriaId": "1DB6F476-F7D5-420C-9A17-FE634C92FF71"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://hackerone.com/reports/2092852",
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
+ "source": "support@hackerone.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
+ "source": "support@hackerone.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39332.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39332.json
new file mode 100644
index 00000000000..3442f534a8a
--- /dev/null
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39332.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-39332",
+ "sourceIdentifier": "support@hackerone.com",
+ "published": "2023-10-18T04:15:11.330",
+ "lastModified": "2023-10-26T05:15:25.353",
+ "vulnStatus": "Modified",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Various `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects.\n\nThis is distinct from CVE-2023-32004 ([report 2038134](https://hackerone.com/reports/2038134)), which only referred to `Buffer` objects. However, the vulnerability follows the same pattern using `Uint8Array` instead of `Buffer`.\n\nImpacts:\n\nThis vulnerability affects all users using the experimental permission model in Node.js 20.\n\nPlease note that at the time this CVE was issued, the permission model is an experimental feature of Node.js."
+ },
+ {
+ "lang": "es",
+ "value": "Varias funciones `node:fs` permiten especificar rutas como cadenas u objetos `Uint8Array`. En entornos Node.js, la clase `Buffer` extiende la clase `Uint8Array`. Node.js evita el path traversal a trav\u00e9s de cadenas (ver CVE-2023-30584) y objetos `Buffer` (ver CVE-2023-32004), pero no a trav\u00e9s de objetos `Uint8Array` que no son `Buffer`. Esto es distinto de CVE-2023-32004 ([reporte 2038134](https://hackerone.com/reports/2038134)), que solo hac\u00eda referencia a objetos \"Buffer\". Sin embargo, la vulnerabilidad sigue el mismo patr\u00f3n al usar \"Uint8Array\" en lugar de \"Buffer\". Impactos: esta vulnerabilidad afecta a todos los usuarios que utilizan el modelo de permiso experimental en Node.js 20. Tenga en cuenta que en el momento en que se emiti\u00f3 este CVE, el modelo de permiso es una caracter\u00edstica experimental de Node.js."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
+ "versionEndExcluding": "20.8.0",
+ "matchCriteriaId": "1DB6F476-F7D5-420C-9A17-FE634C92FF71"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://hackerone.com/reports/2199818",
+ "source": "support@hackerone.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
+ "source": "support@hackerone.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
+ "source": "support@hackerone.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39350.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39350.json
index 6b78b32b5ea..7214df5886a 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39350.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39350.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39350",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T20:15:08.170",
- "lastModified": "2023-10-07T21:15:15.343",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T14:56:44.890",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,19 +142,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39351.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39351.json
index aeb4f00ab43..5c9d6615185 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39351.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39351.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39351",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T20:15:08.280",
- "lastModified": "2023-10-07T21:15:15.470",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T14:57:07.010",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -105,19 +135,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39352.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39352.json
index 6317b2ea12a..67790e609d8 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39352.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39352.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39352",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T21:15:07.873",
- "lastModified": "2023-10-07T21:15:15.583",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T14:49:47.823",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,19 +142,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39353.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39353.json
index bd6c3924cdb..8c07fc7753b 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39353.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39353.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39353",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T21:15:08.213",
- "lastModified": "2023-10-07T21:15:15.703",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T13:43:53.717",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,19 +142,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39354.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39354.json
index f867e65490e..aff554707fd 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39354.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39354.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39354",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T20:15:08.367",
- "lastModified": "2023-10-07T21:15:15.820",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T14:11:33.407",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,19 +142,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39355.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39355.json
index 8c4b9a9d03f..81d1681c70a 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39355.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39355.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39355",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T20:15:08.457",
- "lastModified": "2023-10-07T21:15:15.933",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:25:35.660",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -86,6 +86,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -106,7 +121,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39356.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39356.json
index 930906eeee3..a27e546679d 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39356.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39356.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39356",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T21:15:08.390",
- "lastModified": "2023-10-07T21:15:16.030",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T13:45:00.427",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -126,19 +156,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39357.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39357.json
index e243c133344..276ea9161b6 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39357.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39357.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39357",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T22:15:08.637",
- "lastModified": "2023-10-13T04:15:12.090",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:53:09.170",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cacti is an open source operational monitoring and fault management framework. A defect in the sql_save function was discovered. When the column type is numeric, the sql_save function directly utilizes user input. Many files and functions calling the sql_save function do not perform prior validation of user input, leading to the existence of multiple SQL injection vulnerabilities in Cacti. This allows authenticated users to exploit these SQL injection vulnerabilities to perform privilege escalation and remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Cacti es un framework de c\u00f3digo abierto de monitorizaci\u00f3n operativa y gesti\u00f3n de fallos. Se ha descubierto un defecto en la funci\u00f3n \"sql_save\". Cuando el tipo de columna es num\u00e9rico, la funci\u00f3n \"sql_save\" utiliza directamente la entrada del usuario. Muchos archivos y funciones que llaman a la funci\u00f3n \"sql_save\" no realizan una validaci\u00f3n previa de la entrada del usuario, lo que provoca la existencia de m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Cacti. Esto permite a los usuarios autenticados explotar estas vulnerabilidades de inyecci\u00f3n SQL para llevar a cabo la escalada de privilegios ejecuci\u00f3n remota de c\u00f3digo. Este problema se ha solucionado en la versi\u00f3n 1.2.25. Se recomienda a los usuarios que actualicen. No se conocen solucionas para esta vulnerabilidad. "
}
],
"metrics": {
@@ -56,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -85,6 +99,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -98,11 +132,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39358.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39358.json
index d0aa10e9274..9e6b8b430a7 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39358.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39358.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39358",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T22:15:08.733",
- "lastModified": "2023-10-13T04:15:12.217",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:53:14.153",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -95,11 +115,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39359.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39359.json
index f4b88b68501..5f64889120f 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39359.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39359.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39359",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T21:15:46.143",
- "lastModified": "2023-10-13T04:15:12.317",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:23:26.760",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -105,11 +125,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39360.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39360.json
index 9db1c74dc11..5a5a677f873 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39360.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39360.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39360",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T21:15:46.800",
- "lastModified": "2023-10-13T04:15:12.443",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:23:21.923",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cacti is an open source operational monitoring and fault management framework.Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data. The vulnerability is found in `graphs_new.php`. Several validations are performed, but the `returnto` parameter is directly passed to `form_save_button`. In order to bypass this validation, returnto must contain `host.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output."
+ },
+ {
+ "lang": "es",
+ "value": "Cacti es un framework operacional de monitorizaci\u00f3n y gesti\u00f3n de fallos de c\u00f3digo abierto. Las versiones afectadas est\u00e1n sujetas a una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que permite a un usuario autenticado envenenar datos. La vulnerabilidad se encuentra en \"graphs_new.php\". Se realizan varias validaciones, pero el par\u00e1metro \"returnto\" se pasa directamente a \"form_save_button\". Para evitar esta validaci\u00f3n, returnto debe contener \"host.php\". Esta vulnerabilidad se ha solucionado en la versi\u00f3n 1.2.25. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deber\u00e1n filtrar manualmente la salida HTML. "
}
],
"metrics": {
@@ -81,6 +85,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,11 +118,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39361.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39361.json
index 88e1278f4c8..9a99dc7b97c 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39361.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39361.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39361",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T21:15:46.880",
- "lastModified": "2023-10-13T04:15:12.567",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:23:18.290",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -81,6 +81,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -94,11 +114,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39362.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39362.json
index 111d272908a..17ffa416d57 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39362.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39362.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39362",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T22:15:08.817",
- "lastModified": "2023-10-13T04:15:12.677",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:53:24.600",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, under certain conditions, an authenticated privileged user, can use a malicious string in the SNMP options of a Device, performing command injection and obtaining remote code execution on the underlying server. The `lib/snmp.php` file has a set of functions, with similar behavior, that accept in input some variables and place them into an `exec` call without a proper escape or validation. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Cacti es un framework de monitorizaci\u00f3n operacional y gesti\u00f3n de fallos de c\u00f3digo abierto. En Cacti v1.2.24, bajo ciertas condiciones, un usuario privilegiado autenticado, puede utilizar una cadena maliciosa en las opciones SNMP de un dispositivo, realizando inyecci\u00f3n de comandos y obteniendo ejecuci\u00f3n remota de c\u00f3digo en el servidor subyacente. El fichero \"lib/snmp.php\" tiene un conjunto de funciones, con un comportamiento similar, que aceptan en entrada algunas variables y las colocan en una llamada \"exec\" sin un escape o validaci\u00f3n adecuados. Este problema se ha solucionado en la versi\u00f3n 1.2.25. Se recomienda a los usuarios que actualicen. No se conocen soluciones para esta vulnerabilidad. "
}
],
"metrics": {
@@ -56,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-77"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -82,12 +96,37 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp",
@@ -99,11 +138,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39364.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39364.json
index 459d558792a..0767493500e 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39364.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39364.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39364",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T22:15:08.910",
- "lastModified": "2023-10-13T04:15:12.777",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:53:29.600",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -85,6 +85,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -98,11 +118,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39365.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39365.json
index 17a05029055..b62a97aebc9 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39365.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39365.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39365",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T22:15:09.017",
- "lastModified": "2023-10-13T04:15:12.890",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:53:34.923",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cacti is an open source operational monitoring and fault management framework. Issues with Cacti Regular Expression validation combined with the external links feature can lead to limited SQL Injections and subsequent data leakage. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Cacti es un framework de monitorizaci\u00f3n operativa y gesti\u00f3n de fallos de c\u00f3digo abierto. Los problemas con la validaci\u00f3n de expresiones regulares de Cacti combinados con la funci\u00f3n de enlaces externos pueden provocar inyecciones SQL limitadas y la consiguiente fuga de datos. Este problema se ha solucionado en la versi\u00f3n 1.2.25. Se recomienda a los usuarios que actualicen. No se conocen soluciones para esta vulnerabilidad. "
}
],
"metrics": {
@@ -92,6 +96,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -105,11 +129,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39366.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39366.json
index ea1497bdb28..00e8be537f2 100644
--- a/CVE-2023/CVE-2023-393xx/CVE-2023-39366.json
+++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39366.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39366",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T21:15:46.963",
- "lastModified": "2023-10-13T04:15:13.003",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:23:10.237",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The `data_sources.php` script displays the data source management information (e.g. data source path, polling configuration etc.) for different data visualizations of the _cacti_ app. \nCENSUS found that an adversary that is able to configure a malicious Device name, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http:///cacti/host.php`, while the rendered malicious payload is exhibited at `http:///cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output."
+ },
+ {
+ "lang": "es",
+ "value": "Cacti es un marco de monitorizaci\u00f3n operativa y gesti\u00f3n de fallos de c\u00f3digo abierto. Las versiones afectadas est\u00e1n sujetas a una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que permite a un usuario autenticado envenenar los datos almacenados en la base de datos de cacti. Estos datos ser\u00e1n vistos por las cuentas administrativas de cacti y ejecutar\u00e1n c\u00f3digo JavaScript en el navegador de la v\u00edctima en tiempo de visualizaci\u00f3n. El script \"data_sources.php\" muestra la informaci\u00f3n de gesti\u00f3n de la fuente de datos (por ejemplo, ruta de la fuente de datos, configuraci\u00f3n de sonde, etc) para diferentes visualizaciones de datos de la aplicaci\u00f3n cacti. CENSUS descubri\u00f3 que un adversario que es capaz de configurar un nombre de dispositivo malicioso, puede desplegar un ataque de XSS almacenado contra cualquier usuario con los mismos privilegios (o m\u00e1s amplios). Un usuario que posea los permisos de Administraci\u00f3n General-Sitios/Dispositivos/Datos puede configurar los nombres de los dispositivos en cacti. Esta configuraci\u00f3n se produce a trav\u00e9s de \"http:///cacti/host.php\", mientras que el payload malicioso renderizado se exhibe en \"http:///cacti/data_sources.php\". Esta vulnerabilidad se ha solucionado en la versi\u00f3n 1.2.25. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deber\u00e1n filtrar manualmente la salida HTML. "
}
],
"metrics": {
@@ -83,6 +87,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -96,11 +120,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39417.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39417.json
index 45f5ee263ce..582df9ce5a4 100644
--- a/CVE-2023/CVE-2023-394xx/CVE-2023-39417.json
+++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39417.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39417",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-11T13:15:09.870",
- "lastModified": "2023-10-04T00:15:11.890",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:27:38.720",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -140,6 +140,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -160,11 +175,17 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00003.html",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230915-0002/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.postgresql.org/support/security/CVE-2023-39417",
diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39427.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39427.json
new file mode 100644
index 00000000000..8e25e6ab078
--- /dev/null
+++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39427.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-39427",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T20:15:08.510",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nIn Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En Ashlar-Vellum Cobalt, Xenon, Argon, Lithium y Cobalt Share v12 SP0 Build (1204.77), las aplicaciones afectadas carecen de una validaci\u00f3n adecuada de los datos proporcionados por el usuario al analizar archivos XE. Esto podr\u00eda provocar una escritura fuera de los l\u00edmites. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-03",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39431.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39431.json
new file mode 100644
index 00000000000..8fb6aa255ba
--- /dev/null
+++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39431.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-39431",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T18:15:09.647",
+ "lastModified": "2023-10-25T13:50:25.650",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\nSante DICOM Viewer Pro lacks proper validation of user-supplied data when parsing DICOM files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Sante DICOM Viewer Pro carece de una validaci\u00f3n adecuada de los datos proporcionados por el usuario al analizar archivos DICOM. Esto podr\u00eda provocar una escritura fuera de l\u00edmites. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "12.2.6",
+ "matchCriteriaId": "5D4EC8EE-4148-43B2-8E1A-EAE05484DDF4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-285-01",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39453.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39453.json
index c1a84446bcf..b3bfbf568eb 100644
--- a/CVE-2023/CVE-2023-394xx/CVE-2023-39453.json
+++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39453.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39453",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-09-25T16:15:14.093",
- "lastModified": "2023-10-09T19:15:10.103",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:49:24.817",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -11,7 +11,7 @@
},
{
"lang": "es",
- "value": "Existe una vulnerabilidad de uso despu\u00e9s de la liberaci\u00f3n en la funcionalidad tif_parse_sub_IFD de Accusoft ImageGear 20.1. Un archivo con formato incorrecto especialmente manipulado puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede entregar un archivo para desencadenar esta vulnerabilidad."
+ "value": "Existe una vulnerabilidad de use-after-free en la funcionalidad tif_parse_sub_IFD de Accusoft ImageGear 20.1. Un archivo con formato incorrecto especialmente manipulado puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. Un atacante puede entregar este archivo para desencadenar esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39456.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39456.json
index 810b05afdbd..aa614177eff 100644
--- a/CVE-2023/CVE-2023-394xx/CVE-2023-39456.json
+++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39456.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39456",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-17T07:15:09.737",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:10:52.703",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Traffic Server con frames HTTP/2 con formato incorrecto. Este problema afecta a Apache Traffic Server: desde 9.0.0 hasta 9.2.2. Se recomienda a los usuarios actualizar a la versi\u00f3n 9.2.3, que soluciona el problema."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "security@apache.org",
@@ -27,10 +50,67 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.0.0",
+ "versionEndExcluding": "9.2.3",
+ "matchCriteriaId": "4E4BCAF6-B246-41EC-9EE1-24296BFC4F5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39510.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39510.json
index 85c8a5eee19..6a8e17b6f0b 100644
--- a/CVE-2023/CVE-2023-395xx/CVE-2023-39510.json
+++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39510.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39510",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T21:15:47.047",
- "lastModified": "2023-10-13T04:15:13.100",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:51:00.017",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -56,7 +56,7 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -64,6 +64,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -82,6 +92,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -95,11 +125,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39511.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39511.json
index 9803d6ca2b3..c48d038461d 100644
--- a/CVE-2023/CVE-2023-395xx/CVE-2023-39511.json
+++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39511.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39511",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-06T18:15:08.627",
- "lastModified": "2023-10-13T04:15:13.200",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:57:35.533",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -86,6 +86,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -99,11 +119,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39512.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39512.json
index b7cec44fc7a..153154fc9a7 100644
--- a/CVE-2023/CVE-2023-395xx/CVE-2023-39512.json
+++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39512.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39512",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T21:15:47.127",
- "lastModified": "2023-10-13T04:15:13.327",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:51:07.147",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The script under `data_sources.php` displays the data source management information (e.g. data source path, polling configuration, device name related to the datasource etc.) for different data visualizations of the _cacti_ app. _CENSUS_ found that an adversary that is able to configure a malicious device name, can deploy a stored XSS attack against any user of the same (or broader) privileges. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http:///cacti/host.php`, while the rendered malicious payload is exhibited at `http:///cacti/data_sources.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output."
+ },
+ {
+ "lang": "es",
+ "value": "Cacti es un framework de monitorizaci\u00f3n operativo y gesti\u00f3n de fallos de c\u00f3digo abierto. Las versiones afectadas est\u00e1n sujetas a una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que permite a un usuario autenticado envenenar los datos almacenados en la base de datos de _cacti_. Estos datos ser\u00e1n vistos por las cuentas administrativas de _cacti_ y ejecutar\u00e1n c\u00f3digo JavaScript en el navegador de la v\u00edctima en tiempo de visualizaci\u00f3n. El script bajo \"data_sources.php\" muestra la informaci\u00f3n de gesti\u00f3n de la fuente de datos (por ejemplo, ruta de la fuente de datos, configuraci\u00f3n de sondeo, nombre del dispositivo relacionado con la fuente de datos, etc.) para diferentes visualizaciones de datos de la aplicaci\u00f3n _cacti_. _CENSUS_ descubri\u00f3 que un adversario que es capaz de configurar un nombre de dispositivo malicioso, puede desplegar un ataque de XSS almacenado contra cualquier usuario con los mismos privilegios (o m\u00e1s amplios). Un usuario que posea los permisos de _Administraci\u00f3n General - Sitios/Dispositivos/Datos_ puede configurar los nombres de los dispositivos en _cacti_. Esta configuraci\u00f3n se produce a trav\u00e9s de \"http:///cacti/host.php\", mientras que el payload malicioso renderizado se exhibe en \"http:///cacti/data_sources.php\". Esta vulnerabilidad se ha solucionado en la versi\u00f3n 1.2.25. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deber\u00e1n filtrar manualmente la salida HTML."
}
],
"metrics": {
@@ -82,6 +86,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -95,11 +119,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39513.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39513.json
index ca96314d554..e88903fdefe 100644
--- a/CVE-2023/CVE-2023-395xx/CVE-2023-39513.json
+++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39513.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39513",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T21:15:47.213",
- "lastModified": "2023-10-13T04:15:13.423",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:51:10.993",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -95,11 +115,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39514.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39514.json
index 5332b4cfafe..da20029e2ce 100644
--- a/CVE-2023/CVE-2023-395xx/CVE-2023-39514.json
+++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39514.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-39514",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T21:15:47.297",
- "lastModified": "2023-10-13T04:15:13.530",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:51:16.950",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_'s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim's browser at view-time. The script under `graphs.php` displays graph details such as data-source paths, data template information and graph related fields. _CENSUS_ found that an adversary that is able to configure either a data-source template with malicious code appended in the data-source name or a device with a malicious payload injected in the device name, may deploy a stored XSS attack against any user with _General Administration>Graphs_ privileges. A user that possesses the _Template Editor>Data Templates_ permissions can configure the data-source name in _cacti_. Please note that this may be a _low privileged_ user. This configuration occurs through `http:///cacti/data_templates.php` by editing an existing or adding a new data template. If a template is linked to a graph then the formatted template name will be rendered in the graph's management page. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device name in _cacti_. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to upgrade should add manual HTML escaping.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Cacti es un framework de monitorizaci\u00f3n operativa y gesti\u00f3n de fallos de c\u00f3digo abierto. Las versiones afectadas est\u00e1n sujetas a una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que permite a un usuario autenticado envenenar a los datos almacenados en la base de datos de cacti. Estos datos ser\u00e1n visualizados por las cuentas administrativas de cacti y ejecutar\u00e1n c\u00f3digo JavaScript en el navegador de la v\u00edctima en tiempo de visualizaci\u00f3n. El script bajo \"graphs.php\" muestra detalles del gr\u00e1fico como rutas de origen de datos, informaci\u00f3n de la plantilla de datos y campos relacionados con el gr\u00e1fico _CENSUS_ descubri\u00f3 que un adversario que es capaz de configurar una plantilla de fuente de datos con c\u00f3digo malicioso a\u00f1adido en el nombre de la fuente de datos o un dispositivo con una carga maliciosa inyectada en el nombre del dispositivo, puede desplegar un ataque XSS almacenado contra cualquier usuario con privilegios de Administraci\u00f3n General - Gr\u00e1ficos. Un usuario que posea los permisos de Editor de plantillas - Plantilla de datos puede configurar el nombre de la fuente de datos en cacti. Tenga en cuenta que puede tratarse de un usuario con privilegios bajos. Esta configuraci\u00f3n se realiza a trav\u00e9s de \"http:///cacti/data_templates.php\" editando una plantilla de datos existente o a\u00f1adiendo una nueva. Si una plantilla est\u00e1 vinculada a un gr\u00e1fico, el nombre formateado de la plantilla se mostrar\u00e1 en la p\u00e1gina de gesti\u00f3n del gr\u00e1fico. Un usuario que posea los permisos Administraci\u00f3n General - Sitios/Dispositivos/Datos puede configurar el nombre del dispositivos en cacti. Esta vulnerabilidad se ha solucionado en la versi\u00f3n 1.2.25. Se recomienda a los usuarios que la actualicen. Los usuarios que no puedan actualizar deber\u00e1n a\u00f1adir manualmente el escape HTML. "
}
],
"metrics": {
@@ -82,6 +86,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -95,11 +119,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39515.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39515.json
index ac257d185eb..f79ce96386d 100644
--- a/CVE-2023/CVE-2023-395xx/CVE-2023-39515.json
+++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39515.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39515",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T21:15:47.387",
- "lastModified": "2023-10-13T04:15:13.640",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:51:25.143",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -95,11 +115,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39516.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39516.json
index 8dc6087d33f..e99f1f1e717 100644
--- a/CVE-2023/CVE-2023-395xx/CVE-2023-39516.json
+++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39516.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39516",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-05T22:15:09.180",
- "lastModified": "2023-10-13T04:15:13.740",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T19:57:32.023",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -95,11 +115,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFH3J2WVBKY4ZJNMARVOWJQK6PSLPHFH/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGB2UXJEUYWWA6IWVFQ3ZTP22FIHMGN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39600.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39600.json
index 31059967ef2..c2ae2b8cd92 100644
--- a/CVE-2023/CVE-2023-396xx/CVE-2023-39600.json
+++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39600.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39600",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-25T20:15:08.380",
- "lastModified": "2023-09-01T16:15:08.287",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:27:27.923",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,7 +66,10 @@
"references": [
{
"url": "https://icewarp.com",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://medium.com/@katikitala.sushmitha078/cross-site-scripting-reflected-xss-in-icewarp-server-cve-2023-39600-310a7e1c8817",
diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39619.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39619.json
new file mode 100644
index 00000000000..5bee4b5b992
--- /dev/null
+++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39619.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-39619",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.083",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "ReDos in NPMJS Node Email Check v.1.0.4 allows an attacker to cause a denial of service via a crafted string to the scpSyntax component."
+ },
+ {
+ "lang": "es",
+ "value": "ReDos en NPMJS Node Email Check v.1.0.4 permite a un atacante provocar una Denegaci\u00f3n de Servicio (DoS) a trav\u00e9s de una cadena manipulada en el componente scpSyntax."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/6en6ar/712a4c1eab0324f15e09232c77ea08f8",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/teomantuncer/node-email-check/blob/main/main.js,",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.npmjs.com/package/node-email-check",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-396xx/CVE-2023-39680.json b/CVE-2023/CVE-2023-396xx/CVE-2023-39680.json
new file mode 100644
index 00000000000..9ad23002e84
--- /dev/null
+++ b/CVE-2023/CVE-2023-396xx/CVE-2023-39680.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-39680",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T07:15:15.317",
+ "lastModified": "2023-10-26T17:36:04.000",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sollace Unicopia version 1.1.1 and before was discovered to deserialize untrusted data, allowing attackers to execute arbitrary code."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Sollace Unicopia versi\u00f3n 1.1.1 y anteriores deserializaba datos que no eran de confianza, lo que permit\u00eda a los atacantes ejecutar c\u00f3digo arbitrario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@mitre.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:sollace:unicopia:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.2.0",
+ "matchCriteriaId": "CFE1E9EC-0FF3-4557-AFB5-CF1BE0479E9C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://gist.github.com/apple502j/4ab77291c98e45f4a5bf780c8eda8afa",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39726.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39726.json
new file mode 100644
index 00000000000..c17edd57690
--- /dev/null
+++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39726.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-39726",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T21:15:07.857",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in Mintty v.3.6.4 and before allows a remote attacker to execute arbitrary code via crafted commands to the terminal."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en Mintty v.3.6.4 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario mediante comandos manipulados en la terminal."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://dgl.cx/2023/09/ansi-terminal-security#mintty-osc50",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39731.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39731.json
new file mode 100644
index 00000000000..4bdd0a8b8ca
--- /dev/null
+++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39731.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-39731",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T00:15:14.300",
+ "lastModified": "2023-10-26T15:33:42.247",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The leakage of the client secret in Kaibutsunosato v13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages."
+ },
+ {
+ "lang": "es",
+ "value": "La filtraci\u00f3n del secreto del cliente en Kaibutsunosato v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes de difusi\u00f3n manipulados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:line:kaibutsunosato:13.6.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0BDE9EE0-9927-43F3-BC42-C22AEA4B2C8B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39731.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://liff.line.me/1657662489-pwEQNzJ4",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39732.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39732.json
new file mode 100644
index 00000000000..8c89661839c
--- /dev/null
+++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39732.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-39732",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.200",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The leakage of the client secret in Tokueimaru_waiting Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages."
+ },
+ {
+ "lang": "es",
+ "value": "La filtraci\u00f3n del secreto del cliente en Tokueimaru_waiting Line 13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes de difusi\u00f3n manipulados."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39732.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1657574837-elb6bNQj",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39733.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39733.json
new file mode 100644
index 00000000000..7fbbd61c229
--- /dev/null
+++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39733.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-39733",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.247",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The leakage of the client secret in TonTon-Tei Line v13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages."
+ },
+ {
+ "lang": "es",
+ "value": "La filtraci\u00f3n del secreto del cliente en TonTon-Tei Line v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes de difusi\u00f3n manipulados."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39733.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1656987103-bk5k9PO4",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39734.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39734.json
new file mode 100644
index 00000000000..3ba5101a5bf
--- /dev/null
+++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39734.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-39734",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.293",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The leakage of the client secret in VISION MEAT WORKS TrackDiner10/10_mc Line v13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages."
+ },
+ {
+ "lang": "es",
+ "value": "La filtraci\u00f3n del secreto del cliente en VISION MEAT WORKS TrackDiner10/10_mc Line v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes de difusi\u00f3n manipulados."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39734.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1660679145-eMKgg4rJ",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39735.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39735.json
new file mode 100644
index 00000000000..dc21179b526
--- /dev/null
+++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39735.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-39735",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.337",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The leakage of the client secret in Uomasa_Saiji_news Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages."
+ },
+ {
+ "lang": "es",
+ "value": "La filtraci\u00f3n del secreto del cliente en Uomasa_Saiji_news Line 13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes de difusi\u00f3n manipulados."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39735.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1657409177-MkPLqO5D",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39736.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39736.json
new file mode 100644
index 00000000000..790299ea5c7
--- /dev/null
+++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39736.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-39736",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.380",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The leakage of the client secret in Fukunaga_memberscard Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages."
+ },
+ {
+ "lang": "es",
+ "value": "La filtraci\u00f3n del secreto del cliente en Fukunaga_memberscard Line 13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes de difusi\u00f3n manipulados."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39736.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1657606123-4Kp0xVrP",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39737.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39737.json
new file mode 100644
index 00000000000..2fb4a108a1b
--- /dev/null
+++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39737.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-39737",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.423",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The leakage of the client secret in Matsuya Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages."
+ },
+ {
+ "lang": "es",
+ "value": "La filtraci\u00f3n del secreto del cliente en Matsuya Line 13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes de difusi\u00f3n manipulados."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39737.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1657535522-JD5Q5Yp1",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39739.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39739.json
new file mode 100644
index 00000000000..fa032d4b6b0
--- /dev/null
+++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39739.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-39739",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.470",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The leakage of the client secret in REGINA SWEETS&BAKERY Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages."
+ },
+ {
+ "lang": "es",
+ "value": "La filtraci\u00f3n del secreto del cliente en REGINA SWEETS&BAKERY Line 13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes de difusi\u00f3n manipulados."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39739.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1656985266-EmlxqQQx",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-397xx/CVE-2023-39740.json b/CVE-2023/CVE-2023-397xx/CVE-2023-39740.json
new file mode 100644
index 00000000000..a977be50f89
--- /dev/null
+++ b/CVE-2023/CVE-2023-397xx/CVE-2023-39740.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-39740",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.517",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The leakage of the client secret in Onigiriya-musubee Line 13.6.1 allows attackers to obtain the channel access token and send crafted broadcast messages."
+ },
+ {
+ "lang": "es",
+ "value": "La filtraci\u00f3n del secreto del cliente en Onigiriya-musubee Line 13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes de difusi\u00f3n manipulados."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39740.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://liff.line.me/1657597257-0ozj8DwJ",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-398xx/CVE-2023-39814.json b/CVE-2023/CVE-2023-398xx/CVE-2023-39814.json
new file mode 100644
index 00000000000..2889ab26edc
--- /dev/null
+++ b/CVE-2023/CVE-2023-398xx/CVE-2023-39814.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2023-39814",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.560",
+ "lastModified": "2023-10-25T18:17:29.560",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-398xx/CVE-2023-39815.json b/CVE-2023/CVE-2023-398xx/CVE-2023-39815.json
new file mode 100644
index 00000000000..fed131416e5
--- /dev/null
+++ b/CVE-2023/CVE-2023-398xx/CVE-2023-39815.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2023-39815",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.607",
+ "lastModified": "2023-10-25T18:17:29.607",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-398xx/CVE-2023-39816.json b/CVE-2023/CVE-2023-398xx/CVE-2023-39816.json
new file mode 100644
index 00000000000..3ed3e9d6fe4
--- /dev/null
+++ b/CVE-2023/CVE-2023-398xx/CVE-2023-39816.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2023-39816",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.660",
+ "lastModified": "2023-10-25T18:17:29.660",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-398xx/CVE-2023-39817.json b/CVE-2023/CVE-2023-398xx/CVE-2023-39817.json
new file mode 100644
index 00000000000..56135f81e21
--- /dev/null
+++ b/CVE-2023/CVE-2023-398xx/CVE-2023-39817.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2023-39817",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:29.710",
+ "lastModified": "2023-10-25T18:17:29.710",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39902.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39902.json
index e9b9f774e47..1c05a8adaef 100644
--- a/CVE-2023/CVE-2023-399xx/CVE-2023-39902.json
+++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39902.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-39902",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T12:15:09.960",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T19:30:50.777",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A software vulnerability has been identified in the U-Boot Secondary Program Loader (SPL) before 2023.07 on select NXP i.MX 8M family processors. Under certain conditions, a crafted Flattened Image Tree (FIT) format structure can be used to overwrite SPL memory, allowing unauthenticated software to execute on the target, leading to privilege escalation. This affects i.MX 8M, i.MX 8M Mini, i.MX 8M Nano, and i.MX 8M Plus."
+ },
+ {
+ "lang": "es",
+ "value": "Se identific\u00f3 una vulnerabilidad de software en U-Boot Secondary Program Loader (SPL) antes de 2023.07 en procesadores seleccionados de la familia NXP i.MX 8M. En determinadas condiciones, se puede utilizar una estructura de Flattened Image Tree (FIT) manipulada para sobrescribir la memoria SPL, lo que permite que se ejecute software no autenticado en el destino, lo que lleva a una escalada de privilegios. Esto afecta a i.MX 8M, i.MX 8M Mini, i.MX 8M Nano y i.MX 8M Plus."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "cve@mitre.org",
"type": "Secondary",
@@ -34,14 +58,79 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-281"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:nxp:uboot_secondary_program_loader:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.07",
+ "matchCriteriaId": "D09473A1-CB04-4CD7-9540-D48F86FBC25C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:nxp:i.mx_8m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0ED3090-0E33-4183-BFC6-1136BDDAE352"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:nxp:i.mx_8m_mini:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C1822E0E-4DF8-411F-A890-D748F2124869"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:nxp:i.mx_8m_nano:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FFA7C7D-B4D6-4D5A-A411-492A112B30D4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:nxp:i.mx_8m_plus:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "006051D6-02C6-4E4C-928C-F43AB5B32859"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://community.nxp.com/t5/i-MX-Security/U-Boot-Secondary-Program-Loader-Authentication-Vulnerability-CVE/ta-p/1736196",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mitigation",
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://nxp.com",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39924.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39924.json
new file mode 100644
index 00000000000..4592489fa01
--- /dev/null
+++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39924.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-39924",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:29.753",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Mitchell Bennis Simple File List plugin <=\u00a06.1.9 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenado autenticado (con permisos de admin o superiores) en el complemento Mitchell Bennis Simple File List en versiones <= 6.1.9."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/simple-file-list/wordpress-simple-file-list-plugin-6-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39928.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39928.json
index 5edc918cc93..9b68aac04ce 100644
--- a/CVE-2023/CVE-2023-399xx/CVE-2023-39928.json
+++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39928.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39928",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-10-06T16:15:13.223",
- "lastModified": "2023-10-14T03:15:09.890",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T20:17:21.957",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -95,12 +95,41 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831",
@@ -118,7 +147,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5527",
- "source": "talos-cna@cisco.com"
+ "source": "talos-cna@cisco.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39930.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39930.json
new file mode 100644
index 00000000000..33a256241a5
--- /dev/null
+++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39930.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-39930",
+ "sourceIdentifier": "responsible-disclosure@pingidentity.com",
+ "published": "2023-10-25T18:17:29.823",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A first-factor authentication bypass vulnerability exists in the PingFederate with PingID Radius PCV when a MSCHAP authentication request is sent via a maliciously crafted RADIUS client request."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n de primer factor en PingFederate con PingID Radius PCV cuando se env\u00eda una solicitud de autenticaci\u00f3n MSCHAP a trav\u00e9s de una solicitud de cliente RADIUS manipulada con fines malintencionados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "responsible-disclosure@pingidentity.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "responsible-disclosure@pingidentity.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-288"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://docs.pingidentity.com/r/en-us/pingid/pingid_integration_kit_2_26_rn",
+ "source": "responsible-disclosure@pingidentity.com"
+ },
+ {
+ "url": "https://www.pingidentity.com/en/resources/downloads/pingfederate.html",
+ "source": "responsible-disclosure@pingidentity.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39936.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39936.json
new file mode 100644
index 00000000000..04fa1a2a7ff
--- /dev/null
+++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39936.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-39936",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T20:15:08.573",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\nIn Ashlar-Vellum Graphite v13.0.48, the affected application lacks proper validation of user-supplied data when parsing VC6 files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En Ashlar-Vellum Graphite v13.0.48, la aplicaci\u00f3n afectada carece de una validaci\u00f3n adecuada de los datos proporcionados por el usuario al analizar archivos VC6. Esto podr\u00eda dar lugar a una lectura fuera de los l\u00edmites. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-03",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39960.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39960.json
index eaf0c0386e6..99e822f8dd6 100644
--- a/CVE-2023/CVE-2023-399xx/CVE-2023-39960.json
+++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39960.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-39960",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-13T13:15:11.560",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:45:38.277",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server starting with 25.0.0 and prior to 25.09 and 26.04; as well as Nextcloud Enterprise Server starting with 22.0.0 and prior to 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4; missing protection allows an attacker to brute force passwords on the WebDAV API. Nextcloud Server 25.0.9 and 26.0.4 and Nextcloud Enterprise Server 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9, and 26.0.4 contain patches for this issue. No known workarounds are available."
+ },
+ {
+ "lang": "es",
+ "value": "Nextcloud Server proporciona almacenamiento de datos para Nextcloud, una plataforma en la nube de c\u00f3digo abierto. En Nextcloud Server a partir de la versi\u00f3n 25.0.0 y anteriores a las 25.09 y 26.04; as\u00ed como Nextcloud Enterprise Server a partir de la versi\u00f3n 22.0.0 y anteriores a las 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9 y 26.0.4; La falta de protecci\u00f3n permite a un atacante forzar contrase\u00f1as de fuerza bruta en la API WebDAV. Nextcloud Server versiones 25.0.9 y 26.0.4 y Nextcloud Enterprise Server versiones 22.2.10.14, 23.0.12.9, 24.0.12.5, 25.0.9 y 26.0.4 contienen parches para este problema. No se conocen workarounds disponibles."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,89 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "22.0.0",
+ "versionEndExcluding": "22.2.10.14",
+ "matchCriteriaId": "916FDFBE-023F-4EC1-947B-8B2F2A0E5E84"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "23.0.0",
+ "versionEndExcluding": "23.0.12.9",
+ "matchCriteriaId": "881A0D0D-1888-43D8-A22C-FD38D28EB601"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "24.0.0",
+ "versionEndExcluding": "24.0.12.5",
+ "matchCriteriaId": "B2AF81DA-6377-4051-AF70-141FC50E049F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
+ "versionStartIncluding": "25.0.0",
+ "versionEndExcluding": "25.0.9",
+ "matchCriteriaId": "623D58E0-57A0-42B3-8ED6-DF3B988633AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "25.0.0",
+ "versionEndExcluding": "25.0.9",
+ "matchCriteriaId": "D60D3184-C289-49E8-9FBE-EDA8B927131A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
+ "versionStartIncluding": "26.0.0",
+ "versionEndExcluding": "26.0.4",
+ "matchCriteriaId": "CA187E45-EB4B-468A-9291-FD66B360B2D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "26.0.0",
+ "versionEndExcluding": "26.0.4",
+ "matchCriteriaId": "2D0FA653-A595-4EC8-9F77-0AD1A4699B07"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2hrc-5fgp-c9c9",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/nextcloud/server/pull/38046",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
},
{
"url": "https://hackerone.com/reports/1924212",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39999.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39999.json
index 5c9bd687b09..2129b210ae9 100644
--- a/CVE-2023/CVE-2023-399xx/CVE-2023-39999.json
+++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39999.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-39999",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T12:15:09.970",
- "lastModified": "2023-10-16T16:15:53.773",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:29.893",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -60,22 +60,22 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "NVD-CWE-noinfo"
+ "value": "CWE-200"
}
]
},
{
- "source": "audit@patchstack.com",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-200"
+ "value": "NVD-CWE-noinfo"
}
]
}
@@ -254,6 +254,14 @@
}
],
"references": [
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/",
+ "source": "audit@patchstack.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/",
+ "source": "audit@patchstack.com"
+ },
{
"url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve",
"source": "audit@patchstack.com",
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3932.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3932.json
index 619e8ea92ee..7ee550b0bcd 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3932.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3932.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3932",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-08-03T05:15:10.723",
- "lastModified": "2023-10-04T06:15:10.537",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:04:39.057",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -114,7 +114,7 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/417594",
"source": "cve@gitlab.com",
"tags": [
- "Broken Link"
+ "Exploit"
]
},
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3933.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3933.json
new file mode 100644
index 00000000000..8587455b923
--- /dev/null
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3933.json
@@ -0,0 +1,121 @@
+{
+ "id": "CVE-2023-3933",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T16:15:19.247",
+ "lastModified": "2023-10-27T18:50:31.337",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Your Journey theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El Your Journey theme para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s de la contaminaci\u00f3n de prototipos en versiones hasta la 1.9.8 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1321"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wiloke:your_journey:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.9.8",
+ "matchCriteriaId": "3F098927-59A5-4C4C-A51B-AB44853FA0AC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/BlackFan/client-side-prototype-pollution",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c738e051-ad1c-4115-94d3-127dd5dff935?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3962.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3962.json
new file mode 100644
index 00000000000..bebc8cc98c7
--- /dev/null
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3962.json
@@ -0,0 +1,121 @@
+{
+ "id": "CVE-2023-3962",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T16:15:19.333",
+ "lastModified": "2023-10-26T14:39:46.853",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Winters theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.4.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El Winters theme para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s de la contaminaci\u00f3n de prototipos en versiones hasta la 1.4.3 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1321"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:myshopkit:winters:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.4.3",
+ "matchCriteriaId": "D819F161-81FA-456E-9540-80B6F833A095"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/BlackFan/client-side-prototype-pollution",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f8b75a1-f0f2-445b-a1c7-1628916470d3?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3965.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3965.json
new file mode 100644
index 00000000000..06fd8962651
--- /dev/null
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3965.json
@@ -0,0 +1,121 @@
+{
+ "id": "CVE-2023-3965",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T16:15:19.417",
+ "lastModified": "2023-10-26T14:39:44.993",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The nsc theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El nsc theme para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s de la contaminaci\u00f3n de prototipos en versiones hasta 1.0 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y un escape de salida. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1321"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:saleswizard:nsc:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.0",
+ "matchCriteriaId": "E5B84F55-17CA-4714-9533-37FECBA9B7E1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/BlackFan/client-side-prototype-pollution",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5909513d-8877-40ff-bee9-d565141b7ed2?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3991.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3991.json
index 4c76017c3ec..c7ea7a911c7 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3991.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3991.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-3991",
"sourceIdentifier": "cve_disclosure@tech.gov.sg",
"published": "2023-10-16T10:15:11.000",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T15:21:56.180",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in the httpd iperfrun.cgi functionality of FreshTomato 2023.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la funcionalidad httpd iperfrun.cgi de FreshTomato 2023.3. Una solicitud HTTP especialmente manipulada puede provocar la ejecuci\u00f3n de un comando arbitrario. Un atacante puede enviar una solicitud HTTP para desencadenar esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
{
"source": "cve_disclosure@tech.gov.sg",
"type": "Secondary",
@@ -46,10 +80,30 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:freshtomato:freshtomato:2023.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C445939-BA12-44AD-928C-F0D2C52F3B9E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://govtech-csg.github.io/security-advisories/2023/10/16/CVE-2023-3991.html",
- "source": "cve_disclosure@tech.gov.sg"
+ "source": "cve_disclosure@tech.gov.sg",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3996.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3996.json
new file mode 100644
index 00000000000..00354092ac7
--- /dev/null
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3996.json
@@ -0,0 +1,138 @@
+{
+ "id": "CVE-2023-3996",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.143",
+ "lastModified": "2023-10-26T14:49:49.727",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The ARMember Lite - Membership Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 4.0.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento ARMember Lite - Membership para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s de la configuraci\u00f3n de administrador en versiones hasta la 4.0.14 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:armemberplugin:armember:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "4.0.14",
+ "matchCriteriaId": "50AFACDC-998F-462E-8058-097622418822"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.svn.wordpress.org/armember-membership/tags/4.0.2/readme.md",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Broken Link"
+ ]
+ },
+ {
+ "url": "https://plugins.svn.wordpress.org/armember-membership/tags/4.0.2/readme.txt",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2905086%40armember-membership%2Ftrunk&old=2885708%40armember-membership%2Ftrunk&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.armemberplugin.com",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c1022ac4-869e-415a-a7c8-3650421608ea?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3997.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3997.json
index 463d34bda31..63597c5cb2e 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3997.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3997.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-3997",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-07-31T17:15:10.110",
- "lastModified": "2023-08-19T01:15:09.100",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T18:17:30.643",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Splunk SOAR versions lower than 6.1.0 are indirectly affected by a potential vulnerability accessed through the user\u2019s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user\u2019s action."
+ "value": "Splunk SOAR versions 6.0.2 and earlier are indirectly affected by a potential vulnerability accessed through the user\u2019s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user\u2019s action."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3998.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3998.json
new file mode 100644
index 00000000000..f4ead5cb2cd
--- /dev/null
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3998.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-3998",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.213",
+ "lastModified": "2023-10-26T14:59:48.007",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the userRate function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a post."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento wpDiscuz para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de autorizaci\u00f3n en la funci\u00f3n userRate en versiones hasta la 7.6.3 incluida. Esto hace posible que atacantes no autenticados aumenten o disminuyan la calificaci\u00f3n de una publicaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-639"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "7.6.3",
+ "matchCriteriaId": "B283E8CD-2054-4D79-A517-8D7228A3AE66"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wpdiscuz/trunk/utils/class.WpdiscuzHelperAjax.php#L886",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9d09bdab-ffab-44cc-bba2-821b21a8e343?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40029.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40029.json
index 2bc8f7433cc..9cee4524c5a 100644
--- a/CVE-2023/CVE-2023-400xx/CVE-2023-40029.json
+++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40029.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-40029",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-07T23:15:09.763",
- "lastModified": "2023-09-13T14:49:32.197",
+ "lastModified": "2023-10-27T14:31:09.933",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Argo CD is a declarative continuous deployment for Kubernetes. Argo CD Cluster secrets might be managed declaratively using Argo CD / kubectl apply. As a result, the full secret body is stored in`kubectl.kubernetes.io/last-applied-configuration` annotation. pull request #7139 introduced the ability to manage cluster labels and annotations. Since clusters are stored as secrets it also exposes the `kubectl.kubernetes.io/last-applied-configuration` annotation which includes full secret body. In order to view the cluster annotations via the Argo CD API, the user must have `clusters, get` RBAC access. **Note:** In many cases, cluster secrets do not contain any actually-secret information. But sometimes, as in bearer-token auth, the contents might be very sensitive. The bug has been patched in versions 2.8.3, 2.7.14, and 2.6.15. Users are advised to upgrade. Users unable to upgrade should update/deploy cluster secret with `server-side-apply` flag which does not use or rely on `kubectl.kubernetes.io/last-applied-configuration` annotation. Note: annotation for existing secrets will require manual removal.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Argo CD es una implementaci\u00f3n continua declarativa para Kubernetes. Los secretos de Argo CD Cluster se pueden administrar de forma declarativa utilizando Argo CD / kubectl apply. Como resultado, el secret body completo se almacena en la anotaci\u00f3n `kubectl.kubernetes.io/last-applied-configuration`. La solicitud de extracci\u00f3n #7139 introdujo la capacidad de administrar etiquetas y anotaciones del cl\u00faster. Dado que los cl\u00fasteres se almacenan como secretos, tambi\u00e9n expone la anotaci\u00f3n `kubectl.kubernetes.io/last-applied-configuration` que incluye el secret body completo. Para ver las anotaciones del cl\u00faster a trav\u00e9s de la API de Argo CD, el usuario debe tener acceso RBAC \"clusters, get\". **Nota:** En muchos casos, los secretos del cl\u00faster no contienen ninguna informaci\u00f3n realmente secreta. Pero a veces, como en la autenticaci\u00f3n de token de portador, el contenido puede ser muy sensible. El error se corrigi\u00f3 en las versiones 2.8.3, 2.7.14 y 2.6.15. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben actualizar/implementar el secreto del cl\u00faster con el indicador `server-side-apply` que no utiliza ni depende de la anotaci\u00f3n `kubectl.kubernetes.io/last-applied-configuration`. Nota: la anotaci\u00f3n de secretos existentes requerir\u00e1 eliminaci\u00f3n manual."
}
],
"metrics": {
@@ -17,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
- "scope": "UNCHANGED",
+ "scope": "CHANGED",
"confidentialityImpact": "HIGH",
- "integrityImpact": "NONE",
+ "integrityImpact": "HIGH",
"availabilityImpact": "NONE",
- "baseScore": 6.5,
- "baseSeverity": "MEDIUM"
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
},
- "exploitabilityScore": 2.8,
- "impactScore": 3.6
+ "exploitabilityScore": 3.1,
+ "impactScore": 5.8
},
{
"source": "security-advisories@github.com",
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40116.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40116.json
new file mode 100644
index 00000000000..8d75bc3f97c
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40116.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40116",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:08.567",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In onTaskAppeared of PipTaskOrganizer.java, there is a possible way to bypass background activity launch restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/18c3b194642f3949d09e48c21da5658fa04994c8",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40117.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40117.json
new file mode 100644
index 00000000000..d81498c259a
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40117.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-40117",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:08.620",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In resetSettingsLocked of SettingsProvider.java, there is a possible lockscreen bypass due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/ff86ff28cf82124f8e65833a2dd8c319aea08945",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/11815817de2f2d70fe842b108356a1bc75d44ffb",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40120.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40120.json
new file mode 100644
index 00000000000..a29f4d56765
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40120.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40120",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:08.667",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In multiple locations, there is a possible way to bypass user notification of foreground services due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/d26544e5a4fd554b790b4d0c5964d9e95d9e626b",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40121.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40121.json
new file mode 100644
index 00000000000..8da9191dc19
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40121.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40121",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:08.717",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In appendEscapedSQLString of DatabaseUtils.java, there is a possible SQL injection due to unsafe deserialization. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/3287ac2d2565dc96bf6177967f8e3aed33954253",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40123.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40123.json
new file mode 100644
index 00000000000..d189a68795f
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40123.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40123",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:08.757",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In updateActionViews of PipMenuView.java, there is a possible bypass of a multi user security boundary due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/7212a4bec2d2f1a74fa54a12a04255d6a183baa9",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40125.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40125.json
new file mode 100644
index 00000000000..9f99da87b05
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40125.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40125",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:08.807",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In onCreate of ApnEditor.java, there is a possible way for a Guest user to change the APN due to a permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/63d464c3fa5c7b9900448fef3844790756e557eb",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40127.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40127.json
new file mode 100644
index 00000000000..4099ea34550
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40127.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40127",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:08.850",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In multiple locations, there is a possible way to access screenshots due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/packages/providers/MediaProvider/+/747431250612507e8289ae8eb1a56303e79ab678",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40128.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40128.json
new file mode 100644
index 00000000000..335ee6e1c3a
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40128.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40128",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:08.890",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In several functions of xmlregexp.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/external/libxml2/+/1ccf89b87a3969edd56956e2d447f896037c8be7",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40129.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40129.json
new file mode 100644
index 00000000000..b893330a0d9
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40129.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40129",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:08.947",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c0151aa3ba76c785b32c7f9d16c98febe53017b1",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40130.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40130.json
new file mode 100644
index 00000000000..76908b6ebd1
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40130.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40130",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:08.993",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In onBindingDied of CallRedirectionProcessor.java, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege and background activity launch with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/packages/services/Telecomm/+/5b335401d1c8de7d1c85f4a0cf353f7f9fc30218",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40131.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40131.json
new file mode 100644
index 00000000000..fd688097d02
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40131.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40131",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:09.043",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In GpuService of GpuService.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/native/+/0cda11569dd256ff3220b4fe44f861f8081d7116",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40133.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40133.json
new file mode 100644
index 00000000000..befbdc5f842
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40133.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40133",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:09.087",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In multiple locations of DialogFillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40134.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40134.json
new file mode 100644
index 00000000000..d45adbcd6ae
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40134.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40134",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:09.130",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In isFullScreen of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40135.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40135.json
new file mode 100644
index 00000000000..33c7cc646f7
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40135.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40135",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:09.170",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In applyCustomDescription of SaveUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40136.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40136.json
new file mode 100644
index 00000000000..069bd9d23d5
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40136.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40136",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:09.217",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In setHeader of DialogFillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40137.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40137.json
new file mode 100644
index 00000000000..fbe969d25ee
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40137.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40137",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:09.263",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In multiple functions of DialogFillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40138.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40138.json
new file mode 100644
index 00000000000..ee611b54068
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40138.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40138",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:09.307",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In FillUi of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40139.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40139.json
new file mode 100644
index 00000000000..bb361c42bc3
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40139.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40139",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:09.353",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In FillUi of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40140.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40140.json
new file mode 100644
index 00000000000..f782c1580ed
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40140.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-40140",
+ "sourceIdentifier": "security@android.com",
+ "published": "2023-10-27T21:15:09.397",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In android_view_InputDevice_create of android_view_InputDevice.cpp, there is a possible way to execute arbitrary code due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://android.googlesource.com/platform/frameworks/base/+/2d88a5c481df8986dbba2e02c5bf82f105b36243",
+ "source": "security@android.com"
+ },
+ {
+ "url": "https://source.android.com/security/bulletin/2023-10-01",
+ "source": "security@android.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40141.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40141.json
index d5dfd56eb2a..6be4f2d1350 100644
--- a/CVE-2023/CVE-2023-401xx/CVE-2023-40141.json
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40141.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-40141",
"sourceIdentifier": "security@android.com",
"published": "2023-10-11T20:15:10.527",
- "lastModified": "2023-10-11T21:04:47.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T01:52:10.687",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In temp_residency_name_store of thermal_metrics.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En temp_residency_name_store de Thermal_metrics.c, hay una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2023-10-01",
- "source": "security@android.com"
+ "source": "security@android.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40142.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40142.json
index 0e9eaa9dd4c..02f37f484ba 100644
--- a/CVE-2023/CVE-2023-401xx/CVE-2023-40142.json
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40142.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-40142",
"sourceIdentifier": "security@android.com",
"published": "2023-10-11T20:15:10.567",
- "lastModified": "2023-10-11T21:04:47.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T01:54:23.687",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In TBD of TBD, there is a possible way to bypass carrier restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En TBD, existe una forma posible de omitir las restricciones del operador debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2023-10-01",
- "source": "security@android.com"
+ "source": "security@android.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40145.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40145.json
new file mode 100644
index 00000000000..aeef6f017c2
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40145.json
@@ -0,0 +1,298 @@
+{
+ "id": "CVE-2023-40145",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T20:15:09.150",
+ "lastModified": "2023-10-26T14:26:42.150",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\n\n\n\n\nIn Weintek's cMT3000 HMI Web CGI device, an anonymous attacker can execute arbitrary commands after login to the device.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En el dispositivo cMT3000 HMI Web CGI de Weintek, un atacante an\u00f3nimo puede ejecutar comandos arbitrarios despu\u00e9s de iniciar sesi\u00f3n en el dispositivo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt-fhd_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210212",
+ "matchCriteriaId": "33538560-F796-4D1D-AA52-63DB5FD817BF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt-fhd:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A132B170-A1FC-4D38-9965-0FF47B944FD5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt-hdm_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210206",
+ "matchCriteriaId": "52502356-D835-4468-BCA6-875177B562F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt-hdm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E08E3518-A03F-486D-B67A-013F67026D78"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt3071_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210220",
+ "matchCriteriaId": "210A03BC-C9BB-4832-BDB2-2EB5E87FD13A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt3071:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4DE53C8-09D5-4D5E-97EE-A89E1478CD65"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt3072_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210220",
+ "matchCriteriaId": "17422509-5131-48A3-8C9A-ECA4332C33F0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt3072:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E3F83A8D-1489-48AA-911B-5BA561A57896"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt3090_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210220",
+ "matchCriteriaId": "3E5B9225-364C-46BD-BCB4-E151923855CC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt3090:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79C1F694-08A2-46E7-95C2-8DFA3D64423B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt3103_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210220",
+ "matchCriteriaId": "3651EA3F-5C3F-4893-AF82-E7FDBBAF5EAA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt3103:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F607716E-7B7B-4620-819C-F44341B8C37F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:weintek:cmt3151_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20210220",
+ "matchCriteriaId": "82F72B48-B2CE-4580-B4CC-49879CA6074B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:weintek:cmt3151:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FF5326B-5E33-4C11-9AC6-A90357078FCA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://dl.weintek.com/public/Document/TEC/TEC23005E_cMT_Web_Security_Update.pdf",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-12",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40153.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40153.json
new file mode 100644
index 00000000000..ff6ac6ddde7
--- /dev/null
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40153.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-40153",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T19:15:15.317",
+ "lastModified": "2023-10-25T13:39:43.797",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nThe affected product is vulnerable to a cross-site scripting vulnerability, which could allow an attacker to access the web application to introduce arbitrary Java Script by injecting an XSS payload into the 'hostname' parameter of the vulnerable software.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El producto afectado es vulnerable a Cross-Site Scripting, lo que podr\u00eda permitir a un atacante acceder a la aplicaci\u00f3n web para introducir Java Script arbitrario inyectando un payload XSS en el par\u00e1metro 'hostname' del software vulnerable."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dexma:dexgate:20130114:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1220960-8C57-4BB1-9871-882D2E272F39"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40180.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40180.json
index 2245d71d268..76c5de4011d 100644
--- a/CVE-2023/CVE-2023-401xx/CVE-2023-40180.json
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40180.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-40180",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T19:15:10.567",
- "lastModified": "2023-10-16T19:24:26.033",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T14:21:30.690",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": " silverstripe-graphql is a package which serves Silverstripe data in GraphQL representations. An attacker could use a recursive graphql query to execute a Distributed Denial of Service attack (DDOS attack) against a website. This mostly affects websites with publicly exposed graphql schemas. If your Silverstripe CMS project does not expose a public facing graphql schema, a user account is required to trigger the DDOS attack. If your site is hosted behind a content delivery network (CDN), such as Imperva or CloudFlare, this may further mitigate the risk. This issue has been addressed in versions 3.8.2, 4.1.3, 4.2.5, 4.3.4, and 5.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "silverstripe-graphql es un paquete que proporciona datos de Silverstripe en representaciones GraphQL. Un atacante podr\u00eda utilizar una consulta Graphql recursiva para ejecutar un ataque de Denegaci\u00f3n de Servicio Distribuido (ataque DDOS) contra un sitio web. Esto afecta principalmente a sitios web con esquemas Graphql expuestos p\u00fablicamente. Si su proyecto Silverstripe CMS no expone un esquema Graphql p\u00fablico, se requiere una cuenta de usuario para desencadenar el ataque DDOS. Si su sitio est\u00e1 alojado detr\u00e1s de una Red de Entrega de Contenido (CDN), como Imperva o CloudFlare, esto puede mitigar a\u00fan m\u00e1s el riesgo. Este problema se solucion\u00f3 en las versiones 3.8.2, 4.1.3, 4.2.5, 4.3.4 y 5.0.3. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,26 +70,88 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:silverstripe:graphql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.0.0",
+ "versionEndExcluding": "3.8.2",
+ "matchCriteriaId": "2DC96AF6-9575-46F3-B73C-840E94E89FEE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:silverstripe:graphql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.0.0",
+ "versionEndExcluding": "4.1.3",
+ "matchCriteriaId": "01A083DC-A210-4945-B575-B844777ED2D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:silverstripe:graphql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.2.0",
+ "versionEndExcluding": "4.2.5",
+ "matchCriteriaId": "F32A73D0-E7FA-4C45-97E7-81E64AD0DBEA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:silverstripe:graphql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "4.3.0",
+ "versionEndExcluding": "4.3.4",
+ "matchCriteriaId": "186C5850-375C-408D-BDDC-C0726F618860"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:silverstripe:graphql:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.0.0",
+ "versionEndExcluding": "5.0.3",
+ "matchCriteriaId": "D409E4EC-38CB-43BB-91F1-C79350B5CD36"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://docs.silverstripe.org/en/developer_guides/graphql/security_and_best_practices/recursive_or_complex_queries",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mitigation"
+ ]
},
{
"url": "https://github.com/silverstripe/silverstripe-graphql/commit/f6d5976ec4608e51184b0db1ee5b9e9a99d2501c",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/silverstripe/silverstripe-graphql/security/advisories/GHSA-v23w-pppm-jh66",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/silverstripe/silverstripe-graphql/tree/3.8#recursive-or-complex-queries",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.silverstripe.org/download/security-releases/CVE-2023-40180",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40181.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40181.json
index adb7b0159f2..c1158dd7279 100644
--- a/CVE-2023/CVE-2023-401xx/CVE-2023-40181.json
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40181.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40181",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:07.860",
- "lastModified": "2023-10-07T21:15:16.153",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T13:50:49.010",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -96,6 +96,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -123,19 +153,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40186.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40186.json
index aabb116b1b3..d35736425f2 100644
--- a/CVE-2023/CVE-2023-401xx/CVE-2023-40186.json
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40186.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40186",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.303",
- "lastModified": "2023-10-07T21:15:16.273",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T14:55:58.577",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -56,7 +56,7 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -68,6 +68,20 @@
"value": "CWE-787"
}
]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
}
],
"configurations": [
@@ -96,6 +110,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -116,19 +160,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40188.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40188.json
index 43e795adc8c..970d22197bc 100644
--- a/CVE-2023/CVE-2023-401xx/CVE-2023-40188.json
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40188.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40188",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.523",
- "lastModified": "2023-10-07T21:15:16.400",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T14:09:58.447",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,19 +142,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40254.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40254.json
index 033847f874a..3a582303a63 100644
--- a/CVE-2023/CVE-2023-402xx/CVE-2023-40254.json
+++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40254.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-40254",
"sourceIdentifier": "vuln@krcert.or.kr",
"published": "2023-08-11T07:15:09.423",
- "lastModified": "2023-08-29T02:15:08.737",
+ "lastModified": "2023-10-26T06:15:10.227",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,19 +37,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
- "attackComplexity": "LOW",
+ "attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
- "userInteraction": "REQUIRED",
+ "userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
- "baseScore": 7.7,
+ "baseScore": 7.5,
"baseSeverity": "HIGH"
},
- "exploitabilityScore": 1.1,
+ "exploitabilityScore": 0.8,
"impactScore": 6.0
}
]
diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json
index 608b9f3b2b1..4bcf56361ec 100644
--- a/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json
+++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40283.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40283",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-14T03:15:09.257",
- "lastModified": "2023-10-11T19:15:10.787",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-24T14:28:44.110",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -69,10 +69,55 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
+ "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*",
+ "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE"
}
]
}
@@ -82,7 +127,11 @@
"references": [
{
"url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
},
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.10",
@@ -105,6 +154,21 @@
"Patch"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0007/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "cve@mitre.org",
@@ -114,7 +178,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40344.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40344.json
index f7e26468fd7..af0116aacc7 100644
--- a/CVE-2023/CVE-2023-403xx/CVE-2023-40344.json
+++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40344.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40344",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-08-16T15:15:11.880",
- "lastModified": "2023-08-18T20:01:47.190",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T03:15:08.683",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,6 +73,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://support.delphix.com/Support_Policies_and_Technical_Bulletins/Technical_Bulletins/TB111_Delphix_Plugin_for_Jenkins_Vulnerable_to_Credential_Enumeration_and_Capture",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(1)",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40345.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40345.json
index 4c2f873b84a..9f301fb7c34 100644
--- a/CVE-2023/CVE-2023-403xx/CVE-2023-40345.json
+++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40345.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40345",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-08-16T15:15:11.937",
- "lastModified": "2023-08-18T20:01:50.273",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T03:15:08.770",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -73,6 +73,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://support.delphix.com/Support_Policies_and_Technical_Bulletins/Technical_Bulletins/TB111_Delphix_Plugin_for_Jenkins_Vulnerable_to_Credential_Enumeration_and_Capture",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
{
"url": "https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(2)",
"source": "jenkinsci-cert@googlegroups.com",
diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40361.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40361.json
new file mode 100644
index 00000000000..361e3e068f1
--- /dev/null
+++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40361.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-40361",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T06:15:17.297",
+ "lastModified": "2023-10-26T17:45:51.963",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SECUDOS Qiata (DOMOS OS) 4.13 has Insecure Permissions for the previewRm.sh daily cronjob. To exploit this, an attacker needs access as a low-privileged user to the underlying DOMOS system. Every user on the system has write permission for previewRm.sh, which is executed by the root user."
+ },
+ {
+ "lang": "es",
+ "value": "SECUDOS Qiata (DOMOS OS) 4.13 tiene Permisos Inseguros para el cronjob diario previewRm.sh. Para aprovechar esto, un atacante necesita acceso como usuario con pocos privilegios al sistema DOMOS subyacente. Cada usuario del sistema tiene permiso de escritura previewRm.sh, que es ejecutado por el usuario root."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:secudos:qiata:4.13:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DD9389A-DC88-441D-A523-BB3D01D90316"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/vianic/CVE-2023-40361/blob/main/advisory/advisory.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40367.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40367.json
index 133be0d9369..4d72c3e519a 100644
--- a/CVE-2023/CVE-2023-403xx/CVE-2023-40367.json
+++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40367.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-40367",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-14T17:15:09.703",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:50:23.080",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 263376."
+ },
+ {
+ "lang": "es",
+ "value": "IBM QRadar SIEM 7.5.0 es vulnerable a Cross-Site Scripting (XSS). Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista, lo que podr\u00eda conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. ID de IBM X-Force: 263376."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,81 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "DACA17CC-8B71-4E71-B075-BFFB65AD989C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_1:*:*:*:*:*:*",
+ "matchCriteriaId": "BA60FDE5-8C40-4C7A-97CF-BA2A64BF307D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_2:*:*:*:*:*:*",
+ "matchCriteriaId": "AB518E06-00BA-48F3-8AEC-6E1E97CAA2CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_3:*:*:*:*:*:*",
+ "matchCriteriaId": "289027A2-178C-45DE-A86F-1207F23D13B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_4:*:*:*:*:*:*",
+ "matchCriteriaId": "5047AECF-879B-427A-ACF7-ECB10965E1B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_5:*:*:*:*:*:*",
+ "matchCriteriaId": "CD448AB8-E3CC-41A1-9D32-B1B35C68FA5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_6:*:*:*:*:*:*",
+ "matchCriteriaId": "9F4014E8-42E2-4B76-B2DA-8B50929A4AB5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/263376",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7049133",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40372.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40372.json
index f5b7ba1ffec..8ecc4841754 100644
--- a/CVE-2023/CVE-2023-403xx/CVE-2023-40372.json
+++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40372.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40372",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T00:15:10.887",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:54:25.380",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,62 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.5",
+ "versionEndIncluding": "11.5.8",
+ "matchCriteriaId": "8966D805-3817-488E-B692-D15838AD3469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/263499",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047561",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40373.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40373.json
index 542dba5a1b2..b0bebcd06f6 100644
--- a/CVE-2023/CVE-2023-403xx/CVE-2023-40373.json
+++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40373.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40373",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-17T00:15:10.970",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:53:38.650",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,157 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.5",
+ "versionEndIncluding": "11.5.8",
+ "matchCriteriaId": "8966D805-3817-488E-B692-D15838AD3469"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:-:*:*:*:*:*:*",
+ "matchCriteriaId": "190AE881-F7BF-486E-BDAE-197337D70CDB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D1BAA43-4C77-4AC7-8561-93EDE0AED000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp10:*:*:*:*:*:*",
+ "matchCriteriaId": "F6FDF4D8-1822-43E6-AE65-3E4F8743D3A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp2:*:*:*:*:*:*",
+ "matchCriteriaId": "87C39880-D0E9-4487-9A80-B4D1A999032F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp3:*:*:*:*:*:*",
+ "matchCriteriaId": "8842A8B6-E470-4536-AB5D-DA1C62A05F58"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp3a:*:*:*:*:*:*",
+ "matchCriteriaId": "92BF0482-E4FE-454E-84DD-27074097F3F3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp4:*:*:*:*:*:*",
+ "matchCriteriaId": "3705A79B-7903-4055-9CDC-55D60D2AC2E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp5:*:*:*:*:*:*",
+ "matchCriteriaId": "CBDFCE61-EE04-4901-844D-61B8966C1B81"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp6:*:*:*:*:*:*",
+ "matchCriteriaId": "53A23363-413D-4785-B8C1-9AC2F96000EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp7:*:*:*:*:*:*",
+ "matchCriteriaId": "6E22D884-A33F-41D7-84CB-B6360A39863F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp8:*:*:*:*:*:*",
+ "matchCriteriaId": "4DA56D35-93E9-4659-B180-2FD636A39BAB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:10.5:fp9:*:*:*:*:*:*",
+ "matchCriteriaId": "6E7F0B02-EA0B-4BD1-AA0C-2A4735221963"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "7F91EC14-CD9A-42EB-9D81-6025A1D74749"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp1:*:*:*:*:*:*",
+ "matchCriteriaId": "5D098641-0833-4718-BB6A-273E1CA0F887"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp2:*:*:*:*:*:*",
+ "matchCriteriaId": "8B451F96-2A58-4758-86E6-F8A030805C51"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp3:*:*:*:*:*:*",
+ "matchCriteriaId": "69CBC98E-BECE-41A4-A0D9-9F3AC1602ABE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp4:*:*:*:*:*:*",
+ "matchCriteriaId": "20386F14-BC32-4174-9F3A-F7406486976A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp5:*:*:*:*:*:*",
+ "matchCriteriaId": "DD0DD54B-AB2E-4C56-B348-FF87C174270A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:11.1.4:fp6:*:*:*:*:*:*",
+ "matchCriteriaId": "CC14EF40-FE00-47F9-8A78-98713F903D9C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/263574",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047563",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40374.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40374.json
index 469c1a7b3c6..d09869c272d 100644
--- a/CVE-2023/CVE-2023-403xx/CVE-2023-40374.json
+++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40374.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40374",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T23:15:10.243",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:34:13.630",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -50,14 +80,63 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.5",
+ "versionEndIncluding": "11.5.8",
+ "matchCriteriaId": "8966D805-3817-488E-B692-D15838AD3469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A90CB3A-9BE7-475C-9E75-6ECAD2106302"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/263575",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047261",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40377.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40377.json
index da4d653c1e2..6dd79dc7942 100644
--- a/CVE-2023/CVE-2023-403xx/CVE-2023-40377.json
+++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40377.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-40377",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-16T01:15:09.760",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:40:06.597",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Backup, Recovery, and Media Services (BRMS) for IBM i 7.2, 7.3, and 7.4 contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain component access to the host operating system. IBM X-Force ID: 263583."
+ },
+ {
+ "lang": "es",
+ "value": "Backup, Recovery, and Media Services (BRMS) para IBM i 7.2, 7.3 y 7.4 contiene una vulnerabilidad de escalada de privilegios local. Un actor malintencionado con acceso a la l\u00ednea de comandos del sistema operativo host puede elevar los privilegios para obtener acceso a los componentes del sistema operativo host. ID de IBM X-Force: 263583."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,49 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ibm:i:7.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD871157-2BB3-4641-B84E-3EA13D24D35A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ibm:i:7.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9A49E8C5-7967-42AE-A787-C533D24A63D7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ibm:i:7.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92D03306-B6C9-403E-99A2-CE9D8DC3B482"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/263583",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7048121",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40378.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40378.json
index fdabc573124..6e9da3690c5 100644
--- a/CVE-2023/CVE-2023-403xx/CVE-2023-40378.json
+++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40378.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-40378",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-15T02:15:09.647",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T01:04:16.810",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM Directory Server for IBM i contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain component access to the host operating system. IBM X-Force ID: 263584."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Directory Server para IBM i contiene una vulnerabilidad de escalada de privilegios local. Un actor malintencionado con acceso a la l\u00ednea de comandos del sistema operativo host puede elevar los privilegios para obtener acceso a los componentes del sistema operativo host. ID de IBM X-Force: 263584."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,54 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ibm:i:7.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD871157-2BB3-4641-B84E-3EA13D24D35A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ibm:i:7.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9A49E8C5-7967-42AE-A787-C533D24A63D7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ibm:i:7.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92D03306-B6C9-403E-99A2-CE9D8DC3B482"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:ibm:i:7.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7CCB5BF-08EF-472F-A663-5DE270234F10"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/263584",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7047240",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40401.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40401.json
new file mode 100644
index 00000000000..eb9fa31306d
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40401.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-40401",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.110",
+ "lastModified": "2023-10-26T00:15:10.237",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with additional permissions checks. This issue is fixed in macOS Ventura 13.6.1. An attacker may be able to access passkeys without authentication."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 con comprobaciones de permisos adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.6.1. Un atacante puede acceder a las claves de acceso sin autenticaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40404.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40404.json
new file mode 100644
index 00000000000..537bc8756ef
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40404.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-40404",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.157",
+ "lastModified": "2023-10-26T00:15:10.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sonoma 14.1. An app may be able to execute arbitrary code with kernel privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de use-after-free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40405.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40405.json
new file mode 100644
index 00000000000..3b391fcf3a9
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40405.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-40405",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.203",
+ "lastModified": "2023-10-26T00:15:10.327",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1. An app may be able to read sensitive location information."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial de la ubicaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40408.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40408.json
new file mode 100644
index 00000000000..c67c50397c8
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40408.json
@@ -0,0 +1,68 @@
+{
+ "id": "CVE-2023-40408",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.247",
+ "lastModified": "2023-10-26T00:15:10.377",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Hide My Email may be deactivated unexpectedly."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de interfaz de usuario inconsistente con una gesti\u00f3n de estado mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1. Ocultar Mi Correo Electr\u00f3nico puede desactivarse inesperadamente."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40413.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40413.json
new file mode 100644
index 00000000000..4ad87677af6
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40413.json
@@ -0,0 +1,92 @@
+{
+ "id": "CVE-2023-40413",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.297",
+ "lastModified": "2023-10-26T00:15:10.430",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved handling of caches. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An app may be able to read sensitive location information."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de los cach\u00e9s. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, macOS Monterey 12.7.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial de la ubicaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40416.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40416.json
new file mode 100644
index 00000000000..28a2e0cf2cd
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40416.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-40416",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.350",
+ "lastModified": "2023-10-26T00:15:10.487",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. Processing an image may result in disclosure of process memory."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. El procesamiento de una imagen puede resultar en la divulgaci\u00f3n de la memoria del proceso."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40421.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40421.json
new file mode 100644
index 00000000000..4206cc019d1
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40421.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2023-40421",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.403",
+ "lastModified": "2023-10-26T00:15:10.540",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. An app may be able to access sensitive user data."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40423.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40423.json
new file mode 100644
index 00000000000..f9624b4e39c
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40423.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-40423",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.453",
+ "lastModified": "2023-10-26T00:15:10.593",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An app may be able to execute arbitrary code with kernel privileges."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40425.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40425.json
new file mode 100644
index 00000000000..6788702d742
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40425.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-40425",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.510",
+ "lastModified": "2023-10-25T23:15:16.497",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Monterey 12.7.1. An app with root privileges may be able to access private information."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Monterey 12.7.1. Una aplicaci\u00f3n con privilegios de root puede acceder a informaci\u00f3n privada."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40444.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40444.json
new file mode 100644
index 00000000000..fa8d026d4e4
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40444.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-40444",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.553",
+ "lastModified": "2023-10-26T00:15:10.647",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.1. An app may be able to access user-sensitive data."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40445.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40445.json
new file mode 100644
index 00000000000..f3df9e30a74
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40445.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-40445",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.607",
+ "lastModified": "2023-10-25T23:15:16.547",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved UI handling. This issue is fixed in iOS 17.1 and iPadOS 17.1. A device may persistently fail to lock."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de la interfaz de usuario. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1. Es posible que un dispositivo no se bloquee persistentemente."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40447.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40447.json
new file mode 100644
index 00000000000..1382730ee91
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40447.json
@@ -0,0 +1,68 @@
+{
+ "id": "CVE-2023-40447",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.657",
+ "lastModified": "2023-10-26T00:15:10.697",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. El procesamiento de contenido web puede dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/22",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/27",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213986",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213987",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40449.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40449.json
new file mode 100644
index 00000000000..b453e2ce2a4
--- /dev/null
+++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40449.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-40449",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.703",
+ "lastModified": "2023-10-26T00:15:10.753",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An app may be able to cause a denial-of-service."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. Una aplicaci\u00f3n puede provocar una Denegaci\u00f3n de Servicio (DoS)."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40534.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40534.json
index f3229414c00..016dbc11889 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40534.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40534.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-40534",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:20.730",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:08:42.063",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "When a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, and an iRule using the HTTP_REQUEST event or Local Traffic Policy are associated with the virtual server, undisclosed requests can cause TMM to terminate.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
+ },
+ {
+ "lang": "es",
+ "value": "Cuando un perfil HTTP/2 del lado del cliente y la opci\u00f3n HTTP MRF Router est\u00e1n habilitadas para un servidor virtual, y una iRule que utiliza el evento HTTP_REQUEST o la Pol\u00edtica de Tr\u00e1fico Local est\u00e1 asociada con el servidor virtual, las solicitudes no divulgadas pueden provocar la finalizaci\u00f3n de TMM. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan."
}
],
"metrics": {
@@ -46,10 +50,260 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "92F10A0D-A487-4B2A-ADF7-4AB3C5A98001"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A8D90B7-A1AF-4EFB-B688-1563D81E5C6D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "2ADC24ED-14A3-4F96-A6DA-5A2FDC60A71B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A1CC91B-6920-4AF0-9EDD-DD3189E78F4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "E42EBA0A-EC53-4885-9AFD-AFF83224214C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1769D69A-CB59-46B1-89B3-FB97DC6DEB9B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "5E49638F-30AA-4112-8F6F-13F013F9E72B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59203EBF-C52A-45A1-B8DF-00E17E3EFB51"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "3823874E-B0C1-4F7B-B1E7-1423C371E79C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C698C1C-A3DD-46E2-B05A-12F2604E7F85"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "C175FBF7-CF8D-48C2-B604-AC766AE3ECAD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87670A74-34FE-45DF-A725-25B804C845B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "C509C00E-2C92-4905-BD2D-22B5BDDDE4EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67DB21AE-DF53-442D-B492-C4ED9A20B105"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "FAD1751B-9818-474E-B970-719CE1AEA782"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC1D037-74D2-4F92-89AD-C90F6CBF440B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "9A519F4C-D469-47A0-9F61-2EE33976177D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B235A78-649B-46C5-B24B-AB485A884654"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "69DE4021-B15C-4310-8898-E4EC3EC0DA60"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84D00768-E71B-4FF7-A7BF-F2C8CFBC900D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "7A779434-C082-486E-8F65-587CE0BD1828"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F28D083-19BE-4584-A61A-85DD3CDC66BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "67CAB7BF-AC42-4957-9F8F-59CACA30D0A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ABBD10E8-6054-408F-9687-B9BF6375CA09"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "11EA68F6-028C-4A63-AFB6-0B6F36F5EB8C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83794B04-87E2-4CA9-81F5-BB820D0F5395"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "16657185-FDAA-4DF4-A2A1-1B5BAF8697FB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A6E7035-3299-474F-8F67-945EA9A059D0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "04ABC7AA-1D2D-4954-863B-A417794B1F5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56FB92F7-FF1E-425D-A5AB-9D9FB0BB9450"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.6.0",
+ "versionEndIncluding": "1.8.2",
+ "matchCriteriaId": "5190BFD8-0F6C-4CAF-9589-7CD8A589CDC3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "957276C7-DA88-44F1-AB18-AA39DC1BF9B4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "667EB77B-DA13-4BA4-9371-EE3F3A109F38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "D6D0A641-7EF3-4F9E-9503-4A202E04102A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C446827A-1F71-4FAD-9422-580642D26AD1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "095E5580-CF33-45EB-90DB-1EB4F0C0DFCA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3D1B2000-C3FE-4B4C-885A-A5076EB164E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "D097C6A6-5C8D-4275-B0CD-3947E11AA5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8AB23AE6-245E-43D6-B832-933F8259F937"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K000133467",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40537.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40537.json
index f577338be05..c65506142d5 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40537.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40537.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-40537",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:20.840",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:43:11.323",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn authenticated user's session cookie may remain valid for a limited time after logging out from the BIG-IP Configuration utility on a multi-blade VIPRION platform.\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La cookie de sesi\u00f3n de un usuario autenticado puede permanecer v\u00e1lida por un tiempo limitado despu\u00e9s de cerrar sesi\u00f3n en la utilidad de configuraci\u00f3n BIG-IP en una plataforma VIPRION multiblade. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan."
}
],
"metrics": {
@@ -46,10 +50,573 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "94E0B611-902C-46BC-A099-881398828F0B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F11226F6-9080-4126-ACBD-7211A2746214"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A8F16422-A642-4614-96F2-E5B4877E8206"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "4AF2DF45-D15E-4239-A66C-9F8A924E383A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "6DD4CF11-44E9-4596-9397-AF7DBD81277B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "DE979976-11C7-4AFF-8BE4-A094CC9C39CF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "34A88673-CDD5-48FC-9491-6852324E26EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "8D82BCD8-136A-476C-AC86-710CA8B32EB7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "377DE308-CF91-488A-B296-30A3B09451D3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F53FFE68-BE06-4F16-8C33-58711E86E254"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "C0FE692A-CD63-4354-B599-2F47EEEFDD37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "B2F02EC0-E6C2-4E00-9804-043982D88BCE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "E9BB7368-B6F8-462F-B17F-02CFBB0EE310"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "672067B7-C838-4F0B-B3D0-E85F71715B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A4C17D18-1172-4396-9099-F1F5EAEACE5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "86BE84EA-63BC-49A2-8004-830255114059"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F7280AA3-6EB0-4D9B-895B-B6883071740E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "95617B72-E7D8-44D2-AFF2-976595A72AFA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7480CF69-7BEC-4582-85BB-58A6CBC51171"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "16795277-E8E2-4713-BD65-207655546649"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "0835E39B-F21E-4231-A4B9-5D511FF1B87A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "6EDE9EC9-8079-434F-8510-3DB4E3051BCA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F005EFFD-3A40-4762-B0D6-8760C406130F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "8705476E-A246-4B57-A0E1-FD626C1B0DE5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "4C3AA014-6241-4EBA-BF9F-65D3D869C6E0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "18CD2C82-0080-495E-8A11-957E0C182A48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "3C508A36-C041-406C-9C8A-A396C6EDC750"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "D263C0C1-55C6-4AC3-B738-9F099C583AA0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E912382D-131E-40F2-A337-72D6F2A3AD23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "91ED3C5E-92E8-44CF-AA99-A38C60AE677E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F16999CA-0EE1-4F56-AF60-8F002B5F7CCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "47962DDC-899F-4A98-ABF7-CC8A1AE7FF1C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "46A7F81E-84A2-4304-B18F-53E5CDBCEA43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "3FB67297-BDD9-4D15-9247-0F1A589D7450"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E4958167-AB1F-4458-A06B-1B2DA313EEBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "D982C3E6-43DE-4AA8-889F-044E70C7FCB2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "2A96D578-675E-4B63-851F-CB71A92B25B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "944B8F9C-E5C6-4DA8-BF2B-1C0B6A388BC4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "7DB6C626-BA78-4C06-8582-BFFCDF957429"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "2765BBF9-8450-4889-9961-2C6DE64656F4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "DCFAFFAC-000C-414D-83CF-B8B2C529D9CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "E68BFC75-6977-4644-A169-48263B896849"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "EDD85839-D8F4-4651-ABAC-9F092955785B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "1871634A-7609-4D01-8469-3D86F36DC19D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "603324D6-FE7A-4209-B92B-94EF09AB5FF2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "D0D0A53D-5911-4406-8264-FC85ADDDD007"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "220FD008-8919-48D4-84CF-8C4D99C3C474"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1935A1CF-50B2-4572-AA06-3504DB25B954"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "57114710-113A-4F2E-A5C2-07AB7BBC7354"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "077EBF51-B843-48B7-B31C-4BE1C99CE6F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "5EAC82FA-41CC-425A-89A0-CC9E2BF678EE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "8A0A03A5-3120-4D8D-A580-E7546A740D61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "338010BF-EFC6-42B9-9F12-865C48D421EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "14776B4F-DDEC-4B22-82A5-EA231B3895F0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K29141800",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40542.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40542.json
index ea823ce835e..16825987a17 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40542.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40542.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-40542",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:20.937",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T19:43:55.697",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nWhen TCP Verified Accept is enabled on a TCP profile that is configured on a Virtual Server, undisclosed requests can cause an increase in memory resource utilization.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
+ },
+ {
+ "lang": "es",
+ "value": "Cuando la aceptaci\u00f3n verificada de TCP est\u00e1 habilitada en un perfil TCP configurado en un servidor virtual, las solicitudes no divulgadas pueden provocar un aumento en la utilizaci\u00f3n de recursos de memoria. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan"
}
],
"metrics": {
@@ -36,8 +40,18 @@
},
"weaknesses": [
{
- "source": "f5sirt@f5.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-770"
+ }
+ ]
+ },
+ {
+ "source": "f5sirt@f5.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -46,10 +60,557 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F11226F6-9080-4126-ACBD-7211A2746214"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A8F16422-A642-4614-96F2-E5B4877E8206"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "6603ED6A-3366-4572-AFCD-B3D4B1EC7606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "88978E38-81D3-4EFE-8525-A300B101FA69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "6DD4CF11-44E9-4596-9397-AF7DBD81277B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "DE979976-11C7-4AFF-8BE4-A094CC9C39CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "05E452AA-A520-4CBE-8767-147772B69194"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "596FC5D5-7329-4E39-841E-CAE937C02219"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F7280AA3-6EB0-4D9B-895B-B6883071740E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "95617B72-E7D8-44D2-AFF2-976595A72AFA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "9167FEC1-2C37-4946-9657-B4E69301FB24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7B4B3442-E0C0-48CD-87AD-060E15C9801E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "16795277-E8E2-4713-BD65-207655546649"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "0835E39B-F21E-4231-A4B9-5D511FF1B87A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F005EFFD-3A40-4762-B0D6-8760C406130F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "8705476E-A246-4B57-A0E1-FD626C1B0DE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "922AA845-530A-4B4B-9976-4CBC30C8A324"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F938EB43-8373-47EB-B269-C6DF058A9244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "8D82BCD8-136A-476C-AC86-710CA8B32EB7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "377DE308-CF91-488A-B296-30A3B09451D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "C7E422F6-C4C2-43AC-B137-0997B5739030"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "CC3F710F-DBCB-4976-9719-CF063DA22377"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "18CD2C82-0080-495E-8A11-957E0C182A48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "3C508A36-C041-406C-9C8A-A396C6EDC750"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "4C9FCBCB-9CE0-49E7-85C8-69E71D211912"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "112DFA85-90AD-478D-BD70-8C7C0C074F1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E912382D-131E-40F2-A337-72D6F2A3AD23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "91ED3C5E-92E8-44CF-AA99-A38C60AE677E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "2FBCE2D1-9D93-415D-AB2C-2060307C305A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "47962DDC-899F-4A98-ABF7-CC8A1AE7FF1C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "46A7F81E-84A2-4304-B18F-53E5CDBCEA43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "C0FE692A-CD63-4354-B599-2F47EEEFDD37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "B2F02EC0-E6C2-4E00-9804-043982D88BCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "BC2A757B-4521-4DB7-89B0-7CAE1E4155E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "0A1D4B18-DB59-41C4-B769-5DF93B8EBBAD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "D819F58A-826E-49E0-A06F-4D85E04D3D9F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1E86895C-EC5A-4303-978E-8807FE7A5E9A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "BC36311E-BB00-4750-85C8-51F5A2604F07"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E4958167-AB1F-4458-A06B-1B2DA313EEBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "D982C3E6-43DE-4AA8-889F-044E70C7FCB2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E6018B01-048C-43BB-A78D-66910ED60CA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "944B8F9C-E5C6-4DA8-BF2B-1C0B6A388BC4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "7DB6C626-BA78-4C06-8582-BFFCDF957429"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D9EC2237-117F-43BD-ADEC-516CF72E04EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "DCFAFFAC-000C-414D-83CF-B8B2C529D9CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "E68BFC75-6977-4644-A169-48263B896849"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7A4607BF-41AC-4E84-A110-74E085FF0445"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "672067B7-C838-4F0B-B3D0-E85F71715B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A4C17D18-1172-4396-9099-F1F5EAEACE5A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8257AA59-C14D-4EC1-B22C-DFBB92CBC297"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "1871634A-7609-4D01-8469-3D86F36DC19D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "603324D6-FE7A-4209-B92B-94EF09AB5FF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8A6F9699-A485-4614-8F38-5A556D31617E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "5A90F547-97A2-41EC-9FDF-25F869F0FA38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "220FD008-8919-48D4-84CF-8C4D99C3C474"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1935A1CF-50B2-4572-AA06-3504DB25B954"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "D47B7691-A95B-45C0-BAB4-27E047F3C379"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "077EBF51-B843-48B7-B31C-4BE1C99CE6F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "5EAC82FA-41CC-425A-89A0-CC9E2BF678EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "338010BF-EFC6-42B9-9F12-865C48D421EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "14776B4F-DDEC-4B22-82A5-EA231B3895F0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K000134652",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40567.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40567.json
index 4212aeeda1e..94f9862a931 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40567.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40567.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40567",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.613",
- "lastModified": "2023-10-07T21:15:16.537",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T13:26:43.380",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -119,19 +149,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40569.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40569.json
index 5d03a04ca6e..18cfea8f641 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40569.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40569.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40569",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-31T22:15:08.707",
- "lastModified": "2023-10-07T21:15:16.657",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-18T13:37:50.007",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,36 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,19 +142,32 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40577.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40577.json
index ba9b08b2eb5..ad253226abd 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40577.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40577.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40577",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-25T01:15:09.177",
- "lastModified": "2023-10-08T12:15:36.140",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:49:01.913",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -85,6 +85,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -97,7 +112,10 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00011.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json
index 87d16436da7..271be8fd193 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40592",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:09.763",
- "lastModified": "2023-09-01T13:39:42.200",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T21:15:08.740",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -110,6 +110,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://research.splunk.com/application/182f9080-4137-4629-94ac-cb1083ac981a/",
+ "source": "prodsec@splunk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json
index 12ac958bba1..68325a744d5 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40593",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:09.853",
- "lastModified": "2023-09-01T13:53:43.867",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T21:15:08.833",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -105,6 +105,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://research.splunk.com/application/8e8a86d5-f323-4567-95be-8e817e2baee6/",
+ "source": "prodsec@splunk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json
index 37195ae7182..9bb3bad9c61 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40594",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:09.940",
- "lastModified": "2023-09-01T13:53:25.180",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T21:15:08.897",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -110,6 +110,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://research.splunk.com/application/78b48d08-075c-4eac-bd07-e364c3780867/",
+ "source": "prodsec@splunk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json
index 9472d8c6f6a..3a57b27ca2d 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40595",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:10.027",
- "lastModified": "2023-09-01T13:38:00.100",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T21:15:08.967",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -110,6 +110,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://research.splunk.com/application/d1d8fda6-874a-400f-82cf-dcbb59d8e4db/",
+ "source": "prodsec@splunk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json
index d369d5b9f3d..e61b2d0bb66 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40597",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:10.180",
- "lastModified": "2023-09-01T13:17:46.917",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T21:15:09.033",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -110,6 +110,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://research.splunk.com/application/356bd3fe-f59b-4f64-baa1-51495411b7ad/",
+ "source": "prodsec@splunk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json
index 297f2b000dc..1c5b618bfc2 100644
--- a/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json
+++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40598",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:10.267",
- "lastModified": "2023-09-05T20:12:47.927",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T21:15:09.107",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -111,6 +111,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/",
+ "source": "prodsec@splunk.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40682.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40682.json
index 28200ccb1a9..5f37b2bb222 100644
--- a/CVE-2023/CVE-2023-406xx/CVE-2023-40682.json
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40682.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-40682",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-13T16:15:11.487",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:45:05.197",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM App Connect Enterprise 12.0.1.0 through 12.0.8.0 contains an unspecified vulnerability that could allow a local privileged user to obtain sensitive information from API logs. IBM X-Force ID: 263833."
+ },
+ {
+ "lang": "es",
+ "value": "IBM App Connect Enterprise versiones 12.0.1.0 a la 12.0.8.0 contiene una vulnerabilidad no especificada que podr\u00eda permitir a un usuario local privilegiado obtener informaci\u00f3n confidencial de los registros de API. ID de IBM X-Force: 263833."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "12.0.1.0",
+ "versionEndExcluding": "12.0.9.0",
+ "matchCriteriaId": "730FD569-3724-4186-89D5-56823259CB74"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/263833",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7051204",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40685.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40685.json
new file mode 100644
index 00000000000..a12dc4b524a
--- /dev/null
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40685.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-40685",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-29T02:15:07.693",
+ "lastModified": "2023-10-29T02:15:07.693",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Management Central as part of IBM i 7.2, 7.3, 7.4, and 7.5 Navigator contains a local privilege escalation vulnerability. A malicious actor with command line access to the operating system can exploit this vulnerability to elevate privileges to gain root access to the operating system. IBM X-Force ID: 264116."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.4,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/264116",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7060686",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40686.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40686.json
new file mode 100644
index 00000000000..e2aff39f546
--- /dev/null
+++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40686.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-40686",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-29T01:15:40.920",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Management Central as part of IBM i 7.2, 7.3, 7.4, and 7.5 Navigator contains a local privilege escalation vulnerability. A malicious actor with command line access to the operating system can exploit this vulnerability to elevate privileges to gain component access to the operating system. IBM X-Force ID: 264114."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.4,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/264114",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7060686",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json
index 7055c374fca..489248e9eed 100644
--- a/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json
+++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40743.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-40743",
"sourceIdentifier": "security@apache.org",
"published": "2023-09-05T15:15:42.687",
- "lastModified": "2023-09-11T17:16:46.603",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-17T15:15:11.057",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through \"ServiceFactory.getService\" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE.\n\nAs Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to \"ServiceFactory.getService\", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "** NO SOPORTADO CUANDO EST\u00c9 ASIGNADO ** ** NO SOPORTADO CUANDO EST\u00c9 ASIGNADO ** Al integrar Apache Axis 1.x en una aplicaci\u00f3n, puede que no haya sido obvio que buscar un servicio a trav\u00e9s de \"ServiceFactory.getService\" permita mecanismos de b\u00fasqueda potencialmente peligrosos como LDAP . Al pasar entradas que no son de confianza a este m\u00e9todo API, esto podr\u00eda exponer la aplicaci\u00f3n a DoS, SSRF e incluso ataques que conduzcan a RCE. Como Axis 1 ha estado en EOL, le recomendamos migrar a un motor SOAP diferente, como Apache Axis 2/Java. Como workaround, puede revisar su c\u00f3digo para verificar que no se pase ninguna entrada que no sea de confianza o no sanitizada a \"ServiceFactory.getService\", o aplicando el parche desde https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210. El proyecto Apache Axis no espera crear una versi\u00f3n Axis 1.x que solucione este problema, aunque los contribuyentes que deseen trabajar para lograrlo son bienvenidos."
}
],
"metrics": {
@@ -80,6 +84,10 @@
"Patch",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00025.html",
+ "source": "security@apache.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40791.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40791.json
index 4555b09af33..f3b5e69e5ae 100644
--- a/CVE-2023/CVE-2023-407xx/CVE-2023-40791.json
+++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40791.json
@@ -2,31 +2,104 @@
"id": "CVE-2023-40791",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T03:15:09.273",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:20:57.327",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.12 fails to unpin pages in a certain situation, as demonstrated by a WARNING for try_grab_page."
+ },
+ {
+ "lang": "es",
+ "value": "extract_user_to_sg en lib/scatterlist.c en el kernel de Linux anterior a 6.4.12 no logra desanclar p\u00e1ginas en una situaci\u00f3n determinada, como lo demuestra una ADVERTENCIA para try_grab_page."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.4.12",
+ "matchCriteriaId": "242396F2-761D-4B72-ABF8-090BB852BD40"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f443fd5af5dbd531f880d3645d5dd36976cf087f",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
},
{
"url": "https://lkml.org/lkml/2023/8/3/323",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lore.kernel.org/linux-crypto/20571.1690369076@warthog.procyon.org.uk/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40829.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40829.json
index 94c29c23349..a218c527a57 100644
--- a/CVE-2023/CVE-2023-408xx/CVE-2023-40829.json
+++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40829.json
@@ -2,19 +2,83 @@
"id": "CVE-2023-40829",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T05:15:46.863",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T12:43:04.760",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "There is an interface unauthorized access vulnerability in the background of Tencent Enterprise Wechat Privatization 2.5.x and 2.6.930000."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de acceso no autorizado a la interfaz en segundo plano en Tencent Enterprise Wechat Privatization 2.5.x y 2.6.930000."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tencent:enterprise_wechat_privatization:2.5.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4B0F6BB-34C8-4D09-857E-17D0EADDC4C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tencent:enterprise_wechat_privatization:2.6.930000:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE47300D-BE0C-427E-979A-3B3C4E3393E2"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://gist.github.com/wwwziziyu/85bdf8d56b415974c4827a5668f493e9",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40833.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40833.json
index b520adcda38..917b3b0a05b 100644
--- a/CVE-2023/CVE-2023-408xx/CVE-2023-40833.json
+++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40833.json
@@ -2,19 +2,78 @@
"id": "CVE-2023-40833",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T06:15:14.330",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T14:30:30.113",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue in Thecosy IceCMS v.1.0.0 allows a remote attacker to gain privileges via the Id and key parameters in getCosSetting."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en Thecosy IceCMS v.1.0.0 permite a un atacante remoto obtener privilegios a trav\u00e9s del ID y los par\u00e1metros clave en getCosSetting."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:icecms_project:icecms:1.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E5ADD77-4B59-4369-8E90-64B18C1B4E78"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://gist.github.com/Sholway/93f05987dbf35c15c26de32b1e5590ec",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40851.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40851.json
index d7cde8bd454..68f95b52d96 100644
--- a/CVE-2023/CVE-2023-408xx/CVE-2023-40851.json
+++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40851.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40851",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T21:15:10.810",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T11:34:58.723",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,68 @@
"value": "Vulnerabilidad de Cross Site Scripting (XSS) en Phpgurukul User Registration & Login y User Management System con el panel de administraci\u00f3n 3.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de los campos fname, lname, correo electr\u00f3nico y contacto de la p\u00e1gina de registro de usuario."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:user_registration_\\&_login_and_user_management_system_with_admin_panel_project:user_registration_\\&_login_and_user_management_system_with_admin_panel:3.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9E8D5ECC-F201-44BE-99DD-56E19CE18686"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.exploit-db.com/exploits/51694",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40852.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40852.json
index 2fe82635486..6390c02b0d0 100644
--- a/CVE-2023/CVE-2023-408xx/CVE-2023-40852.json
+++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40852.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-40852",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T21:15:10.867",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T11:34:19.233",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,68 @@
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Phpgurukul User Registration & Login y User Management System con el panel de administraci\u00f3n 3.0 permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de una cadena manipulada en el campo de nombre de usuario administrador en la p\u00e1gina de inicio de sesi\u00f3n del administrador."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:user_registration_\\&_login_and_user_management_system_with_admin_panel_project:user_registration_\\&_login_and_user_management_system_with_admin_panel:3.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9E8D5ECC-F201-44BE-99DD-56E19CE18686"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.exploit-db.com/exploits/51695",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-409xx/CVE-2023-40968.json b/CVE-2023/CVE-2023-409xx/CVE-2023-40968.json
index ea5df1ebc0c..e7685e546c9 100644
--- a/CVE-2023/CVE-2023-409xx/CVE-2023-40968.json
+++ b/CVE-2023/CVE-2023-409xx/CVE-2023-40968.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-40968",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-01T16:15:08.473",
- "lastModified": "2023-09-18T14:15:07.557",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:14:35.067",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in hzeller timg v.1.5.1 and before allows a remote attacker to cause a denial of service via the 0x61200000045c address."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Desbordamiento de B\u00fafer en hzeller timg v.1.5.1 y anteriores permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de la direcci\u00f3n 0x61200000045c."
}
],
"metrics": {
@@ -55,8 +59,9 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:a:hzeller:timg:1.5.2:*:*:*:*:*:*:*",
- "matchCriteriaId": "C6F3F7A0-FF28-4B32-B4BB-7E95A859A324"
+ "criteria": "cpe:2.3:a:hzeller:timg:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.5.2",
+ "matchCriteriaId": "2EF623B3-00B0-4A6C-834B-6E5CBDFC1FBD"
}
]
}
@@ -75,7 +80,10 @@
},
{
"url": "https://github.com/hzeller/timg/releases/tag/v1.5.2",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4004.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4004.json
index 0d36ef3ec74..023f084970e 100644
--- a/CVE-2023/CVE-2023-40xx/CVE-2023-4004.json
+++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4004.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4004",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-31T17:15:10.203",
- "lastModified": "2023-10-11T19:15:11.007",
+ "lastModified": "2023-10-27T15:15:14.110",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -207,6 +207,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230719190824.21196-1-fw@strlen.de/",
"source": "secalert@redhat.com",
@@ -216,6 +220,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0001/",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4021.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4021.json
new file mode 100644
index 00000000000..4d7a054cb2f
--- /dev/null
+++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4021.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-4021",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.280",
+ "lastModified": "2023-10-26T14:55:32.727",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Modern Events Calendar lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Google API key and Calendar ID in versions up to, but not including, 7.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Modern Events Calendar lite para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s de la clave API de Google y el ID del calendario en versiones hasta la 7.1.0, pero no incluida, debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "7.1.0",
+ "matchCriteriaId": "96CECBFD-9B52-489A-A41F-6ACC3A771883"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://webnus.net/modern-events-calendar/change-log/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f213fb42-5bab-4017-80ea-ce6543031af2?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4089.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4089.json
index 43baa9651c7..8b3f2f92598 100644
--- a/CVE-2023/CVE-2023-40xx/CVE-2023-4089.json
+++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4089.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4089",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-10-17T07:15:10.090",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T18:00:38.507",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -50,10 +50,218 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "19",
+ "versionEndIncluding": "26",
+ "matchCriteriaId": "A495C583-8184-45A5-81E9-E621A58B7E51"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "532907AF-7E4A-4065-A799-753FC3313D6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "18",
+ "versionEndIncluding": "26",
+ "matchCriteriaId": "85625EA0-E44C-4A48-BA05-5D506CFDB678"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2DFC57C8-6AF4-4771-B0A0-744137FBFECF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16",
+ "versionEndIncluding": "26",
+ "matchCriteriaId": "9E5D5929-675F-493C-B3AF-70C7C79D3CEB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16",
+ "versionEndIncluding": "26",
+ "matchCriteriaId": "4F73AE30-E917-433E-BB67-CA383FCDDAFC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16",
+ "versionEndIncluding": "26",
+ "matchCriteriaId": "2DA3F602-1720-4B4B-A834-BD620D9B1F54"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16",
+ "versionEndIncluding": "26",
+ "matchCriteriaId": "A1FED163-F917-4CBC-83DA-D4D751C9121B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16",
+ "versionEndIncluding": "26",
+ "matchCriteriaId": "98F0C3C2-DE57-4134-AC3C-3D000A33528A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-046/",
- "source": "info@cert.vde.com"
+ "source": "info@cert.vde.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41072.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41072.json
new file mode 100644
index 00000000000..0ba120de6ac
--- /dev/null
+++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41072.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2023-41072",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.757",
+ "lastModified": "2023-10-26T00:15:10.803",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.1, iOS 17.1 y iPadOS 17.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41074.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41074.json
index b52039313fe..5ba972c938c 100644
--- a/CVE-2023/CVE-2023-410xx/CVE-2023-41074.json
+++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41074.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41074",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-27T15:19:26.570",
- "lastModified": "2023-10-14T03:15:10.020",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T20:14:36.737",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -96,6 +96,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -149,7 +174,11 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://support.apple.com/en-us/HT213936",
@@ -193,7 +222,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5527",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41077.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41077.json
new file mode 100644
index 00000000000..c56d7ace7ae
--- /dev/null
+++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41077.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-41077",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.810",
+ "lastModified": "2023-10-26T00:15:10.847",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6.1. An app may be able to access protected user data."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41085.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41085.json
index 29d888425f8..25cd187e96a 100644
--- a/CVE-2023/CVE-2023-410xx/CVE-2023-41085.json
+++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41085.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-41085",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:21.050",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T20:04:19.503",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nWhen IPSec is configured on a Virtual Server, undisclosed traffic can cause TMM to terminate.\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Cuando se configura IPSec en un servidor virtual, el tr\u00e1fico no divulgado puede provocar la finalizaci\u00f3n de TMM. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan."
}
],
"metrics": {
@@ -36,7 +40,7 @@
},
"weaknesses": [
{
- "source": "f5sirt@f5.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,12 +48,569 @@
"value": "CWE-755"
}
]
+ },
+ {
+ "source": "f5sirt@f5.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-755"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F11226F6-9080-4126-ACBD-7211A2746214"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A8F16422-A642-4614-96F2-E5B4877E8206"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "6603ED6A-3366-4572-AFCD-B3D4B1EC7606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "88978E38-81D3-4EFE-8525-A300B101FA69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "6DD4CF11-44E9-4596-9397-AF7DBD81277B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "DE979976-11C7-4AFF-8BE4-A094CC9C39CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "05E452AA-A520-4CBE-8767-147772B69194"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "596FC5D5-7329-4E39-841E-CAE937C02219"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F7280AA3-6EB0-4D9B-895B-B6883071740E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "95617B72-E7D8-44D2-AFF2-976595A72AFA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "9167FEC1-2C37-4946-9657-B4E69301FB24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7B4B3442-E0C0-48CD-87AD-060E15C9801E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "16795277-E8E2-4713-BD65-207655546649"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "0835E39B-F21E-4231-A4B9-5D511FF1B87A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F005EFFD-3A40-4762-B0D6-8760C406130F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "8705476E-A246-4B57-A0E1-FD626C1B0DE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "922AA845-530A-4B4B-9976-4CBC30C8A324"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F938EB43-8373-47EB-B269-C6DF058A9244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "8D82BCD8-136A-476C-AC86-710CA8B32EB7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "377DE308-CF91-488A-B296-30A3B09451D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "C7E422F6-C4C2-43AC-B137-0997B5739030"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "CC3F710F-DBCB-4976-9719-CF063DA22377"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "18CD2C82-0080-495E-8A11-957E0C182A48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "3C508A36-C041-406C-9C8A-A396C6EDC750"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "4C9FCBCB-9CE0-49E7-85C8-69E71D211912"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "112DFA85-90AD-478D-BD70-8C7C0C074F1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E912382D-131E-40F2-A337-72D6F2A3AD23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "91ED3C5E-92E8-44CF-AA99-A38C60AE677E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "2FBCE2D1-9D93-415D-AB2C-2060307C305A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "47962DDC-899F-4A98-ABF7-CC8A1AE7FF1C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "46A7F81E-84A2-4304-B18F-53E5CDBCEA43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "C0FE692A-CD63-4354-B599-2F47EEEFDD37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "B2F02EC0-E6C2-4E00-9804-043982D88BCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "BC2A757B-4521-4DB7-89B0-7CAE1E4155E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "0A1D4B18-DB59-41C4-B769-5DF93B8EBBAD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "D819F58A-826E-49E0-A06F-4D85E04D3D9F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1E86895C-EC5A-4303-978E-8807FE7A5E9A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "BC36311E-BB00-4750-85C8-51F5A2604F07"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E4958167-AB1F-4458-A06B-1B2DA313EEBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "D982C3E6-43DE-4AA8-889F-044E70C7FCB2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E6018B01-048C-43BB-A78D-66910ED60CA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "944B8F9C-E5C6-4DA8-BF2B-1C0B6A388BC4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "7DB6C626-BA78-4C06-8582-BFFCDF957429"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D9EC2237-117F-43BD-ADEC-516CF72E04EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "DCFAFFAC-000C-414D-83CF-B8B2C529D9CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "E68BFC75-6977-4644-A169-48263B896849"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7A4607BF-41AC-4E84-A110-74E085FF0445"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "672067B7-C838-4F0B-B3D0-E85F71715B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A4C17D18-1172-4396-9099-F1F5EAEACE5A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8257AA59-C14D-4EC1-B22C-DFBB92CBC297"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "1871634A-7609-4D01-8469-3D86F36DC19D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "603324D6-FE7A-4209-B92B-94EF09AB5FF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8A6F9699-A485-4614-8F38-5A556D31617E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "5A90F547-97A2-41EC-9FDF-25F869F0FA38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "220FD008-8919-48D4-84CF-8C4D99C3C474"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1935A1CF-50B2-4572-AA06-3504DB25B954"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "D47B7691-A95B-45C0-BAB4-27E047F3C379"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "077EBF51-B843-48B7-B31C-4BE1C99CE6F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "5EAC82FA-41CC-425A-89A0-CC9E2BF678EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "338010BF-EFC6-42B9-9F12-865C48D421EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "14776B4F-DDEC-4B22-82A5-EA231B3895F0"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K000132420",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41088.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41088.json
new file mode 100644
index 00000000000..7a6836f9946
--- /dev/null
+++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41088.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-41088",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T19:15:15.427",
+ "lastModified": "2023-10-25T13:39:31.207",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\n\n\n\n\n\n\nThe affected product is vulnerable to a cleartext transmission of sensitive information vulnerability, which may allow an attacker with access to the network, where clients have access to the DexGate server, could capture traffic. The attacker can later us the information within it to access the application.\n\n\n\n\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El producto afectado es vulnerable a transmisi\u00f3n de texto plano de informaci\u00f3n confidencial, lo que puede permitir que un atacante con acceso a la red, donde los clientes tienen acceso al servidor DexGate, pueda capturar el tr\u00e1fico. Posteriormente, el atacante puede utilizar la informaci\u00f3n que contiene para acceder a la aplicaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dexma:dexgate:20130114:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1220960-8C57-4BB1-9871-882D2E272F39"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41089.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41089.json
new file mode 100644
index 00000000000..1eda0b48bed
--- /dev/null
+++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41089.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-41089",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T19:15:15.513",
+ "lastModified": "2023-10-25T13:38:19.127",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\n\n\n\n\nThe affected product is vulnerable to an improper authentication vulnerability, which may allow an attacker to impersonate a legitimate user as long as the device keeps the session active, since the attack takes advantage of the cookie header to generate \"legitimate\" requests.\n\n\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El producto afectado por una vulnerabilidad de autenticaci\u00f3n inadecuada, que puede permitir a un atacante hacerse pasar por un usuario leg\u00edtimo siempre que el dispositivo mantenga la sesi\u00f3n activa, ya que el ataque aprovecha el encabezado de la cookie para generar solicitudes \"legitimate\"."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dexma:dexgate:20130114:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1220960-8C57-4BB1-9871-882D2E272F39"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41095.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41095.json
new file mode 100644
index 00000000000..bc3b5338d3c
--- /dev/null
+++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41095.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-41095",
+ "sourceIdentifier": "product-security@silabs.com",
+ "published": "2023-10-26T14:15:08.637",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing Encryption of Security Keys vulnerability in Silicon Labs OpenThread SDK on 32 bit, ARM (SecureVault High modules) allows potential modification or extraction of network credentials stored in flash.\nThis issue affects Silicon Labs OpenThread SDK: 2.3.1 and earlier.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de falta de cifrado de claves de seguridad en Silicon Labs OpenThread SDK de 32 bits, ARM (m\u00f3dulos SecureVault High) permite una posible modificaci\u00f3n o extracci\u00f3n de credenciales de red almacenadas en la memoria flash. Este problema afecta al SDK OpenThread de Silicon Labs: 2.3.1 y versiones anteriores."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "product-security@silabs.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "product-security@silabs.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-311"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000ZkKh7QAF?operationContext=S1",
+ "source": "product-security@silabs.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41096.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41096.json
new file mode 100644
index 00000000000..5cc6ae4eb41
--- /dev/null
+++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41096.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-41096",
+ "sourceIdentifier": "product-security@silabs.com",
+ "published": "2023-10-26T14:15:08.720",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Missing Encryption of Security Keys vulnerability in Silicon Labs Ember ZNet SDK on 32 bit, ARM (SecureVault High modules)\n allows potential modification or extraction of network credentials stored in flash.\n\n\nThis issue affects Silicon Labs Ember ZNet SDK: 7.3.1 and earlier.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Falta de Cifrado de Claves de Seguridad en Silicon Labs Ember ZNet SDK de 32 bits, ARM (m\u00f3dulos SecureVault High) permite una posible modificaci\u00f3n o extracci\u00f3n de las credenciales de red almacenadas en la memoria flash. Este problema afecta a Silicon Labs Ember ZNet SDK: 7.3.1 y versiones anteriores."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "product-security@silabs.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "product-security@silabs.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-311"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000ZkKh7QAF?operationContext=S1",
+ "source": "product-security@silabs.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41254.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41254.json
new file mode 100644
index 00000000000..86de487684a
--- /dev/null
+++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41254.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-41254",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.860",
+ "lastModified": "2023-10-26T00:15:10.890",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An app may be able to access sensitive user data."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41255.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41255.json
new file mode 100644
index 00000000000..d150542cdfb
--- /dev/null
+++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41255.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-41255",
+ "sourceIdentifier": "psirt@bosch.com",
+ "published": "2023-10-25T18:17:30.737",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication \r\nof the \u2018su\u2019 binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on the network."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad permite a un usuario sin privilegios con acceso a la subred del dispositivo TPC-110W obtener un shell ra\u00edz en el dispositivo abusando de la falta de autenticaci\u00f3n del archivo binario 'su' instalado en el dispositivo al que se puede acceder a trav\u00e9s del protocolo ADB (Android Debug Bridge) expuesto en la red."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html",
+ "source": "psirt@bosch.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41295.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41295.json
index 240f8a80bbc..215fb5abd99 100644
--- a/CVE-2023/CVE-2023-412xx/CVE-2023-41295.json
+++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41295.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41295",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-09-25T12:15:10.897",
- "lastModified": "2023-10-12T02:15:09.333",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:04:26.723",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -59,13 +59,18 @@
"cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "71C1C232-EA33-47F5-8C50-353C1D310581"
+ "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*",
- "matchCriteriaId": "102432F7-CD53-49F4-BFFF-A7CEBB535DBB"
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
}
]
}
@@ -75,11 +80,17 @@
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-413xx/CVE-2023-41335.json b/CVE-2023/CVE-2023-413xx/CVE-2023-41335.json
index 61898ace677..7259c637ccb 100644
--- a/CVE-2023/CVE-2023-413xx/CVE-2023-41335.json
+++ b/CVE-2023/CVE-2023-413xx/CVE-2023-41335.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41335",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T15:19:30.283",
- "lastModified": "2023-10-06T03:15:10.263",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-18T13:38:12.487",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -87,6 +87,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -107,11 +127,19 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Release Notes"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-413xx/CVE-2023-41339.json b/CVE-2023/CVE-2023-413xx/CVE-2023-41339.json
new file mode 100644
index 00000000000..965121a23c4
--- /dev/null
+++ b/CVE-2023/CVE-2023-413xx/CVE-2023-41339.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-41339",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:30.840",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The WMS specification defines an ``sld=`` parameter for GetMap, GetLegendGraphic and GetFeatureInfo operations for user supplied \"dynamic styling\". Enabling the use of dynamic styles, without also configuring URL checks, provides the opportunity for Service Side Request Forgery. This vulnerability can be used to steal user NetNTLMv2 hashes which could be relayed or cracked externally to gain further access. This vulnerability has been patched in versions 2.22.5 and 2.23.2."
+ },
+ {
+ "lang": "es",
+ "value": "GeoServer es un servidor de software de c\u00f3digo abierto escrito en Java que permite a los usuarios compartir y editar datos geoespaciales. La especificaci\u00f3n WMS define un par\u00e1metro ``sld=`` para las operaciones GetMap, GetLegendGraphic y GetFeatureInfo para el \"estilo din\u00e1mico\" proporcionado por el usuario. Habilitar el uso de estilos din\u00e1micos, sin configurar tambi\u00e9n comprobaciones de URL, brinda la oportunidad de Server-Side Request Forgery (SSRF). Esta vulnerabilidad se puede utilizar para robar hashes NetNTLMv2 del usuario que podr\u00edan transmitirse o descifrarse externamente para obtener m\u00e1s acceso. Esta vulnerabilidad ha sido parcheada en las versiones 2.22.5 y 2.23.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 8.6,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/geoserver/geoserver/releases/tag/2.22.5",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/geoserver/geoserver/releases/tag/2.23.2",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-cqpc-x2c6-2gmf",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-413xx/CVE-2023-41358.json b/CVE-2023/CVE-2023-413xx/CVE-2023-41358.json
index 8ccf19aeb2b..6bffc62b69c 100644
--- a/CVE-2023/CVE-2023-413xx/CVE-2023-41358.json
+++ b/CVE-2023/CVE-2023-413xx/CVE-2023-41358.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-41358",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-29T04:15:16.180",
- "lastModified": "2023-09-19T22:15:11.507",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T18:33:43.830",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en FRRouting FRR a trav\u00e9s de 9.0. bgpd/bgp_packet.c procesa NLRI si la longitud del atributo es cero."
}
],
"metrics": {
@@ -62,6 +66,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -75,11 +104,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5495",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-413xx/CVE-2023-41360.json b/CVE-2023/CVE-2023-413xx/CVE-2023-41360.json
index a08ed042242..f68629d9ba8 100644
--- a/CVE-2023/CVE-2023-413xx/CVE-2023-41360.json
+++ b/CVE-2023/CVE-2023-413xx/CVE-2023-41360.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41360",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-29T04:15:16.957",
- "lastModified": "2023-09-19T22:15:11.603",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:52:55.317",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -62,6 +62,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -75,7 +90,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-413xx/CVE-2023-41361.json b/CVE-2023/CVE-2023-413xx/CVE-2023-41361.json
index 850576bb0fe..30dc2019ba0 100644
--- a/CVE-2023/CVE-2023-413xx/CVE-2023-41361.json
+++ b/CVE-2023/CVE-2023-413xx/CVE-2023-41361.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41361",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-29T04:15:17.027",
- "lastModified": "2023-09-19T22:15:11.693",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:52:51.877",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,6 +66,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -79,7 +94,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-413xx/CVE-2023-41372.json b/CVE-2023/CVE-2023-413xx/CVE-2023-41372.json
new file mode 100644
index 00000000000..9c4ac415036
--- /dev/null
+++ b/CVE-2023/CVE-2023-413xx/CVE-2023-41372.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-41372",
+ "sourceIdentifier": "psirt@bosch.com",
+ "published": "2023-10-25T18:17:30.917",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The vulnerability allows an unprivileged (untrusted) third- party application to arbitrary modify the server settings of the Android Client application, inducing it to connect to an attacker - controlled malicious server.This is possible by forging a valid broadcast intent encrypted with a hardcoded RSA key pair"
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad permite que una aplicaci\u00f3n de terceros sin privilegios (no confiable) modifique arbitrariamente la configuraci\u00f3n del servidor de la aplicaci\u00f3n cliente de Android, induci\u00e9ndola a conectarse a un servidor malicioso controlado por un atacante. Esto es posible falsificando una intenci\u00f3n de transmisi\u00f3n v\u00e1lida cifrada con un par de claves RSA codificadas"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html",
+ "source": "psirt@bosch.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-413xx/CVE-2023-41373.json b/CVE-2023/CVE-2023-413xx/CVE-2023-41373.json
index 537f850fef9..502cca78f28 100644
--- a/CVE-2023/CVE-2023-413xx/CVE-2023-41373.json
+++ b/CVE-2023/CVE-2023-413xx/CVE-2023-41373.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-41373",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:21.227",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T20:15:51.720",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nA directory traversal vulnerability exists in the BIG-IP Configuration Utility that may allow an authenticated attacker to execute commands on the BIG-IP system. For BIG-IP system running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary.\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de directory traversal en la utilidad de configuraci\u00f3n BIG-IP que puede permitir que un atacante autenticado ejecute comandos en el sistema BIG-IP. Para el sistema BIG-IP que se ejecuta en modo Dispositivo, un exploit exitoso puede permitir al atacante cruzar un l\u00edmite de seguridad. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan."
}
],
"metrics": {
@@ -36,7 +40,7 @@
},
"weaknesses": [
{
- "source": "f5sirt@f5.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,12 +48,837 @@
"value": "CWE-22"
}
]
+ },
+ {
+ "source": "f5sirt@f5.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "4C36A0C6-7E2E-499C-8237-0CCD729BE2C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "05826F49-DAF1-42A4-BC75-40CAE06AA81A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "92F10A0D-A487-4B2A-ADF7-4AB3C5A98001"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "33A3F0F2-4154-4E72-8E35-26D8A9E70BA3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "6603ED6A-3366-4572-AFCD-B3D4B1EC7606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "3C91DF3D-6F75-4A5C-A189-E900B24B96EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "EC288C8B-91D5-45F6-B7C8-7621FDFB9FDB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "2ADC24ED-14A3-4F96-A6DA-5A2FDC60A71B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "D2451792-A917-44B7-9DEF-07FD4F1FF9D9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "922AA845-530A-4B4B-9976-4CBC30C8A324"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "43DD0BCE-ABC7-42D9-8D7A-827F43860644"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "3718FFC7-7DD6-4875-A8EC-0202422F6FB4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "C175FBF7-CF8D-48C2-B604-AC766AE3ECAD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "E450EA1E-3B71-4AD0-8A7B-1DF9ACB63F0A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "5898B0EF-5633-42FC-93C9-7B6E529F3561"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "FD3D6684-794C-4FDE-A476-53083F1ABB64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "69DE4021-B15C-4310-8898-E4EC3EC0DA60"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "3E7B2690-C2D9-4600-828F-10D05876E62B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "BA02CCB1-9B59-480A-9D2F-19A081C323EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "1BC44AD6-B321-4793-BB64-ED6478ED71F4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "04ABC7AA-1D2D-4954-863B-A417794B1F5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "E6D5C2FC-CBF9-4012-92F9-0616558EFB87"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "05E452AA-A520-4CBE-8767-147772B69194"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "7CBDE0A3-26CA-47D4-A3CC-C0D682681692"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "FECB5450-065D-40BE-BFFF-466741E0C3A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "E42EBA0A-EC53-4885-9AFD-AFF83224214C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "B6EBB17E-41FF-4C5C-A4A1-93C8B5884EBD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "9167FEC1-2C37-4946-9657-B4E69301FB24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "D8501E47-E208-48B6-A0A4-ED6AFE2342CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "B3D80331-F4B4-4232-BD55-803D6209B9B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "5E49638F-30AA-4112-8F6F-13F013F9E72B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "22366BB6-59D3-473D-A900-88E181BE5B8F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "87FAADF1-D2F3-4763-8C0E-AC84717E9D05"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "CD61929B-5CED-44EE-910D-8CC09184E0F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "3823874E-B0C1-4F7B-B1E7-1423C371E79C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "769C6FB7-8C9E-4D3D-B12A-473B6F0BDFAA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "C7E422F6-C4C2-43AC-B137-0997B5739030"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "6BC37842-1425-4478-9293-F714F3D4282D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "5DE6A6A8-CE64-4AE2-B12D-E72CE05FEC53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "C509C00E-2C92-4905-BD2D-22B5BDDDE4EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "4BF60D00-4EB4-4DCC-BCFB-0E6E220DFC06"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "4C9FCBCB-9CE0-49E7-85C8-69E71D211912"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "020A87EC-010F-4D7A-B478-E8703B21E5B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "AD9109FE-795F-4727-8157-348A0DB505FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "FAD1751B-9818-474E-B970-719CE1AEA782"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "4CA2EF79-D15B-404D-8E7F-56215CBD383E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "F8694BB1-814A-4460-B37B-4A57CD01BB4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "08654535-66B2-42EB-BA69-E7120694E6C2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "9A519F4C-D469-47A0-9F61-2EE33976177D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "F02AFC93-31CE-453F-8277-5BA2A950F036"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "34EF3612-A6B8-4B15-956E-78FB521F154F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "1321B2E9-A7A6-4AE2-9B73-453B81E517FB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "67CAB7BF-AC42-4957-9F8F-59CACA30D0A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "16FBDFCC-81A6-47D2-986D-D042CEBA3440"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E6018B01-048C-43BB-A78D-66910ED60CA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "78522028-7E6A-45D5-A704-6043E5DCA79A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "792C533A-36AB-4161-AC80-69A195FFDF2A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "11EA68F6-028C-4A63-AFB6-0B6F36F5EB8C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "E5C43DB5-8396-4073-BA3C-D8983C87B921"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D9EC2237-117F-43BD-ADEC-516CF72E04EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "70F04F73-E72B-4FDB-AEB6-756C4DF0E45B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "D9C581F2-76D7-45B0-9F81-C678BD9071C1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "16657185-FDAA-4DF4-A2A1-1B5BAF8697FB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "93991114-2C3F-4C46-BCF4-EE7F99EE886F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8257AA59-C14D-4EC1-B22C-DFBB92CBC297"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "4E7B9B26-C38A-49A7-A2C9-F2EF2969ABE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "46384B09-5E14-4BEC-B433-9803A59B805C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "957276C7-DA88-44F1-AB18-AA39DC1BF9B4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "52FE31B8-7E0F-40A9-9042-6DA1A5F27894"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8A6F9699-A485-4614-8F38-5A556D31617E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "24CA6F7A-03A5-47B6-8FED-1A97863ED527"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "5FC43804-920D-49EB-B2B3-3F353BD8E24B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "D6D0A641-7EF3-4F9E-9503-4A202E04102A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "1AEFFF75-3DA0-4D71-BC62-9E0081F5E006"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "BCB3E253-A9F2-426C-B790-DF90BC7C3367"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "D8D51FD0-D67E-44CC-9803-108FC8327D02"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "095E5580-CF33-45EB-90DB-1EB4F0C0DFCA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "0ED65CB7-2567-470D-A675-7A32797921B9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndExcluding": "14.1.5.6",
+ "matchCriteriaId": "90CF685F-F17D-48B0-927A-95CFE0AE967B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.10.2",
+ "matchCriteriaId": "45418FC7-11BE-48B8-9827-00F8C0964BCC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4.1",
+ "matchCriteriaId": "D097C6A6-5C8D-4275-B0CD-3947E11AA5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.1.0",
+ "versionEndExcluding": "17.1.0.3",
+ "matchCriteriaId": "CDCCECC1-ED27-45DE-AFEF-DBA30EF5FE91"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K000135689",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41629.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41629.json
new file mode 100644
index 00000000000..5f515529705
--- /dev/null
+++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41629.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-41629",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T22:15:17.057",
+ "lastModified": "2023-10-23T18:28:03.807",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A lack of input sanitizing in the file download feature of eSST Monitoring v2.147.1 allows attackers to execute a path traversal."
+ },
+ {
+ "lang": "es",
+ "value": "La falta de sanitizaci\u00f3n de entradas en la funci\u00f3n de descarga de archivos de eSST Monitoring v2.147.1 permite a los atacantes ejecutar un path traversal."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:esst:esst_monitoring:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.147.1",
+ "matchCriteriaId": "1B10026C-BB56-45FA-951B-E4AECAA5754E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2023-41629-eSST-Path-Traversal.pdf",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41630.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41630.json
new file mode 100644
index 00000000000..b72065d6f29
--- /dev/null
+++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41630.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-41630",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T22:15:17.113",
+ "lastModified": "2023-10-23T18:27:07.343",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "eSST Monitoring v2.147.1 was discovered to contain a remote code execution (RCE) vulnerability via the Gii code generator component."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que eSST Monitoring v2.147.1 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del componente generador de c\u00f3digo Gii."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-94"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:esst:esst_monitoring:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.147.1",
+ "matchCriteriaId": "1B10026C-BB56-45FA-951B-E4AECAA5754E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2023-41630-eSST-Preauth-RCE.pdf",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41631.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41631.json
new file mode 100644
index 00000000000..cdf55eee97d
--- /dev/null
+++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41631.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-41631",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T22:15:17.163",
+ "lastModified": "2023-10-23T18:26:25.733",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "eSST Monitoring v2.147.1 was discovered to contain a remote code execution (RCE) vulnerability via the file upload function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que eSST Monitoring v2.147.1 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de la funci\u00f3n de carga de archivos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:esst:esst_monitoring:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.147.1",
+ "matchCriteriaId": "1B10026C-BB56-45FA-951B-E4AECAA5754E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2023-41631-eSST-RCE.pdf",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41711.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41711.json
new file mode 100644
index 00000000000..3b91d2742ce
--- /dev/null
+++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41711.json
@@ -0,0 +1,503 @@
+{
+ "id": "CVE-2023-41711",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-17T23:15:12.027",
+ "lastModified": "2023-10-19T16:44:31.847",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SonicOS post-authentication Stack-Based Buffer Overflow Vulnerability in the sonicwall.exp, prefs.exp URL endpoints lead to a firewall crash."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de desbordamiento del b\u00fafer posterior a la autenticaci\u00f3n de SonicOS en los endpoint de URL sonicwall.exp, prefs.exp provoca una falla del firewall."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0.1-5145",
+ "matchCriteriaId": "2C7049FD-8088-4FCE-886A-F4CF5E287D1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa2700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AFAFCEC-A61E-40EB-87B9-7449751CCAF8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa3700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC4F132-D29A-4974-86DA-6E35AB05327C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa4700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBE365CF-DBE9-4C84-AB0C-0CAB7C74ED40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "016BB564-CEFC-4E0C-9D38-D9C4C8B2E492"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D95DCC6-6F48-4A79-A9F6-BDB1AEFA2180"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp10700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15F2741F-3C32-4075-A224-BE272B50E3D9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp11700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC883B32-987C-4D34-8BBF-39E2C57A62EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp13700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C72EA66A-320C-4D5E-B3F6-6D5F8733E2F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp15700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B4A33E-8456-451E-AAF4-7F48BEDACF45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.4-44v-21-2340",
+ "matchCriteriaId": "9B91638E-FB80-4C65-8A37-827488CB3E2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.13-105n",
+ "matchCriteriaId": "0D74A465-1A72-4A02-8A54-FD502BD28119"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F86D13F9-D41E-4230-9116-A781FFAEF00D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012",
+ "source": "PSIRT@sonicwall.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41712.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41712.json
new file mode 100644
index 00000000000..2248df13beb
--- /dev/null
+++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41712.json
@@ -0,0 +1,503 @@
+{
+ "id": "CVE-2023-41712",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-17T23:15:12.093",
+ "lastModified": "2023-10-19T16:44:23.567",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SonicOS post-authentication Stack-Based Buffer Overflow Vulnerability in the SSL VPN plainprefs.exp URL endpoint leads to a firewall crash."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de desbordamiento del b\u00fafer posterior a la autenticaci\u00f3n de SonicOS en el extremo URL de SSL VPN plainprefs.exp provoca una falla del firewall."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0.1-5145",
+ "matchCriteriaId": "2C7049FD-8088-4FCE-886A-F4CF5E287D1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa2700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AFAFCEC-A61E-40EB-87B9-7449751CCAF8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa3700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC4F132-D29A-4974-86DA-6E35AB05327C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa4700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBE365CF-DBE9-4C84-AB0C-0CAB7C74ED40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "016BB564-CEFC-4E0C-9D38-D9C4C8B2E492"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D95DCC6-6F48-4A79-A9F6-BDB1AEFA2180"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp10700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15F2741F-3C32-4075-A224-BE272B50E3D9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp11700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC883B32-987C-4D34-8BBF-39E2C57A62EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp13700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C72EA66A-320C-4D5E-B3F6-6D5F8733E2F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp15700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B4A33E-8456-451E-AAF4-7F48BEDACF45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.4-44v-21-2340",
+ "matchCriteriaId": "9B91638E-FB80-4C65-8A37-827488CB3E2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.13-105n",
+ "matchCriteriaId": "0D74A465-1A72-4A02-8A54-FD502BD28119"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F86D13F9-D41E-4230-9116-A781FFAEF00D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012",
+ "source": "PSIRT@sonicwall.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41713.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41713.json
new file mode 100644
index 00000000000..62256e4c8d1
--- /dev/null
+++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41713.json
@@ -0,0 +1,503 @@
+{
+ "id": "CVE-2023-41713",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-17T23:15:12.160",
+ "lastModified": "2023-10-19T16:44:14.770",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SonicOS Use of Hard-coded Password vulnerability in the 'dynHandleBuyToolbar' demo function."
+ },
+ {
+ "lang": "es",
+ "value": "SonicOS utiliza la vulnerabilidad de contrase\u00f1a codificada en la funci\u00f3n de demostraci\u00f3n 'dynHandleBuyToolbar'."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
+ },
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-259"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0.1-5145",
+ "matchCriteriaId": "2C7049FD-8088-4FCE-886A-F4CF5E287D1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa2700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AFAFCEC-A61E-40EB-87B9-7449751CCAF8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa3700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC4F132-D29A-4974-86DA-6E35AB05327C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa4700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBE365CF-DBE9-4C84-AB0C-0CAB7C74ED40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "016BB564-CEFC-4E0C-9D38-D9C4C8B2E492"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D95DCC6-6F48-4A79-A9F6-BDB1AEFA2180"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp10700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15F2741F-3C32-4075-A224-BE272B50E3D9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp11700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC883B32-987C-4D34-8BBF-39E2C57A62EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp13700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C72EA66A-320C-4D5E-B3F6-6D5F8733E2F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp15700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B4A33E-8456-451E-AAF4-7F48BEDACF45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.4-44v-21-2340",
+ "matchCriteriaId": "9B91638E-FB80-4C65-8A37-827488CB3E2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.13-105n",
+ "matchCriteriaId": "0D74A465-1A72-4A02-8A54-FD502BD28119"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F86D13F9-D41E-4230-9116-A781FFAEF00D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012",
+ "source": "PSIRT@sonicwall.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41715.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41715.json
new file mode 100644
index 00000000000..ba41e8f9bdb
--- /dev/null
+++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41715.json
@@ -0,0 +1,503 @@
+{
+ "id": "CVE-2023-41715",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-17T23:15:12.227",
+ "lastModified": "2023-10-19T16:43:38.577",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SonicOS post-authentication Improper Privilege Management vulnerability in the SonicOS SSL VPN Tunnel allows users to elevate their privileges inside the tunnel.\n"
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de administraci\u00f3n de privilegios inadecuada posterior a la autenticaci\u00f3n de SonicOS en el t\u00fanel VPN SSL de SonicOS permite a los usuarios elevar sus privilegios dentro del t\u00fanel."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ },
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "7.0.1-5145",
+ "matchCriteriaId": "2C7049FD-8088-4FCE-886A-F4CF5E287D1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa2700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AFAFCEC-A61E-40EB-87B9-7449751CCAF8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa3700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC4F132-D29A-4974-86DA-6E35AB05327C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa4700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CBE365CF-DBE9-4C84-AB0C-0CAB7C74ED40"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "016BB564-CEFC-4E0C-9D38-D9C4C8B2E492"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa6700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D95DCC6-6F48-4A79-A9F6-BDB1AEFA2180"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp10700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15F2741F-3C32-4075-A224-BE272B50E3D9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp11700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC883B32-987C-4D34-8BBF-39E2C57A62EE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp13700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C72EA66A-320C-4D5E-B3F6-6D5F8733E2F1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nssp15700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8B4A33E-8456-451E-AAF4-7F48BEDACF45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.4-44v-21-2340",
+ "matchCriteriaId": "9B91638E-FB80-4C65-8A37-827488CB3E2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv270:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DACDCE12-74C2-4F3C-8421-9191700514C5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv470:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AF1ECB1-6257-41E3-A050-6467063F4807"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsv870:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0883D805-1BA9-49CE-AEC7-51C9D9A69C5C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4.13-105n",
+ "matchCriteriaId": "0D74A465-1A72-4A02-8A54-FD502BD28119"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F86D13F9-D41E-4230-9116-A781FFAEF00D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7BCDFEE-DC5A-44B8-85DF-8BFC02B1A973"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A24BCC0-CE41-49AF-B03D-D4FCB422503B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "043858A6-26AC-4EB0-A240-A43AD08C6AD5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8FD73880-DC60-467F-99B6-69807D58A840"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "73BB9452-A014-4A68-9662-63E6C60EEAD2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0CF683A-7E83-464B-8A0D-4CC641377FA6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FAAEBB4-F180-4195-BA7F-591AB02EEDC9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD9C3F77-2F1A-4C4F-A8F8-CDBFB7B87891"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "676B05B2-716E-4DC4-BEE8-0E3BCCA5DB27"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEF2B435-957C-4BBE-937D-23E4F33189EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0CE4FE75-10AD-47D4-AF87-E4C294F89EA8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B485C543-DFCF-4481-92B4-F7198EE4FBD1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9450:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "928C1C0D-7AF7-4076-B5B2-207DFF3AD6A4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F030C5AB-36CA-445E-AC87-8DEE18DBB40E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sm_9650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1F9D940-8AE2-4B92-B69D-9FF6F48DF16C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9FDE64E9-44DD-4B7C-BA34-FE2C79E3FAED"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E8F3935-89B4-4091-9B8C-442C02FD4F3A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:sohow:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7268E89B-FF46-45AD-82FF-333505EF957B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0804FADE-57F7-452F-86B3-079701059D37"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9956F726-6D62-4616-B60A-4D3DD6F32105"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_300w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29F4D403-F20A-4802-AAE9-9582486EB436"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_350:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "675F28A7-0BB3-4CDA-855E-7EFC650B512E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5983C650-84F6-4B2E-A27E-9E83EA1DDC02"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_400w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDD4B412-7967-477F-929E-8F12A39186FF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A1D996FA-52D1-47C2-87E6-682EEC9CA532"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_500w:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9DEF6EE-000D-407D-AA2B-E039BA306A2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0B8BFA4-2E15-4318-B7A9-DBDE801D0CF0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:sonicwall:tz_600p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCB8CDE6-8052-40F7-950F-05329499A58A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012",
+ "source": "PSIRT@sonicwall.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41721.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41721.json
new file mode 100644
index 00000000000..4ab46ab19e2
--- /dev/null
+++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41721.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-41721",
+ "sourceIdentifier": "support@hackerone.com",
+ "published": "2023-10-25T18:17:30.987",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Instances of UniFi Network Application that (i) are run on a UniFi Gateway Console, and (ii) are versions 7.5.176. and earlier, implement device adoption with improper access control logic, creating a risk of access to device configuration information by a malicious actor with preexisting access to the network.\n\nAffected Products:\nUDM\nUDM-PRO\nUDM-SE\nUDR\nUDW\n \nMitigation:\nUpdate UniFi Network to Version 7.5.187 or later.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Instancias de la aplicaci\u00f3n UniFi Network que \n(i) se ejecutan en una consola UniFi Gateway y \n(ii) son versiones 7.5.176. y antes, \nimplementan la adopci\u00f3n de dispositivos con una l\u00f3gica de control de acceso inadecuada, creando un riesgo de acceso a la informaci\u00f3n de configuraci\u00f3n del dispositivo por parte de un actor malintencionado con acceso preexistente a la red. Productos afectados: UDM UDM-PRO UDM-SE UDR UDW Mitigaci\u00f3n: actualice UniFi Network a la versi\u00f3n 7.5.187 o posterior."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV30": [
+ {
+ "source": "support@hackerone.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 10.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://community.ui.com/releases/Security-Advisory-Bulletin-036-036/81367bc9-2a64-4435-95dc-bbe482457615",
+ "source": "support@hackerone.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41752.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41752.json
index e01d115cc6c..cfe1985f9fe 100644
--- a/CVE-2023/CVE-2023-417xx/CVE-2023-41752.json
+++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41752.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41752",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-17T07:15:09.960",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:11:14.987",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,44 @@
"value": "Vulnerabilidad de Exposici\u00f3n de Informaci\u00f3n Confidencial de Actor No Autorizado en Apache Traffic Server. Este problema afecta a Apache Traffic Server: desde 8.0.0 hasta 8.1.8, desde 9.0.0 hasta 9.2.2. Se recomienda a los usuarios actualizar a la versi\u00f3n 8.1.9 o 9.2.3, que soluciona el problema."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
- "source": "security@apache.org",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security@apache.org",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -27,10 +60,74 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0.0",
+ "versionEndExcluding": "8.1.9",
+ "matchCriteriaId": "93A1A748-6C71-4191-8A16-A93E94E2CDE4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.0.0",
+ "versionEndExcluding": "9.2.3",
+ "matchCriteriaId": "4E4BCAF6-B246-41EC-9EE1-24296BFC4F5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41881.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41881.json
index fd342cff930..4210132229e 100644
--- a/CVE-2023/CVE-2023-418xx/CVE-2023-41881.json
+++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41881.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-41881",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-11T20:15:10.617",
- "lastModified": "2023-10-11T21:04:47.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T02:24:31.603",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "vantage6 is privacy preserving federated learning infrastructure. When a collaboration is deleted, the linked resources (such as tasks from that collaboration) should be deleted. This is partly to manage data properly, but also to prevent a potential (but unlikely) side-effect that affects versions prior to 4.0.0, where if a collaboration with id=10 is deleted, and subsequently a new collaboration is created with id=10, the authenticated users in that collaboration could potentially see results of the deleted collaboration in some cases. Version 4.0.0 contains a patch for this issue. There are no known workarounds."
+ },
+ {
+ "lang": "es",
+ "value": "vantage6 es una infraestructura de aprendizaje federada que preserva la privacidad. Cuando se elimina una colaboraci\u00f3n, se deben eliminar los recursos vinculados (como las tareas de esa colaboraci\u00f3n). Esto es en parte para administrar los datos correctamente, pero tambi\u00e9n para evitar un efecto secundario potencial (pero poco probable) que afecte a las versiones anteriores a la 4.0.0, donde si se elimina una colaboraci\u00f3n con id=10 y posteriormente se crea una nueva colaboraci\u00f3n con id =10, los usuarios autenticados en esa colaboraci\u00f3n podr\u00edan ver los resultados de la colaboraci\u00f3n eliminada en algunos casos. La versi\u00f3n 4.0.0 contiene un parche para este problema. No se conocen workarounds."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -36,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -50,18 +84,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.0.0",
+ "matchCriteriaId": "21C07998-FF3A-4F49-B6B7-97E89CB0A6B4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/vantage6/vantage6/blob/0682c4288f43fee5bcc72dc448cdd99bd7e57f76/docs/release_notes.rst#400",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/vantage6/vantage6/pull/748",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-rf54-7qrr-96j6",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41882.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41882.json
index ca100e1d780..03bfc3c4489 100644
--- a/CVE-2023/CVE-2023-418xx/CVE-2023-41882.json
+++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41882.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-41882",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-11T20:15:10.700",
- "lastModified": "2023-10-11T21:04:47.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T02:27:00.507",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, prior to version 4.0.0, it is only checked if the user has permission to view the collaboration. Version 4.0.0 contains a patch. There are no known workarounds."
+ },
+ {
+ "lang": "es",
+ "value": "vantage6 es una infraestructura de aprendizaje federada que preserva la privacidad. El endpoint /api/collaboration/{id}/task se utiliza para recopilar todas las tareas de una determinada colaboraci\u00f3n. Para realizar dichas tareas, un usuario debe tener permiso para ver la colaboraci\u00f3n y las tareas que contiene. Sin embargo, antes de la versi\u00f3n 4.0.0, solo se verifica si el usuario tiene permiso para ver la colaboraci\u00f3n. La versi\u00f3n 4.0.0 contiene un parche. No se conocen workarounds."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -50,18 +74,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.0.0",
+ "matchCriteriaId": "21C07998-FF3A-4F49-B6B7-97E89CB0A6B4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/vantage6/vantage6/blob/0682c4288f43fee5bcc72dc448cdd99bd7e57f76/docs/release_notes.rst#400",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/vantage6/vantage6/pull/711",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-gc57-xhh5-m94r",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41893.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41893.json
new file mode 100644
index 00000000000..f3f87e66e37
--- /dev/null
+++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41893.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-41893",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-20T00:15:16.017",
+ "lastModified": "2023-10-26T18:38:14.750",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Home assistant is an open source home automation. The audit team\u2019s analyses confirmed that the `redirect_uri` and `client_id` are alterable when logging in. Consequently, the code parameter utilized to fetch the `access_token` post-authentication will be sent to the URL specified in the aforementioned parameters. Since an arbitrary URL is permitted and `homeassistant.local` represents the preferred, default domain likely used and trusted by many users, an attacker could leverage this weakness to manipulate a user and retrieve account access. Notably, this attack strategy is plausible if the victim has exposed their Home Assistant to the Internet, since after acquiring the victim\u2019s `access_token` the adversary would need to utilize it directly towards the instance to achieve any pertinent malicious actions. To achieve this compromise attempt, the attacker must send a link with a `redirect_uri` that they control to the victim\u2019s own Home Assistant instance. In the eventuality the victim authenticates via said link, the attacker would obtain code sent to the specified URL in `redirect_uri`, which can then be leveraged to fetch an `access_token`. Pertinently, an attacker could increase the efficacy of this strategy by registering a near identical domain to `homeassistant.local`, which at first glance may appear legitimate and thereby obfuscate any malicious intentions. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. Los an\u00e1lisis del equipo de auditor\u00eda confirmaron que `redirect_uri` y `client_id` se pueden modificar al iniciar sesi\u00f3n. En consecuencia, el par\u00e1metro de c\u00f3digo utilizado para obtener la autenticaci\u00f3n posterior `access_token` se enviar\u00e1 a la URL especificada en los par\u00e1metros antes mencionados. Dado que se permite una URL arbitraria y `homeassistant.local` representa el dominio predeterminado preferido que probablemente muchos usuarios utilizan y conf\u00edan en \u00e9l, un atacante podr\u00eda aprovechar esta debilidad para manipular a un usuario y recuperar el acceso a la cuenta. En particular, esta estrategia de ataque es plausible si la v\u00edctima ha expuesto su Home Assistant a Internet, ya que despu\u00e9s de adquirir el \"access_token\" de la v\u00edctima, el adversario necesitar\u00eda utilizarlo directamente hacia la instancia para realizar cualquier acci\u00f3n maliciosa pertinente. Para lograr este intento de compromiso, el atacante debe enviar un enlace con un `redirect_uri` que controla a la propia instancia de Home Assistant de la v\u00edctima. En el caso de que la v\u00edctima se autentique a trav\u00e9s de dicho enlace, el atacante obtendr\u00eda el c\u00f3digo enviado a la URL especificada en \"redirect_uri\", que luego se puede aprovechar para obtener un \"access_token\". Es pertinente que un atacante pueda aumentar la eficacia de esta estrategia registrando un dominio casi id\u00e9ntico a \"homeassistant.local\", que a primera vista puede parecer leg\u00edtimo y, por lo tanto, ocultar cualquier intenci\u00f3n maliciosa. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.9.0",
+ "matchCriteriaId": "C469208E-F2FD-4DCB-B5EE-0CBCD199142A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-qhhj-7hrc-gqj5",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41894.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41894.json
new file mode 100644
index 00000000000..9835d28cb22
--- /dev/null
+++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41894.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-41894",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-20T00:15:16.093",
+ "lastModified": "2023-10-26T18:01:12.650",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. La evaluaci\u00f3n verific\u00f3 que los webhooks disponibles en el componente webhook se pueden activar a trav\u00e9s de la URL `*.ui.nabu.casa` sin autenticaci\u00f3n, incluso cuando el webhook est\u00e1 marcado como Solo accesible desde la red local. Este problema se ve facilitado por el proxy SniTun, que establece la direcci\u00f3n de origen en 127.0.0.1 en todas las solicitudes enviadas a la URL p\u00fablica y reenviadas al Home Assistant local. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-669"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.9.0",
+ "matchCriteriaId": "C469208E-F2FD-4DCB-B5EE-0CBCD199142A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41895.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41895.json
new file mode 100644
index 00000000000..72a0cb11cbd
--- /dev/null
+++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41895.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-41895",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T23:15:08.450",
+ "lastModified": "2023-10-26T16:30:16.850",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Home assistant is an open source home automation. The Home Assistant login page allows users to use their local Home Assistant credentials and log in to another website that specifies the `redirect_uri` and `client_id` parameters. Although the `redirect_uri` validation typically ensures that it matches the `client_id` and the scheme represents either `http` or `https`, Home Assistant will fetch the `client_id` and check for `` HTML tags on the page. These URLs are not subjected to the same scheme validation and thus allow for arbitrary JavaScript execution on the Home Assistant administration page via usage of `javascript:` scheme URIs. This Cross-site Scripting (XSS) vulnerability can be executed on the Home Assistant frontend domain, which may be used for a full takeover of the Home Assistant account and installation. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. La p\u00e1gina de inicio de sesi\u00f3n de Home Assistant permite a los usuarios utilizar sus credenciales locales de Home Assistant e iniciar sesi\u00f3n en otro sitio web que especifique los par\u00e1metros `redirect_uri` y `client_id`. Aunque la validaci\u00f3n de `redirect_uri` generalmente garantiza que coincide con `client_id` y el esquema representa `http` o `https`, Home Assistant buscar\u00e1 `client_id` y buscar\u00e1 `` Etiquetas HTML en la p\u00e1gina. Estas URL no est\u00e1n sujetas a la misma validaci\u00f3n de esquema y, por lo tanto, permiten la ejecuci\u00f3n arbitraria de JavaScript en la p\u00e1gina de administraci\u00f3n de Home Assistant mediante el uso de URI de esquema `javascript:`. Esta vulnerabilidad de Cross-Site Scripting (XSS) se puede ejecutar en el dominio frontend de Home Assistant, que puede usarse para tomar el control completo de la cuenta e instalaci\u00f3n de Home Assistant. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 6.0
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.9.0",
+ "matchCriteriaId": "C469208E-F2FD-4DCB-B5EE-0CBCD199142A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-jvxq-x42r-f7mv",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41896.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41896.json
new file mode 100644
index 00000000000..e4db20e36ee
--- /dev/null
+++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41896.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-41896",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T23:15:08.540",
+ "lastModified": "2023-10-26T16:18:35.630",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Home assistant is an open source home automation. Whilst auditing the frontend code to identify hidden parameters, Cure53 detected `auth_callback=1`, which is leveraged by the WebSocket authentication logic in tandem with the `state` parameter. The state parameter contains the `hassUrl`, which is subsequently utilized to establish a WebSocket connection. This behavior permits an attacker to create a malicious Home Assistant link with a modified state parameter that forces the frontend to connect to an alternative WebSocket backend. Henceforth, the attacker can spoof any WebSocket responses and trigger cross site scripting (XSS). Since the XSS is executed on the actual Home Assistant frontend domain, it can connect to the real Home Assistant backend, which essentially represents a comprehensive takeover scenario. Permitting the site to be iframed by other origins, as discussed in GHSA-935v-rmg9-44mw, renders this exploit substantially covert since a malicious website can obfuscate the compromise strategy in the background. However, even without this, the attacker can still send the `auth_callback` link directly to the victim user. To mitigate this issue, Cure53 advises modifying the WebSocket code\u2019s authentication flow. An optimal implementation in this regard would not trust the `hassUrl` passed in by a GET parameter. Cure53 must stipulate the significant time required of the Cure53 consultants to identify an XSS vector, despite holding full control over the WebSocket responses. In many areas, data from the WebSocket was properly sanitized, which hinders post-exploitation. The audit team eventually detected the `js_url` for custom panels, though generally, the frontend exhibited reasonable security hardening. This issue has been addressed in Home Assistant Core version 2023.8.0 and in the npm package home-assistant-js-websocket in version 8.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. Mientras auditaba el c\u00f3digo de la interfaz para identificar par\u00e1metros ocultos, Cure53 detect\u00f3 `auth_callback=1`, que es aprovechado por la l\u00f3gica de autenticaci\u00f3n de WebSocket junto con el par\u00e1metro `state`. El par\u00e1metro de estado contiene `hassUrl`, que posteriormente se utiliza para establecer una conexi\u00f3n WebSocket. Este comportamiento permite a un atacante crear un enlace malicioso de Home Assistant con un par\u00e1metro de estado modificado que obliga al frontend a conectarse a un backend WebSocket alternativo. De ahora en adelante, el atacante puede falsificar cualquier respuesta de WebSocket y activar Cross-Site Scripting (XSS). Dado que XSS se ejecuta en el dominio frontend real de Home Assistant, puede conectarse al backend real de Home Assistant, lo que esencialmente representa un escenario de adquisici\u00f3n integral. Permitir que el sitio tenga un iframe de otros or\u00edgenes, como se analiza en GHSA-935v-rmg9-44mw, hace que este exploit sea sustancialmente encubierto, ya que un sitio web malicioso puede ofuscar la estrategia de compromiso en segundo plano. Sin embargo, incluso sin esto, el atacante a\u00fan puede enviar el enlace `auth_callback` directamente al usuario v\u00edctima. Para mitigar este problema, Cure53 recomienda modificar el flujo de autenticaci\u00f3n del c\u00f3digo WebSocket. Una implementaci\u00f3n \u00f3ptima a este respecto no confiar\u00eda en el `hassUrl` pasado por un par\u00e1metro GET. Cure53 debe estipular el importante tiempo requerido por los consultores de Cure53 para identificar un vector XSS, a pesar de tener control total sobre las respuestas de WebSocket. En muchas \u00e1reas, los datos del WebSocket se sanitizaron adecuadamente, lo que dificulta su posterior explotaci\u00f3n. El equipo de auditor\u00eda finalmente detect\u00f3 el `js_url` para paneles personalizados, aunque en general, la interfaz mostr\u00f3 un refuerzo de seguridad razonable. Este problema se solucion\u00f3 en la versi\u00f3n 2023.8.0 de Home Assistant Core y en el paquete npm home-assistant-js-websocket en la versi\u00f3n 8.2.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-345"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-345"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.8.0",
+ "matchCriteriaId": "5FA5180B-1B8F-4CF6-84F2-A41078BC5BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:home-assistant:home-assistant-js-websocket:*:*:*:*:*:node.js:*:*",
+ "versionEndExcluding": "8.2.0",
+ "matchCriteriaId": "08A4163A-BF4B-4823-ADB6-81078E9345F5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41897.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41897.json
new file mode 100644
index 00000000000..7624b0a3047
--- /dev/null
+++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41897.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-41897",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T23:15:08.623",
+ "lastModified": "2023-10-26T16:16:28.380",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Home assistant is an open source home automation. Home Assistant server does not set any HTTP security headers, including the X-Frame-Options header, which specifies whether the web page is allowed to be framed. The omission of this and correlating headers facilitates covert clickjacking attacks and alternative exploit opportunities, such as the vector described in this security advisory. This fault incurs major risk, considering the ability to trick users into installing an external and malicious add-on with minimal user interaction, which would enable Remote Code Execution (RCE) within the Home Assistant application. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. El servidor Home Assistant no establece ning\u00fan encabezado de seguridad HTTP, incluido el encabezado X-Frame-Options, que especifica si se permite que la p\u00e1gina web este enmarcada. La omisi\u00f3n de este y los encabezados correlacionados facilita los ataques encubiertos de clickjacking y oportunidades de explotaci\u00f3n alternativas, como el vector descrito en este aviso de seguridad. Esta falla conlleva un riesgo importante, considerando la capacidad de enga\u00f1ar a los usuarios para que instalen un complemento externo y malicioso con una interacci\u00f3n m\u00ednima del usuario, lo que permitir\u00eda Remote Code Execution (RCE) dentro de la aplicaci\u00f3n Home Assistant. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 6.0
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1021"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1021"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.9.0",
+ "matchCriteriaId": "C469208E-F2FD-4DCB-B5EE-0CBCD199142A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://www.home-assistant.io/blog/2023/10/19/security-audits-of-home-assistant/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41898.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41898.json
new file mode 100644
index 00000000000..dec4b111a1a
--- /dev/null
+++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41898.json
@@ -0,0 +1,114 @@
+{
+ "id": "CVE-2023-41898",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T23:15:08.703",
+ "lastModified": "2023-10-26T16:08:05.517",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Home assistant is an open source home automation. The Home Assistant Companion for Android app up to version 2023.8.2 is vulnerable to arbitrary URL loading in a WebView. This enables all sorts of attacks, including arbitrary JavaScript execution, limited native code execution, and credential theft. This issue has been patched in version 2023.9.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-142`."
+ },
+ {
+ "lang": "es",
+ "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. La aplicaci\u00f3n Home Assistant Companion para Android hasta la versi\u00f3n 2023.8.2 es vulnerable a la carga de URL arbitraria en un WebView. Esto permite todo tipo de ataques, incluida la ejecuci\u00f3n arbitraria de JavaScript, la ejecuci\u00f3n limitada de c\u00f3digo nativo y el robo de credenciales. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.2 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad. Este problema tambi\u00e9n se rastrea como Informe de vulnerabilidad del GitHub Security Lab (GHSL): `GHSL-2023-142`."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.6,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-94"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-345"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-94"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:home-assistant:home_assistant_companion:*:*:*:*:*:android:*:*",
+ "versionEndExcluding": "2023.9.2",
+ "matchCriteriaId": "E629E5FD-6C86-4A32-9DA0-EBCF5F339716"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-jvpm-q3hq-86rg",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-418xx/CVE-2023-41899.json b/CVE-2023/CVE-2023-418xx/CVE-2023-41899.json
new file mode 100644
index 00000000000..726d20a1f12
--- /dev/null
+++ b/CVE-2023/CVE-2023-418xx/CVE-2023-41899.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-41899",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T23:15:08.787",
+ "lastModified": "2023-10-26T16:03:33.100",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Home assistant is an open source home automation. In affected versions the `hassio.addon_stdin` is vulnerable to a partial Server-Side Request Forgery where an attacker capable of calling this service (e.g.: through GHSA-h2jp-7grc-9xpp) may be able to invoke any Supervisor REST API endpoints with a POST request. An attacker able to exploit will be able to control the data dictionary, including its addon and input key/values. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-162`."
+ },
+ {
+ "lang": "es",
+ "value": "Home Assistant es una dom\u00f3tica de c\u00f3digo abierto. En las versiones afectadas, `hassio.addon_stdin` es vulnerable a Server-Side Request Forgery donde un atacante capaz de llamar a este servicio (por ejemplo, a trav\u00e9s de GHSA-h2jp-7grc-9xpp) puede invocar cualquier Supervisor REST API endpoint con una solicitud POST. Un atacante capaz de explotar podr\u00e1 controlar el diccionario de datos, incluido su complemento y las claves/valores de entrada. Este problema se solucion\u00f3 en la versi\u00f3n 2023.9.0 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad. Este problema tambi\u00e9n se rastrea como Informe de vulnerabilidad del GitHub Security Lab (GHSL): `GHSL-2023-162`."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.6,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.7,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:home-assistant:home-assistant:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.9.0",
+ "matchCriteriaId": "C469208E-F2FD-4DCB-B5EE-0CBCD199142A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-4r74-h49q-rr3h",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json
index c57f7ea6931..009ba73c4c9 100644
--- a/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41909",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-05T07:15:14.877",
- "lastModified": "2023-09-19T22:15:11.777",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T19:52:33.270",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -62,6 +62,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -74,7 +89,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41915.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41915.json
index 85070fdc68c..a2031f9c194 100644
--- a/CVE-2023/CVE-2023-419xx/CVE-2023-41915.json
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41915.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41915",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-09T22:15:09.530",
- "lastModified": "2023-10-04T05:15:49.653",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T20:27:33.950",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -71,6 +71,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -97,15 +122,24 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFKIY6SNC3KQNZMVROWMIW6DI5XPNKQX/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYJ7IRNR6NHJMTNOV3E3W3D5MLDRDCJX/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDLWSMQYXF2ZGOQKCG26H6ZZA5FEH7HX/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41960.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41960.json
new file mode 100644
index 00000000000..9ce8b982ff3
--- /dev/null
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41960.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-41960",
+ "sourceIdentifier": "psirt@bosch.com",
+ "published": "2023-10-25T18:17:31.037",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The vulnerability allows an unprivileged(untrusted) third-party application to interact with a content-provider unsafely exposed by the Android Agent application, potentially modifying sensitive settings of the Android Client application itself."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad permite que una aplicaci\u00f3n de terceros sin privilegios (no confiable) interact\u00fae con un proveedor de contenido expuesto de manera insegura por la aplicaci\u00f3n del Agente de Android, modificando potencialmente configuraciones confidenciales de la propia aplicaci\u00f3n del Cliente de Android."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-926"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html",
+ "source": "psirt@bosch.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41964.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41964.json
index c05a37c8502..50b78fe7115 100644
--- a/CVE-2023/CVE-2023-419xx/CVE-2023-41964.json
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41964.json
@@ -2,19 +2,43 @@
"id": "CVE-2023-41964",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:21.417",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T20:23:54.787",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nThe BIG-IP and BIG-IQ systems do not encrypt some sensitive information written to Database (DB) variables.\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
+ },
+ {
+ "lang": "es",
+ "value": "Los sistemas BIG-IP y BIG-IQ no cifran cierta informaci\u00f3n confidencial escrita en las variables de la Base de Datos (DB). Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan."
}
],
"metrics": {
"cvssMetricV31": [
{
- "source": "f5sirt@f5.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "f5sirt@f5.com",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@@ -46,10 +70,564 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F11226F6-9080-4126-ACBD-7211A2746214"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A8F16422-A642-4614-96F2-E5B4877E8206"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "6603ED6A-3366-4572-AFCD-B3D4B1EC7606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "88978E38-81D3-4EFE-8525-A300B101FA69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "6DD4CF11-44E9-4596-9397-AF7DBD81277B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "DE979976-11C7-4AFF-8BE4-A094CC9C39CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "05E452AA-A520-4CBE-8767-147772B69194"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "596FC5D5-7329-4E39-841E-CAE937C02219"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F7280AA3-6EB0-4D9B-895B-B6883071740E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "95617B72-E7D8-44D2-AFF2-976595A72AFA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "9167FEC1-2C37-4946-9657-B4E69301FB24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7B4B3442-E0C0-48CD-87AD-060E15C9801E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "16795277-E8E2-4713-BD65-207655546649"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "0835E39B-F21E-4231-A4B9-5D511FF1B87A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F005EFFD-3A40-4762-B0D6-8760C406130F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "8705476E-A246-4B57-A0E1-FD626C1B0DE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "922AA845-530A-4B4B-9976-4CBC30C8A324"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F938EB43-8373-47EB-B269-C6DF058A9244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "8D82BCD8-136A-476C-AC86-710CA8B32EB7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "377DE308-CF91-488A-B296-30A3B09451D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "C7E422F6-C4C2-43AC-B137-0997B5739030"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "CC3F710F-DBCB-4976-9719-CF063DA22377"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "18CD2C82-0080-495E-8A11-957E0C182A48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "3C508A36-C041-406C-9C8A-A396C6EDC750"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "4C9FCBCB-9CE0-49E7-85C8-69E71D211912"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "112DFA85-90AD-478D-BD70-8C7C0C074F1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E912382D-131E-40F2-A337-72D6F2A3AD23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "91ED3C5E-92E8-44CF-AA99-A38C60AE677E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "2FBCE2D1-9D93-415D-AB2C-2060307C305A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "47962DDC-899F-4A98-ABF7-CC8A1AE7FF1C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "46A7F81E-84A2-4304-B18F-53E5CDBCEA43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "C0FE692A-CD63-4354-B599-2F47EEEFDD37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "B2F02EC0-E6C2-4E00-9804-043982D88BCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "BC2A757B-4521-4DB7-89B0-7CAE1E4155E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "0A1D4B18-DB59-41C4-B769-5DF93B8EBBAD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "D819F58A-826E-49E0-A06F-4D85E04D3D9F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1E86895C-EC5A-4303-978E-8807FE7A5E9A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "BC36311E-BB00-4750-85C8-51F5A2604F07"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E4958167-AB1F-4458-A06B-1B2DA313EEBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "D982C3E6-43DE-4AA8-889F-044E70C7FCB2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E6018B01-048C-43BB-A78D-66910ED60CA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "944B8F9C-E5C6-4DA8-BF2B-1C0B6A388BC4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "7DB6C626-BA78-4C06-8582-BFFCDF957429"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D9EC2237-117F-43BD-ADEC-516CF72E04EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "DCFAFFAC-000C-414D-83CF-B8B2C529D9CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "E68BFC75-6977-4644-A169-48263B896849"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7A4607BF-41AC-4E84-A110-74E085FF0445"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "672067B7-C838-4F0B-B3D0-E85F71715B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A4C17D18-1172-4396-9099-F1F5EAEACE5A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8257AA59-C14D-4EC1-B22C-DFBB92CBC297"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "1871634A-7609-4D01-8469-3D86F36DC19D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "603324D6-FE7A-4209-B92B-94EF09AB5FF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8A6F9699-A485-4614-8F38-5A556D31617E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "5A90F547-97A2-41EC-9FDF-25F869F0FA38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "220FD008-8919-48D4-84CF-8C4D99C3C474"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1935A1CF-50B2-4572-AA06-3504DB25B954"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "D47B7691-A95B-45C0-BAB4-27E047F3C379"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "077EBF51-B843-48B7-B31C-4BE1C99CE6F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "5EAC82FA-41CC-425A-89A0-CC9E2BF678EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "338010BF-EFC6-42B9-9F12-865C48D421EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "14776B4F-DDEC-4B22-82A5-EA231B3895F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0.0",
+ "versionEndIncluding": "8.3.0",
+ "matchCriteriaId": "1B4F2DBC-4DA1-42D8-9BD9-2EAADA27CCDE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K20850144",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41966.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41966.json
new file mode 100644
index 00000000000..d4fbacbd3f7
--- /dev/null
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41966.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-41966",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T17:15:08.747",
+ "lastModified": "2023-10-26T17:33:34.980",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\nThe application suffers from a privilege escalation vulnerability. A \nuser with read permissions can elevate privileges by sending a HTTP POST\n to set a parameter.\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n sufre una vulnerabilidad de escalada de privilegios. Un usuario con permisos de lectura puede elevar sus privilegios enviando un HTTP POST para establecer un par\u00e1metro."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-267"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08",
+ "source": "ics-cert@hq.dhs.gov"
+ },
+ {
+ "url": "https://www.sielco.org/en/contacts",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41975.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41975.json
new file mode 100644
index 00000000000..a20e430eaa1
--- /dev/null
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41975.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2023-41975",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.907",
+ "lastModified": "2023-10-26T00:15:10.947",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. A website may be able to access the microphone without the microphone use indicator being shown."
+ },
+ {
+ "lang": "es",
+ "value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que un sitio web pueda acceder al micr\u00f3fono sin que se muestre el indicador de uso del micr\u00f3fono."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41976.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41976.json
new file mode 100644
index 00000000000..a55f101c336
--- /dev/null
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41976.json
@@ -0,0 +1,68 @@
+{
+ "id": "CVE-2023-41976",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:09.957",
+ "lastModified": "2023-10-26T00:15:10.997",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de use-after-free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. El procesamiento de contenido web puede dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/22",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/27",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213986",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213987",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41977.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41977.json
new file mode 100644
index 00000000000..9f4b0317374
--- /dev/null
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41977.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2023-41977",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.013",
+ "lastModified": "2023-10-26T00:15:11.047",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved handling of caches. This issue is fixed in macOS Sonoma 14.1, iOS 16.7.2 and iPadOS 16.7.2. Visiting a malicious website may reveal browsing history."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de los cach\u00e9s. Este problema se solucion\u00f3 en macOS Sonoma 14.1, iOS 16.7.2 y iPadOS 16.7.2. Visitar un sitio web malicioso puede revelar el historial de navegaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41982.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41982.json
new file mode 100644
index 00000000000..1523f335e4a
--- /dev/null
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41982.json
@@ -0,0 +1,68 @@
+{
+ "id": "CVE-2023-41982",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.060",
+ "lastModified": "2023-10-26T00:15:11.093",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data."
+ },
+ {
+ "lang": "es",
+ "value": "Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1. Un atacante con acceso f\u00edsico puede utilizar Siri para acceder a datos confidenciales del usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41983.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41983.json
new file mode 100644
index 00000000000..fa1af9ec9df
--- /dev/null
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41983.json
@@ -0,0 +1,52 @@
+{
+ "id": "CVE-2023-41983",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.110",
+ "lastModified": "2023-10-26T00:15:11.143",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-of-service."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1. El procesamiento de contenido web puede dar lugar a una Denegaci\u00f3n de Servicio (DoS)."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/27",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213986",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41988.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41988.json
new file mode 100644
index 00000000000..c22831b5671
--- /dev/null
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41988.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2023-41988",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.160",
+ "lastModified": "2023-10-26T00:15:11.190",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data."
+ },
+ {
+ "lang": "es",
+ "value": "Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en macOS Sonoma 14.1, watchOS 10.1, iOS 17.1 y iPadOS 17.1. Un atacante con acceso f\u00edsico puede utilizar Siri para acceder a datos confidenciales del usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41989.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41989.json
new file mode 100644
index 00000000000..4bab32be32b
--- /dev/null
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41989.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-41989",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.210",
+ "lastModified": "2023-10-26T00:15:11.237",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1. An attacker may be able to execute arbitrary code as root from the Lock Screen."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Un atacante puede ejecutar c\u00f3digo arbitrario como root desde la pantalla de bloqueo."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json
index 723cac8375a..1be0e5f1b63 100644
--- a/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-41991",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-21T19:15:11.283",
- "lastModified": "2023-10-12T02:45:00.457",
+ "lastModified": "2023-10-24T12:56:42.390",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2023-09-25",
"cisaActionDue": "2023-10-16",
@@ -67,12 +67,22 @@
"versionEndExcluding": "16.7",
"matchCriteriaId": "1CEB5BA1-7092-4ADE-B19F-FD34CB53CCC3"
},
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD0EE39C-DEC4-475C-8661-5BD76457A39E"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7",
"matchCriteriaId": "3FC8EB94-1D4F-4CE8-83D0-9086D1EBBC8F"
},
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "502CD624-FA22-4C7B-9CA3-53CA938BE1AB"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json
index 3358ef56737..1bf9364cf42 100644
--- a/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-41992",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-21T19:15:11.520",
- "lastModified": "2023-10-12T02:44:38.967",
+ "lastModified": "2023-10-24T13:00:40.577",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2023-09-25",
"cisaActionDue": "2023-10-16",
@@ -67,12 +67,22 @@
"versionEndExcluding": "16.7",
"matchCriteriaId": "1CEB5BA1-7092-4ADE-B19F-FD34CB53CCC3"
},
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD0EE39C-DEC4-475C-8661-5BD76457A39E"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7",
"matchCriteriaId": "3FC8EB94-1D4F-4CE8-83D0-9086D1EBBC8F"
},
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "502CD624-FA22-4C7B-9CA3-53CA938BE1AB"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json
index 25514624ba3..34d987060ea 100644
--- a/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-41993",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-21T19:15:11.660",
- "lastModified": "2023-10-14T03:15:10.120",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-23T18:17:09.767",
+ "vulnStatus": "Analyzed",
"cisaExploitAdd": "2023-09-25",
"cisaActionDue": "2023-10-16",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@@ -73,12 +73,22 @@
"versionEndExcluding": "16.7",
"matchCriteriaId": "1CEB5BA1-7092-4ADE-B19F-FD34CB53CCC3"
},
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:17.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD0EE39C-DEC4-475C-8661-5BD76457A39E"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7",
"matchCriteriaId": "3FC8EB94-1D4F-4CE8-83D0-9086D1EBBC8F"
},
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "502CD624-FA22-4C7B-9CA3-53CA938BE1AB"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
@@ -95,6 +105,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
@@ -108,6 +123,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -145,7 +180,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/",
@@ -189,7 +227,10 @@
},
{
"url": "https://www.debian.org/security/2023/dsa-5527",
- "source": "product-security@apple.com"
+ "source": "product-security@apple.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41997.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41997.json
new file mode 100644
index 00000000000..43b0231d60b
--- /dev/null
+++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41997.json
@@ -0,0 +1,68 @@
+{
+ "id": "CVE-2023-41997",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.257",
+ "lastModified": "2023-10-26T00:15:11.283",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data."
+ },
+ {
+ "lang": "es",
+ "value": "Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1. Un atacante con acceso f\u00edsico puede utilizar Siri para acceder a datos confidenciales del usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4111.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4111.json
index 125ae29373c..3e8d1e73cca 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4111.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4111.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4111",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T04:15:10.977",
- "lastModified": "2023-08-07T19:30:04.483",
+ "lastModified": "2023-10-26T19:41:50.357",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -87,7 +87,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -95,6 +95,16 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
}
],
"configurations": [
@@ -124,15 +134,6 @@
"VDB Entry"
]
},
- {
- "url": "http://packetstormsecurity.com/files/173945/PHPJabbers-Bus-Reservation-System-1.1-SQL-Injection.html",
- "source": "cna@vuldb.com",
- "tags": [
- "Exploit",
- "Third Party Advisory",
- "VDB Entry"
- ]
- },
{
"url": "https://vuldb.com/?ctiid.235958",
"source": "cna@vuldb.com",
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4128.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4128.json
index 2af991146f0..ec20d15ee22 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4128.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4128.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4128",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-10T17:15:12.033",
- "lastModified": "2023-10-11T19:15:11.123",
+ "lastModified": "2023-10-27T15:15:14.217",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -193,6 +193,14 @@
"url": "https://access.redhat.com/errata/RHSA-2023:5628",
"source": "secalert@redhat.com"
},
+ {
+ "url": "https://access.redhat.com/errata/RHSA-2023:5775",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://access.redhat.com/errata/RHSA-2023:5794",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4128",
"source": "secalert@redhat.com",
@@ -208,6 +216,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/",
"source": "secalert@redhat.com",
@@ -232,6 +244,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0002/",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4132.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4132.json
index 07cfdb89ac0..802fece322d 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4132.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4132.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4132",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-03T15:15:32.833",
- "lastModified": "2023-09-10T12:16:19.903",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:30:09.987",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -112,6 +112,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -119,23 +144,45 @@
"url": "https://access.redhat.com/security/cve/CVE-2023-4132",
"source": "secalert@redhat.com",
"tags": [
- "Vendor Advisory"
+ "Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221707",
"source": "secalert@redhat.com",
"tags": [
- "Issue Tracking"
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0005/",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4147.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4147.json
index 5e1b2527596..a7ca2eaf63c 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4147.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4147.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4147",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-07T14:15:11.633",
- "lastModified": "2023-09-12T16:15:11.467",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T15:15:12.430",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free flaw was found in the Linux kernel\u2019s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una falla de use-after-free en la funcionalidad Netfilter del kernel de Linux al agregar una regla con NFTA_RULE_CHAIN_ID. Esta falla permite a un usuario local bloquear o escalar sus privilegios en el sistema."
}
],
"metrics": {
@@ -167,6 +171,14 @@
"Patch"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0006/",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4157.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4157.json
index 602cbd8b60b..dbfb0cbb549 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4157.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4157.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-4157",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-08-04T18:15:17.547",
- "lastModified": "2023-08-09T13:16:43.537",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T13:15:08.877",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Improper Input Validation in GitHub repository omeka/omeka-s prior to 4.0.3."
+ "value": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in GitHub repository omeka/omeka-s prior to version 4.0.3.\n"
}
],
"metrics": {
@@ -31,15 +31,13 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
- }
- ],
- "cvssMetricV30": [
+ },
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
- "version": "3.0",
- "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@@ -58,7 +56,7 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "security@huntr.dev",
"type": "Primary",
"description": [
{
@@ -68,12 +66,12 @@
]
},
{
- "source": "security@huntr.dev",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-20"
+ "value": "CWE-74"
}
]
}
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4178.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4178.json
index fa44176938d..419185c9b21 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4178.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4178.json
@@ -2,18 +2,22 @@
"id": "CVE-2023-4178",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-09-05T19:15:48.820",
- "lastModified": "2023-09-08T16:50:45.820",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T08:15:08.107",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Authentication Bypass by Spoofing vulnerability in Neutron Neutron Smart VMS allows Authentication Bypass.This issue affects Neutron Smart VMS: before b1130.1.0.1.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n por suplantaci\u00f3n en Neutron Smart VMS permite eludir la autenticaci\u00f3n. Este problema afecta a Neutron Smart VMS antes de la versi\u00f3n b1130.1.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
- "source": "nvd@nist.gov",
+ "source": "cve@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -33,24 +37,24 @@
"impactScore": 5.9
},
{
- "source": "cve@usom.gov.tr",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
- "integrityImpact": "NONE",
- "availabilityImpact": "LOW",
- "baseScore": 8.2,
- "baseSeverity": "HIGH"
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
- "impactScore": 4.2
+ "impactScore": 5.9
}
]
},
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4194.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4194.json
index d6342aae1ab..54d96239596 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4194.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4194.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4194",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-07T14:15:11.743",
- "lastModified": "2023-09-10T12:16:20.183",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-27T15:15:14.680",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -160,6 +160,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/",
"source": "secalert@redhat.com",
@@ -203,6 +207,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0002/",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-420xx/CVE-2023-42031.json b/CVE-2023/CVE-2023-420xx/CVE-2023-42031.json
new file mode 100644
index 00000000000..831b7398ffb
--- /dev/null
+++ b/CVE-2023/CVE-2023-420xx/CVE-2023-42031.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-42031",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-25T18:17:31.107",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM TXSeries for Multiplatforms, 8.1, 8.2, and 9.1, CICS TX Standard CICS TX Advanced 10.1 and 11.1 could allow a privileged user to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 266016."
+ },
+ {
+ "lang": "es",
+ "value": "IBM TXSeries para multiplataformas, 8.1, 8.2 y 9.1, CICS TX Standard CICS TX Advanced 10.1 y 11.1 podr\u00eda permitir que un usuario privilegiado provoque una Denegaci\u00f3n de Servicio (DoS) debido al consumo incontrolado de recursos. ID de IBM X-Force: 266016."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266061",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7056429",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7056433",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-421xx/CVE-2023-42138.json b/CVE-2023/CVE-2023-421xx/CVE-2023-42138.json
index 9985b618880..4ea97734599 100644
--- a/CVE-2023/CVE-2023-421xx/CVE-2023-42138.json
+++ b/CVE-2023/CVE-2023-421xx/CVE-2023-42138.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42138",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-10-11T09:15:10.417",
- "lastModified": "2023-10-11T12:54:12.883",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:57:05.243",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,15 +14,80 @@
"value": "Existe una vulnerabilidad de lectura fuera de l\u00edmites en KV STUDIO Ver. 11.62 y anteriores y KV REPLAY VIEWER Ver. 2.62 y anteriores. Si se explota esta vulnerabilidad, se puede divulgar informaci\u00f3n o se puede ejecutar c\u00f3digo arbitrario haciendo que un usuario de KV STUDIO PLAYER abra un archivo especialmente manipulado."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:keyence:kv_replay_viewer:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.63",
+ "matchCriteriaId": "F7533712-71AB-44CD-86F7-7F694FE353B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:keyence:kv_studio:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.63",
+ "matchCriteriaId": "0BFABC3F-F01D-4B37-9D66-929A396D2E27"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU94752076/index.html",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.keyence.com/vulnerability231001",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-421xx/CVE-2023-42188.json b/CVE-2023/CVE-2023-421xx/CVE-2023-42188.json
new file mode 100644
index 00000000000..be311c26c55
--- /dev/null
+++ b/CVE-2023/CVE-2023-421xx/CVE-2023-42188.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-42188",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T00:15:09.287",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF)."
+ },
+ {
+ "lang": "es",
+ "value": "IceCMS v2.0.1 es vulnerable a Cross Site Request Forgery (CSRF)."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/Thecosy/IceCMS/issues/17",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://topdayplus.github.io/2023/10/27/CVE-deatail/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42295.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42295.json
new file mode 100644
index 00000000000..7689abca079
--- /dev/null
+++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42295.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-42295",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T15:15:09.007",
+ "lastModified": "2023-10-28T03:19:16.690",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in OpenImageIO oiio v.2.4.12.0 allows a remote attacker to execute arbitrary code and cause a denial of service via the read_rle_image function of file bifs/unquantize.c"
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en OpenImageIO oiio v.2.4.12.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n read_rle_image del archivo bifs/unquantize.c"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:openimageio:openimageio:2.4.12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28795C4C-8800-499D-8C41-5B27C2745310"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/OpenImageIO/oiio/issues/3947",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42298.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42298.json
index ea72f17a42a..9e6248df4f7 100644
--- a/CVE-2023/CVE-2023-422xx/CVE-2023-42298.json
+++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42298.json
@@ -2,19 +2,80 @@
"id": "CVE-2023-42298",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T04:15:13.053",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T14:11:02.190",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en GPAC GPAC v.2.2.1 y anteriores permite que un atacante local provoque una Denegaci\u00f3n de Servicio (DoS) a trav\u00e9s de la funci\u00f3n Q_DecCoordOnUnitSphere del archivo src/bifs/unquantize.c."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.2.1",
+ "matchCriteriaId": "047BC15F-5E51-48D9-B751-9DC9311FEBCF"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/gpac/gpac/issues/2567",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-423xx/CVE-2023-42319.json b/CVE-2023/CVE-2023-423xx/CVE-2023-42319.json
new file mode 100644
index 00000000000..f6a162ba959
--- /dev/null
+++ b/CVE-2023/CVE-2023-423xx/CVE-2023-42319.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-42319",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T06:15:07.893",
+ "lastModified": "2023-10-25T17:39:00.483",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Geth (aka go-ethereum) through 1.13.4, when --http --graphql is used, allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a crafted GraphQL query. NOTE: the vendor's position is that the \"graphql endpoint [is not] designed to withstand attacks by hostile clients, nor handle huge amounts of clients/traffic."
+ },
+ {
+ "lang": "es",
+ "value": "Geth (tambi\u00e9n conocido como go-ethereum) hasta 1.13.4, cuando se usa --http --graphql, permite a atacantes remotos provocar una Denegaci\u00f3n de Servicio (consumo de memoria y bloqueo del daemon) a trav\u00e9s de una consulta GraphQL manipulada. NOTA: la posici\u00f3n del proveedor es que \"el endpoint Graphql [no est\u00e1] dise\u00f1ado para resistir ataques de clientes hostiles ni para manejar grandes cantidades de clientes/tr\u00e1fico."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "1.13.4",
+ "matchCriteriaId": "F95B53F3-82D4-46BF-9494-4F2CCBCF1881"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://blog.mevsec.com/posts/geth-dos-with-graphql/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://geth.ethereum.org/docs/fundamentals/security",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42406.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42406.json
new file mode 100644
index 00000000000..24c7222d066
--- /dev/null
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42406.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-42406",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T22:15:08.660",
+ "lastModified": "2023-10-27T22:15:09.030",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SQL injection vulnerability in D-Link Online behavior audit gateway DAR-7000 V31R02B1413C allows a remote attacker to obtain sensitive information and execute arbitrary code via the editrole.php component."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de inyecci\u00f3n SQL en la puerta de enlace de auditor\u00eda de comportamiento de D-Link Online DAR-7000 V31R02B1413C permite a un atacante remoto obtener informaci\u00f3n confidencial y ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente editrole.php."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000_sql_:sysmanage:editrole.php.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42435.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42435.json
new file mode 100644
index 00000000000..f2bf2579c33
--- /dev/null
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42435.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-42435",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T19:15:15.590",
+ "lastModified": "2023-10-25T19:49:30.417",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\nThe affected product is vulnerable to a cross-site request forgery vulnerability, which may allow an attacker to perform actions with the permissions of a victim user.\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El producto afectado por una vulnerabilidad de Cross-Site Request Forgery, que puede permitir a un atacante realizar acciones con los permisos de un usuario v\u00edctima."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dexma:dexgate:20130114:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1220960-8C57-4BB1-9871-882D2E272F39"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42438.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42438.json
new file mode 100644
index 00000000000..c7b4c6c1012
--- /dev/null
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42438.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-42438",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.297",
+ "lastModified": "2023-10-26T00:15:11.327",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.1. Visiting a malicious website may lead to user interface spoofing."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de interfaz de usuario inconsistente con una gesti\u00f3n del estado mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Visitar un sitio web malicioso puede provocar una suplantaci\u00f3n de la interfaz de usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42453.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42453.json
index 5844c4de655..cc5352906e5 100644
--- a/CVE-2023/CVE-2023-424xx/CVE-2023-42453.json
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42453.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42453",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T15:19:32.453",
- "lastModified": "2023-10-06T03:15:10.367",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-18T13:38:09.467",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -97,6 +97,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -117,11 +137,19 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Release Notes"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42459.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42459.json
index 35423ba730c..e558867dfb5 100644
--- a/CVE-2023/CVE-2023-424xx/CVE-2023-42459.json
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42459.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42459",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T21:15:10.923",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T14:46:11.370",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -58,18 +78,60 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.6.7",
+ "matchCriteriaId": "B6D03699-CB0F-4A0D-BDB6-1007A9D669EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.10.0",
+ "versionEndExcluding": "2.10.3",
+ "matchCriteriaId": "C24C066C-7447-4106-A5BA-EEE3EF108404"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.11.0",
+ "versionEndIncluding": "2.11.1",
+ "matchCriteriaId": "1ACA728D-A75E-4969-A636-633E0460FED6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/eProsima/Fast-DDS/issues/3207",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Issue Tracking"
+ ]
},
{
"url": "https://github.com/eProsima/Fast-DDS/pull/3824",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-gq8g-fj58-22gm",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42467.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42467.json
index 6c128cb0932..19aecb006ce 100644
--- a/CVE-2023/CVE-2023-424xx/CVE-2023-42467.json
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42467.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-42467",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-11T04:15:10.720",
- "lastModified": "2023-09-13T14:32:20.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-17T16:15:10.097",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s->qdev.blocksize from being 256. This stops QEMU and the guest immediately."
+ },
+ {
+ "lang": "es",
+ "value": "QEMU hasta 8.0.0 podr\u00eda desencadenar una divisi\u00f3n por cero en scsi_disk_reset en hw/scsi/scsi-disk.c porque scsi_disk_emulate_mode_select no impide que s->qdev.blocksize sea 256. Esto detiene QEMU y el invitado inmediatamente."
}
],
"metrics": {
@@ -65,6 +69,10 @@
}
],
"references": [
+ {
+ "url": "https://gitlab.com/qemu-project/qemu/-/commit/7cfcc79b0ab800959716738aff9419f53fc68c9c",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://gitlab.com/qemu-project/qemu/-/issues/1813",
"source": "cve@mitre.org",
@@ -73,13 +81,6 @@
"Issue Tracking",
"Third Party Advisory"
]
- },
- {
- "url": "https://gitlab.com/thuth/qemu/-/commit/3f91104484e5bf55b56d7e1b039a4a5a17d0c1a7",
- "source": "cve@mitre.org",
- "tags": [
- "Patch"
- ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42488.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42488.json
new file mode 100644
index 00000000000..04de4ef9057
--- /dev/null
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42488.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-42488",
+ "sourceIdentifier": "cna@cyber.gov.il",
+ "published": "2023-10-25T18:17:31.180",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": " EisBaer Scada - CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
+ },
+ {
+ "lang": "es",
+ "value": "EisBaer Scada - CWE-22: Limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido (\"Path Traversal\")"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42489.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42489.json
new file mode 100644
index 00000000000..7d0822d4464
--- /dev/null
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42489.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-42489",
+ "sourceIdentifier": "cna@cyber.gov.il",
+ "published": "2023-10-25T18:17:31.250",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": " EisBaer Scada - CWE-732: Incorrect Permission Assignment for Critical Resource"
+ },
+ {
+ "lang": "es",
+ "value": "EisBaer Scada - CWE-732: Asignaci\u00f3n de permisos incorrecta para recursos cr\u00edticos"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42490.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42490.json
new file mode 100644
index 00000000000..5334ee3e7c2
--- /dev/null
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42490.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-42490",
+ "sourceIdentifier": "cna@cyber.gov.il",
+ "published": "2023-10-25T18:17:31.327",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\nEisBaer Scada - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "EisBaer Scada - CWE-200: Exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42491.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42491.json
new file mode 100644
index 00000000000..e05caf42cc2
--- /dev/null
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42491.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-42491",
+ "sourceIdentifier": "cna@cyber.gov.il",
+ "published": "2023-10-25T18:17:31.397",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "EisBaer Scada - CWE-285: Improper Authorization"
+ },
+ {
+ "lang": "es",
+ "value": "EisBaer Scada - CWE-285: Autorizaci\u00f3n inadecuada"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-285"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42492.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42492.json
new file mode 100644
index 00000000000..34f31b8a604
--- /dev/null
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42492.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-42492",
+ "sourceIdentifier": "cna@cyber.gov.il",
+ "published": "2023-10-25T18:17:31.467",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": " EisBaer Scada - CWE-321: Use of Hard-coded Cryptographic Key"
+ },
+ {
+ "lang": "es",
+ "value": "EisBaer Scada - CWE-321: Uso de clave criptogr\u00e1fica codificada"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-321"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42493.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42493.json
new file mode 100644
index 00000000000..f4b12b91292
--- /dev/null
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42493.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-42493",
+ "sourceIdentifier": "cna@cyber.gov.il",
+ "published": "2023-10-25T18:17:31.543",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": " EisBaer Scada - CWE-256: Plaintext Storage of a Password"
+ },
+ {
+ "lang": "es",
+ "value": "EisBaer Scada - CWE-256: Almacenamiento en texto plano de una contrase\u00f1a"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-256"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42494.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42494.json
new file mode 100644
index 00000000000..befa2232596
--- /dev/null
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42494.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-42494",
+ "sourceIdentifier": "cna@cyber.gov.il",
+ "published": "2023-10-25T18:17:31.617",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": " EisBaer Scada - CWE-749: Exposed Dangerous Method or Function"
+ },
+ {
+ "lang": "es",
+ "value": "EisBaer Scada - CWE-749: M\u00e9todo o funci\u00f3n peligrosos expuestos"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@cyber.gov.il",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-749"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.gov.il/en/Departments/faq/cve_advisories",
+ "source": "cna@cyber.gov.il"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42497.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42497.json
index d606e6ede9f..c1e3fceb350 100644
--- a/CVE-2023/CVE-2023-424xx/CVE-2023-42497.json
+++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42497.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42497",
"sourceIdentifier": "security@liferay.com",
"published": "2023-10-17T08:15:09.437",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T14:09:51.670",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -50,10 +80,117 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
+ "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
+ "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
+ "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
+ "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
+ "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
+ "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
+ "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
+ "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
+ "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
+ "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
+ "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
+ "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
+ "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
+ "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
+ "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.4.3.4",
+ "versionEndExcluding": "7.4.3.86",
+ "matchCriteriaId": "33B0E975-ED31-45BF-AE6F-D614E03A1F40"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42497",
- "source": "security@liferay.com"
+ "source": "security@liferay.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42503.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42503.json
index bfbd7818752..3583d9d85d3 100644
--- a/CVE-2023/CVE-2023-425xx/CVE-2023-42503.json
+++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42503.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42503",
"sourceIdentifier": "security@apache.org",
"published": "2023-09-14T08:15:08.057",
- "lastModified": "2023-09-19T13:43:59.493",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T15:15:12.170",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -82,6 +82,10 @@
"Mailing List",
"URL Repurposed"
]
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231020-0003/",
+ "source": "security@apache.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42506.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42506.json
new file mode 100644
index 00000000000..8f987d5c266
--- /dev/null
+++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42506.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-42506",
+ "sourceIdentifier": "vultures@jpcert.or.jp",
+ "published": "2023-10-17T23:15:12.293",
+ "lastModified": "2023-10-24T23:50:23.567",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Improper restriction of operations within the bounds of a memory buffer issue exists in OnSinView2 versions 2.0.1 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user open a specially crafted OnSinView2 project file."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un problema de b\u00fafer de memoria en las versiones 2.0.1 y anteriores de OnSinView2. Si se explota esta vulnerabilidad, se puede revelar informaci\u00f3n o se puede ejecutar c\u00f3digo arbitrario haciendo que un usuario abra un archivo de proyecto OnSinView2 especialmente manipulado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-119"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jtekt:onsinview2:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.0.1",
+ "matchCriteriaId": "5CD3E1CB-CC94-4B68-9CFC-139B4C483081"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://jvn.jp/en/vu/JVNVU98392064/",
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.electronics.jtekt.co.jp/en/topics/202310175488/",
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42507.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42507.json
new file mode 100644
index 00000000000..9bbfa54cd73
--- /dev/null
+++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42507.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-42507",
+ "sourceIdentifier": "vultures@jpcert.or.jp",
+ "published": "2023-10-17T23:15:12.347",
+ "lastModified": "2023-10-24T23:55:17.307",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Stack-based buffer overflow vulnerability exists in OnSinView2 versions 2.0.1 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user open a specially crafted OnSinView2 project file."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de desbordamiento del b\u00fafer existe en las versiones 2.0.1 y anteriores de OnSinView2. Si se explota esta vulnerabilidad, se puede revelar informaci\u00f3n o se puede ejecutar c\u00f3digo arbitrario haciendo que un usuario abra un archivo de proyecto OnSinView2 especialmente manipulado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jtekt:onsinview2:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.0.1",
+ "matchCriteriaId": "5CD3E1CB-CC94-4B68-9CFC-139B4C483081"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://jvn.jp/en/vu/JVNVU98392064/",
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.electronics.jtekt.co.jp/en/topics/202310175488/",
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42627.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42627.json
index 10bec09eccb..f7f29d0f28a 100644
--- a/CVE-2023/CVE-2023-426xx/CVE-2023-42627.json
+++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42627.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-42627",
"sourceIdentifier": "security@liferay.com",
"published": "2023-10-17T13:15:11.677",
- "lastModified": "2023-10-17T13:15:11.677",
- "vulnStatus": "Received",
+ "lastModified": "2023-10-24T20:31:19.840",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the Commerce module in Liferay Portal 7.3.5 through 7.4.3.91, and Liferay DXP 7.3 update 33 and earlier, and 7.4 before update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a (1) Shipping Name, (2) Shipping Phone Number, (3) Shipping Address, (4) Shipping Address 2, (5) Shipping Address 3, (6) Shipping Zip, (7) Shipping City, (8) Shipping Region (9), Shipping Country, (10) Billing Name, (11) Billing Phone Number, (12) Billing Address, (13) Billing Address 2, (14) Billing Address 3, (15) Billing Zip, (16) Billing City, (17) Billing Region, (18) Billing Country, or (19) Region Code."
+ },
+ {
+ "lang": "es",
+ "value": "M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) almacenados en el m\u00f3dulo Commerce en Liferay Portal 7.3.5 hasta 7.4.3.91, y Liferay DXP 7.3 actualizaci\u00f3n 33 y anteriores, y 7.4 antes de la actualizaci\u00f3n 92 permiten a atacantes remotos inyectar scripts web o HTML arbitrarios mediante un payload manipulado inyectado en (1) Nombre de Env\u00edo, (2) N\u00famero de Tel\u00e9fono de Env\u00edo, (3) Direcci\u00f3n de Env\u00edo, (4) Direcci\u00f3n de Env\u00edo 2, (5) Direcci\u00f3n de Env\u00edo 3, (6) C\u00f3digo Postal de Env\u00edo, (7) Ciudad de Env\u00edo , (8) Regi\u00f3n de Env\u00edo (9), Pa\u00eds de Env\u00edo, (10) Nombre de Facturaci\u00f3n, (11) N\u00famero de Tel\u00e9fono de Facturaci\u00f3n, (12) Direcci\u00f3n de Facturaci\u00f3n, (13) Direcci\u00f3n de Facturaci\u00f3n 2, (14) Direcci\u00f3n de Facturaci\u00f3n 3, (15) Facturaci\u00f3n C\u00f3digo Postal, (16) Ciudad de Facturaci\u00f3n, (17) Regi\u00f3n de Facturaci\u00f3n, (18) Pa\u00eds de Facturaci\u00f3n o (19) C\u00f3digo de Regi\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -46,10 +80,142 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
+ "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
+ "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*",
+ "matchCriteriaId": "3E84D881-6D47-48FD-B743-9D531F5F7D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
+ "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
+ "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
+ "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
+ "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
+ "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
+ "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
+ "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
+ "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
+ "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
+ "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
+ "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
+ "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
+ "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
+ "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
+ "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
+ "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.3.5",
+ "versionEndExcluding": "7.4.3.92",
+ "matchCriteriaId": "CBB14237-26BD-48B6-9FE6-3CBC8DB49A0D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42627",
- "source": "security@liferay.com"
+ "source": "security@liferay.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42628.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42628.json
index 6235d2f43b4..b20d3bf5cd0 100644
--- a/CVE-2023/CVE-2023-426xx/CVE-2023-42628.json
+++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42628.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-42628",
"sourceIdentifier": "security@liferay.com",
"published": "2023-10-17T12:15:10.043",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T20:01:17.897",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting (XSS) vulnerability in the Wiki widget in Liferay Portal 7.1.0 through 7.4.3.87, and Liferay DXP 7.0 fix pack 83 through 102, 7.1 fix pack 28 and earlier, 7.2 fix pack 20 and earlier, 7.3 update 33 and earlier, and 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML into a parent wiki page via a crafted payload injected into a wiki page's \u2018Content\u2019 text field."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) almacenadas en el widget Wiki en Liferay Portal 7.1.0 a 7.4.3.87 y Liferay DXP 7.0 fixpack 83 a 102, 7.1 fixpack 28 y anteriores, 7.2 fixpack 20 y anteriores, actualizaci\u00f3n 7.3 33 y anteriores, y 7.4 anterior a la actualizaci\u00f3n 88 permite a atacantes remotos inyectar scripts web o HTML arbitrarios en una p\u00e1gina wiki principal a trav\u00e9s de un payload manipulado inyectado en el campo de texto 'Content' de una p\u00e1gina wiki."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -46,10 +80,557 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:-:*:*:*:*:*:*",
+ "matchCriteriaId": "4614C87F-F39C-4ADD-A7A2-4A498612AD38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_1:*:*:*:*:*:*",
+ "matchCriteriaId": "6F20D93D-7FB2-4D5F-9249-4DECDE473C42"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_10:*:*:*:*:*:*",
+ "matchCriteriaId": "CF0821E5-B6E5-44E6-9CF7-77EAE982F677"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_11:*:*:*:*:*:*",
+ "matchCriteriaId": "1B24B6A1-8439-49D6-8E78-193144F3DCC3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_12:*:*:*:*:*:*",
+ "matchCriteriaId": "7E82A6CC-891C-4619-84EA-0DA96E4043C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_13:*:*:*:*:*:*",
+ "matchCriteriaId": "70E12054-0DEE-4B92-B8F6-7DC4B2461113"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_14:*:*:*:*:*:*",
+ "matchCriteriaId": "3B566A51-3EFC-4A08-8A4F-A9AA43FBE481"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_15:*:*:*:*:*:*",
+ "matchCriteriaId": "FE1A8781-6B16-4D37-B556-36B99CBCA9F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_16:*:*:*:*:*:*",
+ "matchCriteriaId": "3EE11B43-1629-4A22-BE88-0AFB2DFC528C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_17:*:*:*:*:*:*",
+ "matchCriteriaId": "10FC6F33-C031-40A4-AFAF-B5CF30F79E52"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_18:*:*:*:*:*:*",
+ "matchCriteriaId": "99B99578-CACE-47D2-9C1E-A7BBD2B6F6EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_19:*:*:*:*:*:*",
+ "matchCriteriaId": "950D98A8-88EE-4C99-817B-C418071B2819"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_2:*:*:*:*:*:*",
+ "matchCriteriaId": "F86FF50F-B21A-4B6E-88B8-90D0C042E942"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_20:*:*:*:*:*:*",
+ "matchCriteriaId": "CE0E1891-6E76-4069-B412-43B5E5379E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_21:*:*:*:*:*:*",
+ "matchCriteriaId": "404F5FFE-2758-452F-9297-40E0533C6FB2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_22:*:*:*:*:*:*",
+ "matchCriteriaId": "3F5B7E72-8D62-464A-AA82-CBE2625C7687"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_23:*:*:*:*:*:*",
+ "matchCriteriaId": "4FA67C68-3E8E-4383-967F-A1FA55AE4897"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_24:*:*:*:*:*:*",
+ "matchCriteriaId": "F220793A-FDAC-48C6-B299-39EB3BC077A6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_25:*:*:*:*:*:*",
+ "matchCriteriaId": "F095A9E1-5FE1-46C4-B0E1-97F8767439D2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_26:*:*:*:*:*:*",
+ "matchCriteriaId": "DFD748DD-6FDB-44CD-96BF-026D18CE4207"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_27:*:*:*:*:*:*",
+ "matchCriteriaId": "0A34F2EA-D0F7-4C9B-BFE6-DA334DFD0EDD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_28:*:*:*:*:*:*",
+ "matchCriteriaId": "4B3C2426-7617-4535-B86A-7F9BA45DFD0E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_29:*:*:*:*:*:*",
+ "matchCriteriaId": "88A5CBCE-2BAE-44C7-A7BF-BC30C89839BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_3:*:*:*:*:*:*",
+ "matchCriteriaId": "CA6B2500-42E4-4F87-8B93-2F7399B4F611"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_30:*:*:*:*:*:*",
+ "matchCriteriaId": "28955834-8E02-4558-ABD3-4958DBB41423"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_31:*:*:*:*:*:*",
+ "matchCriteriaId": "89B4F926-5018-4C50-9569-A92BEA6364A0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_32:*:*:*:*:*:*",
+ "matchCriteriaId": "863C4DBB-9BA2-4A13-8394-08AC500D552A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_33:*:*:*:*:*:*",
+ "matchCriteriaId": "C4206C84-C4BD-4363-A4CA-EE229CE06319"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_34:*:*:*:*:*:*",
+ "matchCriteriaId": "54CA9915-54C2-4E7F-85AF-781CA0A63A9D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_35:*:*:*:*:*:*",
+ "matchCriteriaId": "4F644864-1056-4A0C-ADD7-A1992A0AC07D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_36:*:*:*:*:*:*",
+ "matchCriteriaId": "91E9BAE9-CD40-4353-95DB-7D9ADC338F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_37:*:*:*:*:*:*",
+ "matchCriteriaId": "C2A29CA0-66CB-4ED9-87B3-57A1C04F59F8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_38:*:*:*:*:*:*",
+ "matchCriteriaId": "2BFC882E-25C2-46A3-A0DA-A779399A3A30"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_39:*:*:*:*:*:*",
+ "matchCriteriaId": "661E68A2-B365-4962-87CF-CE17A500889F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_4:*:*:*:*:*:*",
+ "matchCriteriaId": "D4094372-E950-4DE0-86D2-CE7F214FD3A9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_40:*:*:*:*:*:*",
+ "matchCriteriaId": "A5D28279-002A-4BC7-9396-E47FC842D7AE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_41:*:*:*:*:*:*",
+ "matchCriteriaId": "C700ED72-4626-48A0-B1BB-E0A7C12D454F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_42:*:*:*:*:*:*",
+ "matchCriteriaId": "8F473DF1-F70D-4EDB-A011-C8D1C6A21659"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_43:*:*:*:*:*:*",
+ "matchCriteriaId": "C2351EAC-F6AD-4611-B9BD-39C4DFE85B5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_44:*:*:*:*:*:*",
+ "matchCriteriaId": "357845C1-3834-465A-B9CA-F9C604AA8242"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_45:*:*:*:*:*:*",
+ "matchCriteriaId": "DD35964D-4156-45B8-A0AB-282DA9F4FA47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_46:*:*:*:*:*:*",
+ "matchCriteriaId": "35656567-EF24-4948-A72A-C754D6E419B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_47:*:*:*:*:*:*",
+ "matchCriteriaId": "E9A3D95D-4539-432D-B241-376F312534AC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_48:*:*:*:*:*:*",
+ "matchCriteriaId": "81F329F1-5BB1-42A7-98CE-B0EB5819D60A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_49:*:*:*:*:*:*",
+ "matchCriteriaId": "5B7111FA-9FD7-4952-AFE1-07D3E14854F3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_5:*:*:*:*:*:*",
+ "matchCriteriaId": "D35916F1-24AA-4BF3-8B1F-2361C5B815D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_50:*:*:*:*:*:*",
+ "matchCriteriaId": "2C7A080F-9C99-41A0-BC63-EBDDC0DF7B8A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_51:*:*:*:*:*:*",
+ "matchCriteriaId": "0383C4C4-A7BB-418D-9A98-AC4233722961"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_52:*:*:*:*:*:*",
+ "matchCriteriaId": "AA281A20-7599-446B-9587-118E920403D1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_53:*:*:*:*:*:*",
+ "matchCriteriaId": "9514E8F5-1D0B-4CDF-BD03-087326F6C252"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_54:*:*:*:*:*:*",
+ "matchCriteriaId": "78BC7D6C-2A10-4F78-9C41-EA97665C246E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_55:*:*:*:*:*:*",
+ "matchCriteriaId": "B2C29B11-D87B-4D78-9D42-AD528C811080"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_56:*:*:*:*:*:*",
+ "matchCriteriaId": "CA9BE427-78D7-4DEE-A174-F3E3675B44A5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_57:*:*:*:*:*:*",
+ "matchCriteriaId": "6C10325C-8670-499B-B003-7D8634539C5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_58:*:*:*:*:*:*",
+ "matchCriteriaId": "5F692BEB-5CB1-41EA-B715-64AB0036F6CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_59:*:*:*:*:*:*",
+ "matchCriteriaId": "427C4DF5-9039-4CB5-B600-5F965E20D945"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_6:*:*:*:*:*:*",
+ "matchCriteriaId": "EDEE4B40-889C-472E-AA91-7E1B4314EE64"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_60:*:*:*:*:*:*",
+ "matchCriteriaId": "44B7A2A2-5764-4EDB-AA44-25F8508CF128"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_61:*:*:*:*:*:*",
+ "matchCriteriaId": "55D94917-5360-4179-A017-1287C63A6E6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_62:*:*:*:*:*:*",
+ "matchCriteriaId": "52C5C76D-2572-4ADF-B7E4-7B3444935658"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_63:*:*:*:*:*:*",
+ "matchCriteriaId": "9ABFC91A-7A8D-4A08-9464-F534BAA69B4E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_64:*:*:*:*:*:*",
+ "matchCriteriaId": "1D378A23-113D-47AC-9CB5-2658C357FFB4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_65:*:*:*:*:*:*",
+ "matchCriteriaId": "58FB119E-508C-45F7-8AD8-B67AAAEA53D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_66:*:*:*:*:*:*",
+ "matchCriteriaId": "8B3359A5-D39B-4322-8963-B138D791D232"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_67:*:*:*:*:*:*",
+ "matchCriteriaId": "E11E2FBD-7541-4CE3-8A78-52FB82571547"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_68:*:*:*:*:*:*",
+ "matchCriteriaId": "3883F470-8D8D-4CB3-BF4A-0C401BDABC83"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_69:*:*:*:*:*:*",
+ "matchCriteriaId": "1BDCF010-04BF-4FA5-9E14-F6461FED3FFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_7:*:*:*:*:*:*",
+ "matchCriteriaId": "3867FDAA-354E-4D2F-A260-27F31CA44C8A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_70:*:*:*:*:*:*",
+ "matchCriteriaId": "7E8CEA39-4A7F-4827-91FA-31119201D174"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_71:*:*:*:*:*:*",
+ "matchCriteriaId": "D3768AC9-A245-4B81-8D1D-9D9C5354245C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_72:*:*:*:*:*:*",
+ "matchCriteriaId": "71CA65C9-C0FC-4CBD-A8B0-DD72604A46F3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_73:*:*:*:*:*:*",
+ "matchCriteriaId": "9F06DECA-F45D-49DA-BB24-AA1F0306B0B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_74:*:*:*:*:*:*",
+ "matchCriteriaId": "3BA69ED9-28FA-40B5-84F9-0FFE40DFC675"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_75:*:*:*:*:*:*",
+ "matchCriteriaId": "6FF2D31F-8719-41A6-ADD5-15BE9409428E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_76:*:*:*:*:*:*",
+ "matchCriteriaId": "DE56F5E5-73CF-4636-9F98-86BDDA3F6A47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_77:*:*:*:*:*:*",
+ "matchCriteriaId": "CE4885B1-F912-4D06-8179-830FC011F3F6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_78:*:*:*:*:*:*",
+ "matchCriteriaId": "A1A0EFCE-4B74-4B4D-AB6E-5730F26B38FB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_79:*:*:*:*:*:*",
+ "matchCriteriaId": "F02DCC86-C3F7-482C-9BFB-B7971FB10AEC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_8:*:*:*:*:*:*",
+ "matchCriteriaId": "A89B7EE4-57FD-4B09-841A-ABC9990FF88F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_80:*:*:*:*:*:*",
+ "matchCriteriaId": "06835B0A-A2DF-44D3-A38F-59E5D5523FFA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_81:*:*:*:*:*:*",
+ "matchCriteriaId": "B746D0CF-76F6-42A1-9056-CA9622DCD806"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_82:*:*:*:*:*:*",
+ "matchCriteriaId": "FFC33A7E-B1CB-4E83-B75C-71F5E7E5E406"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
+ "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
+ "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
+ "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
+ "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
+ "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
+ "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
+ "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
+ "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
+ "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
+ "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
+ "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
+ "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
+ "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
+ "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
+ "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
+ "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.1.0",
+ "versionEndExcluding": "7.4.3.88",
+ "matchCriteriaId": "67C00B28-3F41-49FA-87E0-130F77235C05"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42628",
- "source": "security@liferay.com"
+ "source": "security@liferay.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42629.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42629.json
index a36dc1616e8..bf353780dec 100644
--- a/CVE-2023/CVE-2023-426xx/CVE-2023-42629.json
+++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42629.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42629",
"sourceIdentifier": "security@liferay.com",
"published": "2023-10-17T09:15:10.167",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T17:09:28.777",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -50,10 +80,122 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
+ "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
+ "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
+ "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
+ "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
+ "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
+ "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
+ "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
+ "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
+ "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
+ "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
+ "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
+ "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
+ "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
+ "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
+ "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
+ "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.4.2",
+ "versionEndExcluding": "7.4.3.88",
+ "matchCriteriaId": "2AD42484-BDB9-4ECE-B003-259B35FB0DE6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42629",
- "source": "security@liferay.com"
+ "source": "security@liferay.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42663.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42663.json
index 38a3e46ac90..09c3909f6b8 100644
--- a/CVE-2023/CVE-2023-426xx/CVE-2023-42663.json
+++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42663.json
@@ -2,15 +2,42 @@
"id": "CVE-2023-42663",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-14T10:15:09.940",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:46:22.287",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Apache Airflow, versions before 2.7.2, has a vulnerability that allows an authorized user who has access to read specific DAGs only, to read information about task instances in other DAGs.\nUsers of Apache Airflow are advised to upgrade to version 2.7.2 or newer to mitigate the risk associated with this vulnerability.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Apache Airflow, en versiones anteriores a la 2.7.2, tiene una vulnerabilidad que permite a un usuario autorizado que tiene acceso para leer solo DAG espec\u00edficos, leer informaci\u00f3n sobre instancias de tareas en otros DAG. Se recomienda a los usuarios de Apache Airflow que actualicen a la versi\u00f3n 2.7.2 o posterior para mitigar el riesgo asociado con esta vulnerabilidad."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "security@apache.org",
@@ -23,14 +50,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.7.2",
+ "matchCriteriaId": "63233E2B-0359-41A5-A4BA-218F2CC2F778"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/apache/airflow/pull/34315",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://lists.apache.org/thread/xj86cvfkxgd0cyqfmz6mh1bsfc61c6o9",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42666.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42666.json
new file mode 100644
index 00000000000..3237f0c6440
--- /dev/null
+++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42666.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-42666",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T19:15:15.680",
+ "lastModified": "2023-10-25T19:55:05.943",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\n\n\n\n\n\n\n\n\nThe affected product is vulnerable to an exposure of sensitive information to an unauthorized actor vulnerability, which may allow an attacker to create malicious requests for obtaining the information of the version about the web server used.\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El producto afectado es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial por una vulnerabilidad de actor no autorizado, lo que puede permitir a un atacante crear solicitudes maliciosas para obtener informaci\u00f3n de la versi\u00f3n del servidor web utilizado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dexma:dexgate:20130114:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1220960-8C57-4BB1-9871-882D2E272F39"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42752.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42752.json
index 5ede964aa81..a21a2ac02ed 100644
--- a/CVE-2023/CVE-2023-427xx/CVE-2023-42752.json
+++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42752.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-42752",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-13T02:15:09.797",
- "lastModified": "2023-10-13T12:47:20.137",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:51:54.797",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una falla de desbordamiento de enteros en el kernel de Linux. Este problema lleva a que el kernel asigne `skb_shared_info` en el espacio de usuario, lo cual es explotable en sistemas sin protecci\u00f3n SMAP ya que `skb_shared_info` contiene referencias a punteros de funci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -34,22 +58,67 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "6.5.7",
+ "matchCriteriaId": "04F10BD2-BDEC-4F7B-877E-392132C4D192"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-42752",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239828",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=915d975b2ffa",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c3b704d4a4a2",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42753.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42753.json
index e1c91aacc2b..33501ef5a9a 100644
--- a/CVE-2023/CVE-2023-427xx/CVE-2023-42753.json
+++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42753.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-42753",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-25T21:15:15.923",
- "lastModified": "2023-10-16T19:41:01.563",
+ "lastModified": "2023-10-29T02:43:20.087",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -111,6 +111,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -128,6 +143,14 @@
"Issue Tracking"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://seclists.org/oss-sec/2023/q3/216",
"source": "secalert@redhat.com",
diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json
index 54f1ab0ac00..66bbbf94185 100644
--- a/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json
+++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42755",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-05T19:15:11.497",
- "lastModified": "2023-10-11T17:42:18.387",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-20T00:15:16.260",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -120,6 +120,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://seclists.org/oss-sec/2023/q3/229",
"source": "secalert@redhat.com",
diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42756.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42756.json
index 6bbac61722b..6a36615d3e8 100644
--- a/CVE-2023/CVE-2023-427xx/CVE-2023-42756.json
+++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42756.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42756",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-28T14:15:21.037",
- "lastModified": "2023-10-10T03:15:09.663",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T17:51:35.447",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -118,10 +118,25 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
@@ -147,17 +162,34 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://seclists.org/oss-sec/2023/q3/242",
diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42768.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42768.json
index 1972d6cc066..39b7a17213e 100644
--- a/CVE-2023/CVE-2023-427xx/CVE-2023-42768.json
+++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42768.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-42768",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:21.507",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T20:26:41.420",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nWhen a non-admin user has been assigned an administrator role via an iControl REST PUT request and later the user's role is reverted back to a non-admin role via the Configuration utility, tmsh, or iControl REST. BIG-IP non-admin user can still have access to iControl REST admin resource.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
+ },
+ {
+ "lang": "es",
+ "value": "Cuando a un usuario no administrador se le ha asignado una funci\u00f3n de administrador a trav\u00e9s de una solicitud iControl REST PUT y posteriormente la funci\u00f3n del usuario se revierte a una funci\u00f3n de no administrador a trav\u00e9s de la utilidad de configuraci\u00f3n, tmsh o iControl REST. El usuario no administrador de BIG-IP a\u00fan puede tener acceso al recurso de administraci\u00f3n iControl REST PUT. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan."
}
],
"metrics": {
@@ -46,10 +50,557 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F11226F6-9080-4126-ACBD-7211A2746214"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A8F16422-A642-4614-96F2-E5B4877E8206"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "6603ED6A-3366-4572-AFCD-B3D4B1EC7606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "88978E38-81D3-4EFE-8525-A300B101FA69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "6DD4CF11-44E9-4596-9397-AF7DBD81277B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "DE979976-11C7-4AFF-8BE4-A094CC9C39CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "05E452AA-A520-4CBE-8767-147772B69194"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "596FC5D5-7329-4E39-841E-CAE937C02219"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F7280AA3-6EB0-4D9B-895B-B6883071740E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "95617B72-E7D8-44D2-AFF2-976595A72AFA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "9167FEC1-2C37-4946-9657-B4E69301FB24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7B4B3442-E0C0-48CD-87AD-060E15C9801E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "16795277-E8E2-4713-BD65-207655546649"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "0835E39B-F21E-4231-A4B9-5D511FF1B87A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F005EFFD-3A40-4762-B0D6-8760C406130F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "8705476E-A246-4B57-A0E1-FD626C1B0DE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "922AA845-530A-4B4B-9976-4CBC30C8A324"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F938EB43-8373-47EB-B269-C6DF058A9244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "8D82BCD8-136A-476C-AC86-710CA8B32EB7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "377DE308-CF91-488A-B296-30A3B09451D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "C7E422F6-C4C2-43AC-B137-0997B5739030"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "CC3F710F-DBCB-4976-9719-CF063DA22377"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "18CD2C82-0080-495E-8A11-957E0C182A48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "3C508A36-C041-406C-9C8A-A396C6EDC750"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "4C9FCBCB-9CE0-49E7-85C8-69E71D211912"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "112DFA85-90AD-478D-BD70-8C7C0C074F1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E912382D-131E-40F2-A337-72D6F2A3AD23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "91ED3C5E-92E8-44CF-AA99-A38C60AE677E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "2FBCE2D1-9D93-415D-AB2C-2060307C305A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "47962DDC-899F-4A98-ABF7-CC8A1AE7FF1C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "46A7F81E-84A2-4304-B18F-53E5CDBCEA43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "C0FE692A-CD63-4354-B599-2F47EEEFDD37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "B2F02EC0-E6C2-4E00-9804-043982D88BCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "BC2A757B-4521-4DB7-89B0-7CAE1E4155E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "0A1D4B18-DB59-41C4-B769-5DF93B8EBBAD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "D819F58A-826E-49E0-A06F-4D85E04D3D9F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1E86895C-EC5A-4303-978E-8807FE7A5E9A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "BC36311E-BB00-4750-85C8-51F5A2604F07"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E4958167-AB1F-4458-A06B-1B2DA313EEBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "D982C3E6-43DE-4AA8-889F-044E70C7FCB2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E6018B01-048C-43BB-A78D-66910ED60CA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "944B8F9C-E5C6-4DA8-BF2B-1C0B6A388BC4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "7DB6C626-BA78-4C06-8582-BFFCDF957429"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D9EC2237-117F-43BD-ADEC-516CF72E04EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "DCFAFFAC-000C-414D-83CF-B8B2C529D9CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "E68BFC75-6977-4644-A169-48263B896849"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7A4607BF-41AC-4E84-A110-74E085FF0445"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "672067B7-C838-4F0B-B3D0-E85F71715B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A4C17D18-1172-4396-9099-F1F5EAEACE5A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8257AA59-C14D-4EC1-B22C-DFBB92CBC297"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "1871634A-7609-4D01-8469-3D86F36DC19D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "603324D6-FE7A-4209-B92B-94EF09AB5FF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8A6F9699-A485-4614-8F38-5A556D31617E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "5A90F547-97A2-41EC-9FDF-25F869F0FA38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "220FD008-8919-48D4-84CF-8C4D99C3C474"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1935A1CF-50B2-4572-AA06-3504DB25B954"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "D47B7691-A95B-45C0-BAB4-27E047F3C379"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "077EBF51-B843-48B7-B31C-4BE1C99CE6F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "5EAC82FA-41CC-425A-89A0-CC9E2BF678EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "338010BF-EFC6-42B9-9F12-865C48D421EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "14776B4F-DDEC-4B22-82A5-EA231B3895F0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K26910459",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42769.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42769.json
new file mode 100644
index 00000000000..60a5bb4de51
--- /dev/null
+++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42769.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-42769",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T17:15:08.950",
+ "lastModified": "2023-10-26T17:33:34.980",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The cookie session ID is of insufficient length and can be exploited by \nbrute force, which may allow a remote attacker to obtain a valid \nsession, bypass authentication, and manipulate the transmitter.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El ID de sesi\u00f3n de la cookie tiene una longitud insuficiente y puede explotarse mediante fuerza bruta, lo que puede permitir a un atacante remoto obtener una sesi\u00f3n v\u00e1lida, omitir la autenticaci\u00f3n y manipular el transmisor."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08",
+ "source": "ics-cert@hq.dhs.gov"
+ },
+ {
+ "url": "https://www.sielco.org/en/contacts",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42780.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42780.json
index adef15d008b..261c873423b 100644
--- a/CVE-2023/CVE-2023-427xx/CVE-2023-42780.json
+++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42780.json
@@ -2,15 +2,42 @@
"id": "CVE-2023-42780",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-14T10:15:10.303",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:47:43.430",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Apache Airflow, versions prior to 2.7.2, contains a security vulnerability that allows authenticated users of Airflow to list warnings for all DAGs, even if the user had no permission to see those DAGs. It would reveal the dag_ids and the stack-traces of import errors for those DAGs with import errors.\nUsers of Apache Airflow are advised to upgrade to version 2.7.2 or newer to mitigate the risk associated with this vulnerability.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Apache Airflow, versiones anteriores a la 2.7.2, contiene una vulnerabilidad de seguridad que permite a los usuarios autenticados de Airflow enumerar advertencias para todos los DAG, incluso si el usuario no ten\u00eda permiso para ver esos DAG. Revelar\u00eda los dag_ids y los seguimientos de la pila de memoria de errores de importaci\u00f3n para aquellos DAG con errores de importaci\u00f3n. Se recomienda a los usuarios de Apache Airflow que actualicen a la versi\u00f3n 2.7.2 o posterior para mitigar el riesgo asociado con esta vulnerabilidad."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "security@apache.org",
@@ -23,14 +50,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.7.2",
+ "matchCriteriaId": "63233E2B-0359-41A5-A4BA-218F2CC2F778"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/apache/airflow/pull/34355",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://lists.apache.org/thread/h5tvsvov8j55wojt5sojdprs05oby34d",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42787.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42787.json
index 90e72f8b5ca..4419d800e86 100644
--- a/CVE-2023/CVE-2023-427xx/CVE-2023-42787.json
+++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42787.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42787",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:12.930",
- "lastModified": "2023-10-13T15:04:19.727",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T22:15:09.020",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -155,6 +155,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-q5pq-8666-j8fr",
+ "source": "psirt@fortinet.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42788.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42788.json
index 360f9372179..273ee9af946 100644
--- a/CVE-2023/CVE-2023-427xx/CVE-2023-42788.json
+++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42788.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42788",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:12.987",
- "lastModified": "2023-10-13T15:22:01.607",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T22:15:09.100",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -155,6 +155,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-qpv8-g6qv-rf8p",
+ "source": "psirt@fortinet.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42792.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42792.json
index 3b2e668b0e3..cd1ce858615 100644
--- a/CVE-2023/CVE-2023-427xx/CVE-2023-42792.json
+++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42792.json
@@ -2,18 +2,45 @@
"id": "CVE-2023-42792",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-14T10:15:10.377",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:50:16.153",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Apache Airflow, in versions prior to 2.7.2, contains a security vulnerability that allows an authenticated user with limited access to some DAGs, to craft a request that could give the user write access to various DAG resources for DAGs that the user had no access to, thus, enabling the user to clear DAGs they shouldn't.\n\nUsers of Apache Airflow are strongly advised to upgrade to version 2.7.2 or newer to mitigate the risk associated with this vulnerability.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Apache Airflow, en versiones anteriores a la 2.7.2, contiene una vulnerabilidad de seguridad que permite a un usuario autenticado con acceso limitado a algunos DAG crear una solicitud que podr\u00eda darle al usuario acceso de escritura a varios recursos de DAG para los DAG a los que el usuario no ten\u00eda acceso. para, por lo tanto, permitir al usuario borrar DAG que no deber\u00eda. Se recomienda encarecidamente a los usuarios de Apache Airflow que actualicen a la versi\u00f3n 2.7.2 o posterior para mitigar el riesgo asociado con esta vulnerabilidad."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
- "source": "security@apache.org",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -21,16 +48,51 @@
"value": "CWE-668"
}
]
+ },
+ {
+ "source": "security@apache.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-668"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.7.2",
+ "matchCriteriaId": "63233E2B-0359-41A5-A4BA-218F2CC2F778"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://github.com/apache/airflow/pull/34366",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://lists.apache.org/thread/1spbo9nkn49fc2hnxqm9tf6mgqwp9tjq",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42822.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42822.json
index 71875c667bf..ebd83b10b2c 100644
--- a/CVE-2023/CVE-2023-428xx/CVE-2023-42822.json
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42822.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42822",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-27T18:15:11.903",
- "lastModified": "2023-10-06T03:15:10.543",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-18T13:07:40.470",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -86,6 +86,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -105,11 +125,19 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFGL22QQF65OIZRMCKUZCVJQCKGUBRYE/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Release Notes"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTXODUR4ILM7ZPA6ZGY6VSK4BBSBMKGY/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42824.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42824.json
index 61930ff7e8a..48741939772 100644
--- a/CVE-2023/CVE-2023-428xx/CVE-2023-42824.json
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42824.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-42824",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-10-04T19:15:10.490",
- "lastModified": "2023-10-17T05:15:50.497",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:01:18.743",
+ "vulnStatus": "Analyzed",
"cisaExploitAdd": "2023-10-05",
"cisaActionDue": "2023-10-26",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@@ -11,11 +11,11 @@
"descriptions": [
{
"lang": "en",
- "value": "The issue was addressed with improved checks. This issue is fixed in iOS 17.0.3 and iPadOS 17.0.3, iOS 16.7.1 and iPadOS 16.7.1. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6."
+ "value": "The issue was addressed with improved checks. This issue is fixed in iOS 16.7.1 and iPadOS 16.7.1. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6."
},
{
"lang": "es",
- "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iOS 17.0.3 y iPadOS 17.0.3, iOS 16.7.1 y iPadOS 16.7.1. Un atacante local podr\u00eda aumentar sus privilegios. Apple tiene conocimiento de un informe que indica que este problema puede haber sido explotado activamente en versiones de iOS anteriores a iOS 16.6."
+ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en iOS 16.7.1 y iPadOS 16.7.1. Un atacante local podr\u00eda aumentar sus privilegios. Apple tiene conocimiento de un informe que indica que este problema puede haber sido explotado activamente en versiones de iOS anteriores a iOS 16.6."
}
],
"metrics": {
@@ -64,14 +64,28 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "16.7.1",
+ "matchCriteriaId": "EDDE4794-A831-4132-910D-AF5714964F39"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
"versionEndExcluding": "17.0.3",
- "matchCriteriaId": "71783128-A6C0-4F4F-B6CA-884BC24AD705"
+ "matchCriteriaId": "5383A8BF-7AD6-4D5A-9B57-DE1BC2C59E09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "16.7.1",
+ "matchCriteriaId": "52D04CC0-37F2-4214-9B91-8FA97E856210"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
"versionEndExcluding": "17.0.3",
- "matchCriteriaId": "332CB807-981B-4A6C-8B0F-E4119513098E"
+ "matchCriteriaId": "F1D28032-F9E6-45E7-98B6-7CE2351C4C99"
}
]
}
@@ -80,24 +94,12 @@
],
"references": [
{
- "url": "http://seclists.org/fulldisclosure/2023/Oct/16",
- "source": "product-security@apple.com"
- },
- {
- "url": "https://support.apple.com/en-us/HT213961",
+ "url": "https://support.apple.com/en-us/HT213972",
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
- },
- {
- "url": "https://support.apple.com/en-us/HT213972",
- "source": "product-security@apple.com"
- },
- {
- "url": "https://support.apple.com/kb/HT213972",
- "source": "product-security@apple.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42841.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42841.json
new file mode 100644
index 00000000000..93d9a5a6b56
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42841.json
@@ -0,0 +1,68 @@
+{
+ "id": "CVE-2023-42841",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.433",
+ "lastModified": "2023-10-26T00:15:11.373",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1. An app may be able to execute arbitrary code with kernel privileges."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.1, iOS 17.1 y iPadOS 17.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Ventura 13.6.1. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42842.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42842.json
new file mode 100644
index 00000000000..d860c199c4b
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42842.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-42842",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.483",
+ "lastModified": "2023-10-26T00:15:11.427",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.1. An app may be able to access sensitive user data."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42844.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42844.json
new file mode 100644
index 00000000000..455d0a6d146
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42844.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2023-42844",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.537",
+ "lastModified": "2023-10-26T00:15:11.477",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. A website may be able to access sensitive user data when resolving symlinks."
+ },
+ {
+ "lang": "es",
+ "value": "Este problema se solucion\u00f3 mejorando el manejo de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Un sitio web puede acceder a datos confidenciales del usuario al resolver enlaces simb\u00f3licos."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42845.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42845.json
new file mode 100644
index 00000000000..7ab90a740de
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42845.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2023-42845",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.587",
+ "lastModified": "2023-10-26T00:15:11.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. Photos in the Hidden Photos Album may be viewed without authentication."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de autenticaci\u00f3n con una gesti\u00f3n del estado mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.1, iOS 17.1 y iPadOS 17.1. Las fotos del \u00c1lbum de Fotos Ocultas se pueden ver sin autenticaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42846.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42846.json
new file mode 100644
index 00000000000..978d638be91
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42846.json
@@ -0,0 +1,68 @@
+{
+ "id": "CVE-2023-42846",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.637",
+ "lastModified": "2023-10-26T00:15:11.577",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "This issue was addressed by removing the vulnerable code. This issue is fixed in watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, tvOS 17.1, iOS 17.1 and iPadOS 17.1. A device may be passively tracked by its Wi-Fi MAC address."
+ },
+ {
+ "lang": "es",
+ "value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, tvOS 17.1, iOS 17.1 y iPadOS 17.1. Un dispositivo puede ser rastreado pasivamente por su direcci\u00f3n MAC de Wi-Fi."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/22",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213987",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213987",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42847.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42847.json
new file mode 100644
index 00000000000..dbce6a97180
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42847.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2023-42847",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.687",
+ "lastModified": "2023-10-26T00:15:11.623",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. An attacker may be able to access passkeys without authentication."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.1, iOS 17.1 y iPadOS 17.1. Un atacante puede acceder a las claves de acceso sin autenticaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42849.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42849.json
new file mode 100644
index 00000000000..20f5b04338d
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42849.json
@@ -0,0 +1,92 @@
+{
+ "id": "CVE-2023-42849",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.737",
+ "lastModified": "2023-10-26T00:15:11.673",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, macOS Monterey 12.7.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. Un atacante que ya haya logrado la ejecuci\u00f3n del c\u00f3digo del kernel puede evitar las mitigaciones de memoria del kernel."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42850.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42850.json
new file mode 100644
index 00000000000..8111e8824ce
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42850.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-42850",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.793",
+ "lastModified": "2023-10-26T00:15:11.723",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved permissions logic. This issue is fixed in macOS Sonoma 14.1. An app may be able to access sensitive user data."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 con una l\u00f3gica de permisos mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42852.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42852.json
new file mode 100644
index 00000000000..00cd7efeb15
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42852.json
@@ -0,0 +1,68 @@
+{
+ "id": "CVE-2023-42852",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.843",
+ "lastModified": "2023-10-26T00:15:11.773",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema l\u00f3gico con controles mejorados. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. El procesamiento de contenido web puede dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/22",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/23",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/25",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/27",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213981",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213986",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213987",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213988",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42854.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42854.json
new file mode 100644
index 00000000000..bb3574b7161
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42854.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2023-42854",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.890",
+ "lastModified": "2023-10-26T00:15:11.827",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. An app may be able to cause a denial-of-service to Endpoint Security clients."
+ },
+ {
+ "lang": "es",
+ "value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda provocar una denegaci\u00f3n de servicio a los clientes de Endpoint Security."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42856.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42856.json
new file mode 100644
index 00000000000..2f886fc3f56
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42856.json
@@ -0,0 +1,56 @@
+{
+ "id": "CVE-2023-42856",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.937",
+ "lastModified": "2023-10-26T00:15:11.877",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Processing a file may lead to unexpected app termination or arbitrary code execution."
+ },
+ {
+ "lang": "es",
+ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. El procesamiento de un archivo puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/21",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/26",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213985",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213983",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213985",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42857.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42857.json
new file mode 100644
index 00000000000..401c8e1ea0b
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42857.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2023-42857",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:10.983",
+ "lastModified": "2023-10-26T00:15:11.927",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data."
+ },
+ {
+ "lang": "es",
+ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.1, iOS 17.1 y iPadOS 17.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/19",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213982",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42861.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42861.json
new file mode 100644
index 00000000000..3689aed2bd4
--- /dev/null
+++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42861.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-42861",
+ "sourceIdentifier": "product-security@apple.com",
+ "published": "2023-10-25T19:15:11.027",
+ "lastModified": "2023-10-26T00:15:11.970",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A logic issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.1. An attacker with knowledge of a standard user's credentials can unlock another standard user's locked screen on the same Mac."
+ },
+ {
+ "lang": "es",
+ "value": "Se abord\u00f3 una cuesti\u00f3n l\u00f3gica con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Un atacante con conocimiento de las credenciales de un usuario est\u00e1ndar puede desbloquear la pantalla bloqueada de otro usuario est\u00e1ndar en la misma Mac."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/en-us/HT213984",
+ "source": "product-security@apple.com"
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "product-security@apple.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4215.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4215.json
index 51f82acbd58..4ebeb34fcf4 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4215.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4215.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4215",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-10-17T00:15:11.327",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:30:13.407",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@@ -40,8 +60,18 @@
},
"weaknesses": [
{
- "source": "ics-cert@hq.dhs.gov",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -50,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:advantech:webaccess:9.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F7AB991-92CE-4E51-9279-20A5264EEA33"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-15",
- "source": "ics-cert@hq.dhs.gov"
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4244.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4244.json
index 2858f24f6c2..f5c23df908c 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4244.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4244.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4244",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-09-06T14:15:11.877",
- "lastModified": "2023-09-11T18:12:18.423",
+ "lastModified": "2023-10-29T02:43:23.623",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de use-after-free en el netfilter del kernel de Linux: nf_tables componente puede ser explotado para lograr la escalada de privilegios locales. Debido a una condici\u00f3n de ejecuci\u00f3n entre nf_tables transacci\u00f3n del plano de control de enlace de red y la recolecci\u00f3n de elementos no utilizados de nft_set, es posible desbordar el contador de referencia causando una vulnerabilidad de use-after-free. Recomendamos actualizar al commit anterior 3e91b0ebd994635df2346353322ac51ce84ce6d8."
}
],
"metrics": {
@@ -92,6 +96,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -112,6 +131,14 @@
"Patch",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4257.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4257.json
index e66ff5f392b..c586450f49f 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4257.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4257.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-4257",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2023-10-13T22:15:10.453",
- "lastModified": "2023-10-14T17:32:33.483",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:51:43.587",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows."
+ },
+ {
+ "lang": "es",
+ "value": "La longitud de entrada del usuario no marcada en /subsys/net/l2/wifi/wifi_shell.c puede provocar desbordamientos del b\u00fafer."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-131"
+ }
+ ]
+ },
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@@ -50,10 +84,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.4.0",
+ "matchCriteriaId": "51CECB97-3A81-4A54-AA0A-DB2A1DE18CF2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-853q-q69w-gf5j",
- "source": "vulnerabilities@zephyrproject.org"
+ "source": "vulnerabilities@zephyrproject.org",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4263.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4263.json
index eb49ab03de1..bf5d24d1a47 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4263.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4263.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-4263",
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2023-10-13T21:15:51.777",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:50:12.967",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver"
+ },
+ {
+ "lang": "es",
+ "value": "Posible vulnerabilidad de desbordamiento del buffer en el controlador Zephyr IEEE 802.15.4 nRF 15.4"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
+ },
{
"source": "vulnerabilities@zephyrproject.org",
"type": "Secondary",
@@ -50,10 +84,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "3.4.0",
+ "matchCriteriaId": "51CECB97-3A81-4A54-AA0A-DB2A1DE18CF2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rf6q-rhhp-pqhf",
- "source": "vulnerabilities@zephyrproject.org"
+ "source": "vulnerabilities@zephyrproject.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4269.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4269.json
index 8103f8f434c..602cd8f3443 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4269.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4269.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4269",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-09-04T12:15:10.470",
- "lastModified": "2023-09-15T19:15:09.717",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-19T01:16:19.767",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The User Activity Log WordPress plugin before 1.6.6 lacks proper authorisation when exporting its activity logs, allowing any authenticated users, such as subscriber to perform such action and retrieve PII such as email addresses."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento de WordPress Registro de Actividad del Usuario anterior a 1.6.6 carece de la autorizaci\u00f3n adecuada al exportar sus registros de actividad, lo que permite a cualquier usuario autenticado, como un suscriptor, realizar dicha acci\u00f3n y recuperar PII, como direcciones de correo electr\u00f3nico."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4271.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4271.json
new file mode 100644
index 00000000000..921a73ee8dc
--- /dev/null
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4271.json
@@ -0,0 +1,125 @@
+{
+ "id": "CVE-2023-4271",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:15.400",
+ "lastModified": "2023-10-27T15:13:34.150",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Photospace Responsive plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018psres_button_size\u2019 parameter in versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Photospace Responsive para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del par\u00e1metro 'psres_button_size' en versiones hasta la 2.1.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:deanoakley:photospace_responsive_gallery:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.2.0",
+ "matchCriteriaId": "38503036-3C74-4119-B1DF-E97EC9852E33"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2831424/photospace-responsive/trunk/includes/class-photospace-responsive-gallery.php?contextall=1&old=2544748&old_path=%2Fphotospace-responsive%2Ftrunk%2Fincludes%2Fclass-photospace-responsive-gallery.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2966110%40photospace-responsive%2Ftrunk&old=2875667%40photospace-responsive%2Ftrunk&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3bc98896-6ff9-40de-ace2-2ca331c2a44a?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4273.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4273.json
index a0ab73fd080..d31b3c04e7b 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4273.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4273.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4273",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-09T15:15:09.823",
- "lastModified": "2023-09-10T12:16:20.770",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-27T15:15:15.083",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -155,6 +155,10 @@
"url": "https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/",
"source": "secalert@redhat.com"
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/",
"source": "secalert@redhat.com"
@@ -167,6 +171,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0002/",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com"
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4274.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4274.json
new file mode 100644
index 00000000000..35ed1025c60
--- /dev/null
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4274.json
@@ -0,0 +1,125 @@
+{
+ "id": "CVE-2023-4274",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:15.537",
+ "lastModified": "2023-10-27T17:46:41.160",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Migration, Backup, Staging \u2013 WPvivid plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 0.9.89. This allows authenticated attackers with administrative privileges to delete the contents of arbitrary directories on the server, which can be a critical issue in a shared environments."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Migration, Backup, Staging \u2013 WPvivid para WordPress es vulnerable a Directory Traversal en versiones hasta la 0.9.89 incluida. Esto permite a atacantes autenticados con privilegios administrativos eliminar el contenido de directorios arbitrarios en el servidor, lo que puede ser un problema cr\u00edtico en entornos compartidos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.2
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.7,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 5.8
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpvivid:migration\\,_backup\\,_staging:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "0.9.90",
+ "matchCriteriaId": "7DACB4DD-9204-4B8D-8C43-F0967E26EDC4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/tags/0.9.89/includes/class-wpvivid-setting.php#L200",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2956458%40wpvivid-backuprestore%2Ftrunk&old=2948265%40wpvivid-backuprestore%2Ftrunk&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5d94f38f-4b52-4b0d-800c-a6fca40bda3c?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4289.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4289.json
index 1bdb703b849..6a0ae6e92d7 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4289.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4289.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4289",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:15.487",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T16:22:44.933",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento de WordPress WP Matterport Shortcode anterior a 2.1.8 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting almacenados."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mpembed:wp_matterport_shortcode:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.1.8",
+ "matchCriteriaId": "37AC18C9-FE45-433A-A77A-A01490F420DB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/38c337c6-048f-4009-aef8-29c18afa6fdc",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4290.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4290.json
index c36ab14081c..e17dba16e35 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4290.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4290.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4290",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:15.577",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T16:23:36.687",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento WP Matterport Shortcode de WordPress anterior a 2.1.7 no escapa a la variable del servidor PHP_SELF cuando la genera en atributos, lo que genera problemas de Cross-Site Scripting reflejados que podr\u00edan usarse contra usuarios con privilegios elevados, como el administrador."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mpembed:wp_matterport_shortcode:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.1.7",
+ "matchCriteriaId": "2140BD21-7D25-4CBF-9462-1E511E5EE122"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/5fad5245-a089-4ba3-9958-1e2c3d066eea",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43041.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43041.json
new file mode 100644
index 00000000000..3d3622c91d2
--- /dev/null
+++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43041.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-43041",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-29T01:15:41.007",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM QRadar SIEM 7.5 is vulnerable to information exposure allowing a delegated Admin tenant user with a specific domain security profile assigned to see data from other domains. This vulnerability is due to an incomplete fix for CVE-2022-34352. IBM X-Force ID: 266808."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266808",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7060803",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43045.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43045.json
new file mode 100644
index 00000000000..aefde832758
--- /dev/null
+++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43045.json
@@ -0,0 +1,143 @@
+{
+ "id": "CVE-2023-43045",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-23T18:15:10.130",
+ "lastModified": "2023-10-28T03:33:35.547",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.2 could allow a remote user to perform unauthorized actions due to improper authentication. IBM X-Force ID: 266896."
+ },
+ {
+ "lang": "es",
+ "value": "IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0 y 6.2.2 podr\u00edan permitir que un usuario remoto realice acciones no autorizadas debido a una autenticaci\u00f3n incorrecta. ID de IBM X-Force: 266896."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ },
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-288"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:essentials:*:*:*",
+ "matchCriteriaId": "3E32C714-33CB-408E-8907-FC929D751588"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:standard:*:*:*",
+ "matchCriteriaId": "95F70DD2-71D1-4C6F-BE21-AA2A99E46AE9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:essentials:*:*:*",
+ "matchCriteriaId": "6325F8BC-B7D6-4601-A2D1-B61D77BC227C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:standard:*:*:*",
+ "matchCriteriaId": "EEE81D1F-446F-4CA2-A2B1-3EF1298C80EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:essentials:*:*:*",
+ "matchCriteriaId": "430CC017-4619-4C54-883E-210221268529"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:standard:*:*:*",
+ "matchCriteriaId": "D391DA86-9F9B-416A-9406-5003938E7BD8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266896",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7057409",
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43065.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43065.json
new file mode 100644
index 00000000000..bc11c23eda5
--- /dev/null
+++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43065.json
@@ -0,0 +1,122 @@
+{
+ "id": "CVE-2023-43065",
+ "sourceIdentifier": "security_alert@emc.com",
+ "published": "2023-10-23T15:15:09.053",
+ "lastModified": "2023-10-28T03:28:46.880",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nDell Unity prior to 5.3 contains a Cross-site scripting vulnerability. A low-privileged authenticated attacker can exploit these issues to obtain escalated privileges.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Dell Unity anterior a 5.3 contiene una vulnerabilidad de Cross-Site Scripting. Un atacante autenticado con pocos privilegios puede aprovechar estos problemas para obtener privilegios aumentados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security_alert@emc.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security_alert@emc.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "39CE8E4C-9B83-4FF4-A662-393566EAAAB5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_xt_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "D273B881-FD6C-49AB-BD83-1C12251FAAEC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unityvsa_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "D8155312-9B7C-4A0B-A494-3E5D4AE81B40"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.dell.com/support/kbdoc/en-us/000213152/dsa-2023-141-dell-unity-unity-vsa-and-unity-xt-security-update-for-multiple-vulnerabilities",
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43066.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43066.json
new file mode 100644
index 00000000000..a5685587de2
--- /dev/null
+++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43066.json
@@ -0,0 +1,122 @@
+{
+ "id": "CVE-2023-43066",
+ "sourceIdentifier": "security_alert@emc.com",
+ "published": "2023-10-23T16:15:09.237",
+ "lastModified": "2023-10-28T03:28:36.023",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nDell Unity prior to 5.3 contains a Restricted Shell Bypass vulnerability. This could allow an authenticated, local attacker to exploit this vulnerability by authenticating to the device CLI and issuing certain commands.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Dell Unity anterior a 5.3 contiene una vulnerabilidad de omisi\u00f3n de Shell restringido. Esto podr\u00eda permitir que un atacante local autenticado aproveche esta vulnerabilidad autentic\u00e1ndose en el CLI del dispositivo y emitiendo ciertos comandos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security_alert@emc.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
+ {
+ "source": "security_alert@emc.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "39CE8E4C-9B83-4FF4-A662-393566EAAAB5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_xt_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "D273B881-FD6C-49AB-BD83-1C12251FAAEC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unityvsa_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "D8155312-9B7C-4A0B-A494-3E5D4AE81B40"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.dell.com/support/kbdoc/en-us/000213152/dsa-2023-141-dell-unity-unity-vsa-and-unity-xt-security-update-for-multiple-vulnerabilities",
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43067.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43067.json
new file mode 100644
index 00000000000..ed95a82dce1
--- /dev/null
+++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43067.json
@@ -0,0 +1,122 @@
+{
+ "id": "CVE-2023-43067",
+ "sourceIdentifier": "security_alert@emc.com",
+ "published": "2023-10-23T16:15:09.313",
+ "lastModified": "2023-10-28T03:35:16.143",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nDell Unity prior to 5.3 contains an XML External Entity injection vulnerability. An XXE attack could potentially exploit this vulnerability disclosing local files in the file system.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Dell Unity anterior a 5.3 contiene una vulnerabilidad de inyecci\u00f3n de External Entity XML. Un ataque XXE podr\u00eda explotar esta vulnerabilidad y revelar archivos locales en el sistema de archivos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security_alert@emc.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-611"
+ }
+ ]
+ },
+ {
+ "source": "security_alert@emc.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-611"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "39CE8E4C-9B83-4FF4-A662-393566EAAAB5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_xt_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "D273B881-FD6C-49AB-BD83-1C12251FAAEC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unityvsa_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "D8155312-9B7C-4A0B-A494-3E5D4AE81B40"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.dell.com/support/kbdoc/en-us/000213152/dsa-2023-141-dell-unity-unity-vsa-and-unity-xt-security-update-for-multiple-vulnerabilities",
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43074.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43074.json
new file mode 100644
index 00000000000..e405fdbe234
--- /dev/null
+++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43074.json
@@ -0,0 +1,122 @@
+{
+ "id": "CVE-2023-43074",
+ "sourceIdentifier": "security_alert@emc.com",
+ "published": "2023-10-23T15:15:09.127",
+ "lastModified": "2023-10-28T03:29:38.597",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nDell Unity 5.3 contain(s) an Arbitrary File Creation vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by crafting arbitrary files through a request to the server.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Dell Unity 5.3 contiene una vulnerabilidad de creaci\u00f3n arbitraria de archivos. Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad creando archivos arbitrarios mediante una solicitud al servidor."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security_alert@emc.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.2,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security_alert@emc.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-73"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "39CE8E4C-9B83-4FF4-A662-393566EAAAB5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unity_xt_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "D273B881-FD6C-49AB-BD83-1C12251FAAEC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:unityvsa_operating_environment:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.3.0.0.5.120",
+ "matchCriteriaId": "D8155312-9B7C-4A0B-A494-3E5D4AE81B40"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.dell.com/support/kbdoc/en-us/000213152/dsa-2023-141-dell-unity-unity-vsa-and-unity-xt-security-update-for-multiple-vulnerabilities",
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43079.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43079.json
index 53c9214921b..05abe973420 100644
--- a/CVE-2023/CVE-2023-430xx/CVE-2023-43079.json
+++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43079.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-43079",
"sourceIdentifier": "security_alert@emc.com",
"published": "2023-10-13T12:15:10.077",
- "lastModified": "2023-10-13T12:47:20.137",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T20:01:50.240",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nDell OpenManage Server Administrator, versions 11.0.0.0 and prior, contains an Improper Access Control vulnerability. A local low-privileged malicious user could potentially exploit this vulnerability to execute arbitrary code in order to elevate privileges on the system.\u00a0Exploitation may lead to a complete system compromise.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Dell OpenManage Server Administrator, versiones 11.0.0.0 y anteriores, contiene una vulnerabilidad de Control de Acceso Inadecuado. Un usuario malicioso local con pocos privilegios podr\u00eda explotar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario con el fin de elevar los privilegios en el sistema. La explotaci\u00f3n puede llevar a un compromiso completo del sistema."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "security_alert@emc.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dell:emc_openmanage_server_administrator:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.0.1.0",
+ "matchCriteriaId": "724DC295-5903-4E0A-B286-C3C89F8AC9E6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000218469/dsa-2023-367-dell-openmanage-server-administrator-omsa-security-update-for-multiple-vulnerabilities",
- "source": "security_alert@emc.com"
+ "source": "security_alert@emc.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43118.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43118.json
index dd3e460a0a1..a28e923832a 100644
--- a/CVE-2023/CVE-2023-431xx/CVE-2023-43118.json
+++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43118.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43118",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T20:15:15.100",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-27T16:25:58.820",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,75 @@
"value": "Vulnerabilidad de Cross Site Request Forgery (CSRF) en la aplicaci\u00f3n Chalet en Extreme Networks Switch Engine (EXOS) anterior a 32.5.1.5, corregida en 31.7.2 y 32.5.1.5, permite a los atacantes ejecutar c\u00f3digo arbitrario y causar otros impactos no especificados a trav\u00e9s de la API /jsonrpc."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "31.7.0",
+ "versionEndExcluding": "31.7.2",
+ "matchCriteriaId": "51484ECC-3B51-434F-8708-D5D914254A7D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "32.0",
+ "versionEndExcluding": "32.5.1.5",
+ "matchCriteriaId": "DF47D6A6-2028-4547-A05E-EE9576AC557B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000114379",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43119.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43119.json
index 43d421e0409..8057703a95c 100644
--- a/CVE-2023/CVE-2023-431xx/CVE-2023-43119.json
+++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43119.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43119",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T20:15:15.160",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-27T15:54:49.907",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,81 @@
"value": "Un problema de Control de Acceso descubierto en Extreme Networks Switch Engine (EXOS) anterior a 32.5.1.5, tambi\u00e9n solucionado en 22.7, 31.7.2, permite a los atacantes obtener privilegios aumentados utilizando comandos telnet manipulados a trav\u00e9s del servidor Redis."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-863"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "22.7",
+ "matchCriteriaId": "D24D6059-8005-487C-824A-DA558414E521"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "31.7.0",
+ "versionEndExcluding": "31.7.2",
+ "matchCriteriaId": "51484ECC-3B51-434F-8708-D5D914254A7D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "32.0",
+ "versionEndExcluding": "32.5.1.5",
+ "matchCriteriaId": "DF47D6A6-2028-4547-A05E-EE9576AC557B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000114378",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43120.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43120.json
index 9d75e675ca0..23819ae5ee5 100644
--- a/CVE-2023/CVE-2023-431xx/CVE-2023-43120.json
+++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43120.json
@@ -2,19 +2,93 @@
"id": "CVE-2023-43120",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T19:15:10.680",
- "lastModified": "2023-10-16T19:24:26.033",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T16:52:41.107",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in Extreme Networks Switch Engine (EXOS) before 32.5.1.5, before 22.7 and before 31.7.1 allows attackers to gain escalated privileges via crafted HTTP request."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema descubierto en Extreme Networks Switch Engine (EXOS) anterior a 32.5.1.5, anterior a 22.7 y anterior a 31.7.1 permite a los atacantes obtener privilegios escalados a trav\u00e9s de una solicitud HTTP manipulada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "22.7",
+ "matchCriteriaId": "D24D6059-8005-487C-824A-DA558414E521"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "31.0",
+ "versionEndExcluding": "31.7.1",
+ "matchCriteriaId": "0E062874-4540-4C3C-B98D-B078E67EFDF7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "32.0",
+ "versionEndExcluding": "32.5.1.5",
+ "matchCriteriaId": "DF47D6A6-2028-4547-A05E-EE9576AC557B"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000114377",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43121.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43121.json
index 6f0b9e6da3f..114277fffca 100644
--- a/CVE-2023/CVE-2023-431xx/CVE-2023-43121.json
+++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43121.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43121",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T20:15:15.223",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-27T15:39:58.227",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,81 @@
"value": "Una vulnerabilidad de Directory Traversal descubierta en la aplicaci\u00f3n Chalet en Extreme Networks Switch Engine (EXOS) anterior a 32.5.1.5, anterior a 22.7 y anterior a 31.7.2 permite a los atacantes leer archivos arbitrarios."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "22.7",
+ "matchCriteriaId": "D24D6059-8005-487C-824A-DA558414E521"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "31.7.0",
+ "versionEndExcluding": "31.7.2",
+ "matchCriteriaId": "51484ECC-3B51-434F-8708-D5D914254A7D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "32.0",
+ "versionEndExcluding": "32.5.1.5",
+ "matchCriteriaId": "DF47D6A6-2028-4547-A05E-EE9576AC557B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000114376",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43147.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43147.json
index c2b7bc65dc1..ac9ac23b363 100644
--- a/CVE-2023/CVE-2023-431xx/CVE-2023-43147.json
+++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43147.json
@@ -2,19 +2,79 @@
"id": "CVE-2023-43147",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T16:15:12.100",
- "lastModified": "2023-10-12T18:15:10.567",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:54:04.663",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Limo Booking Software 1.0 is vulnerable to Cross Site Request Forgery (CSRF) to add an admin user via the Add Users Function, aka an index.php?controller=pjAdminUsers&action=pjActionCreate URI."
+ },
+ {
+ "lang": "es",
+ "value": "PHPJabbers Limo Booking Software 1.0 es vulnerable a la Cross-Site Request Forgery (CSRF) para agregar un usuario administrador a trav\u00e9s de la funci\u00f3n Agregar Usuarios, tambi\u00e9n conocida como index.php?controller=pjAdminUsers&action=pjActionCreate URI."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:phpjabbers:limo_booking_software:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "23787FB5-8196-4118-B152-C4526A8822A7"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/MinoTauro2020/CVE-2023-43147/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43148.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43148.json
index 8f3c5ad7efb..57c0022efeb 100644
--- a/CVE-2023/CVE-2023-431xx/CVE-2023-43148.json
+++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43148.json
@@ -2,19 +2,79 @@
"id": "CVE-2023-43148",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T19:15:12.013",
- "lastModified": "2023-10-12T19:42:47.127",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:34:16.443",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SPA-Cart 1.9.0.3 has a Cross Site Request Forgery (CSRF) vulnerability that allows a remote attacker to delete all accounts."
+ },
+ {
+ "lang": "es",
+ "value": "SPA-Cart 1.9.0.3 tiene una vulnerabilidad de Cross-Site Request Forgery (CSRF) que permite a un atacante remoto eliminar todas las cuentas."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:spa-cart:spa-cart:1.9.0.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA86DD4F-E412-4094-9716-3010A69E9384"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/MinoTauro2020/CVE-2023-43148",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43191.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43191.json
index 5a85e348deb..89a3bba6f48 100644
--- a/CVE-2023/CVE-2023-431xx/CVE-2023-43191.json
+++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43191.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43191",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T23:15:11.960",
- "lastModified": "2023-10-12T20:15:12.287",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:10:03.743",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -11,7 +11,7 @@
},
{
"lang": "es",
- "value": "El mensaje de primer plano de JFinalCMS puede incluir c\u00f3digo malicioso guardado en la base de datos. Cuando los usuarios navegan por los comentarios, estos c\u00f3digos maliciosos incrustados en el HTML se ejecutar\u00e1n y el atacante controlar\u00e1 el navegador del usuario para lograr el prop\u00f3sito especial del atacante, como el robo de cookies."
+ "value": "El mensaje de primer plano de SpringbootCMS 1.0 puede incluir c\u00f3digo malicioso guardado en la base de datos. Cuando los usuarios navegan por los comentarios, estos c\u00f3digos maliciosos incrustados en el HTML se ejecutar\u00e1n y el atacante controlar\u00e1 el navegador del usuario para lograr el prop\u00f3sito especial del atacante, como el robo de cookies."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43192.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43192.json
index 820c4b6f7df..675daa3ae0d 100644
--- a/CVE-2023/CVE-2023-431xx/CVE-2023-43192.json
+++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43192.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43192",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-27T22:15:09.700",
- "lastModified": "2023-10-12T20:15:12.387",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:10:48.697",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -11,7 +11,7 @@
},
{
"lang": "es",
- "value": "La inyecci\u00f3n SQL puede existir en una parte reci\u00e9n creada del background de JFinalcms y los par\u00e1metros enviados por los usuarios no se filtran. Como resultado, los caracteres especiales en los par\u00e1metros destruyen la l\u00f3gica original de las declaraciones SQL. Los atacantes pueden utilizar esta vulnerabilidad para ejecutar cualquier declaraci\u00f3n SQL"
+ "value": "La inyecci\u00f3n SQL puede existir en una parte reci\u00e9n creada del background de SpringbootCMS 1.0 y los par\u00e1metros enviados por los usuarios no se filtran. Como resultado, los caracteres especiales en los par\u00e1metros destruyen la l\u00f3gica original de las declaraciones SQL. Los atacantes pueden utilizar esta vulnerabilidad para ejecutar cualquier declaraci\u00f3n SQL."
}
],
"metrics": {
@@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "NONE",
+ "privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
- "baseScore": 9.8,
- "baseSeverity": "CRITICAL"
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
},
- "exploitabilityScore": 3.9,
+ "exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
@@ -72,13 +72,18 @@
"url": "https://github.com/etn0tw/cve_sql/blob/main/jfinalcms_sql.md",
"source": "cve@mitre.org",
"tags": [
+ "Broken Link",
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/etn0tw/cve_sql/blob/main/springbootcms_sql.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json
new file mode 100644
index 00000000000..4e57d8ca3a4
--- /dev/null
+++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43208.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-43208",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T17:15:09.033",
+ "lastModified": "2023-10-26T18:15:08.717",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679."
+ },
+ {
+ "lang": "es",
+ "value": "NextGen Healthcare Mirth Connect anterior a la versi\u00f3n 4.4.1 es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo no autenticado. Tenga en cuenta que esta vulnerabilidad se debe al parche incompleto de CVE-2023-37679."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.horizon3.ai/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43250.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43250.json
new file mode 100644
index 00000000000..22927508883
--- /dev/null
+++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43250.json
@@ -0,0 +1,104 @@
+{
+ "id": "CVE-2023-43250",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T16:15:08.790",
+ "lastModified": "2023-10-25T01:25:13.217",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XNSoft Nconvert 7.136 is vulnerable to Buffer Overflow. There is a User Mode Write AV via a crafted image file. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution."
+ },
+ {
+ "lang": "es",
+ "value": "XNSoft Nconvert 7.136 es vulnerable al desbordamiento del b\u00fafer. Hay un modo de usuario para escribir AV a trav\u00e9s de un archivo de imagen creado. Los atacantes podr\u00edan aprovechar este problema para una Denegaci\u00f3n de Servicio (DoS) o posiblemente para lograr la ejecuci\u00f3n del c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:xnview:nconvert:7.136:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09169F03-B48E-4461-933A-4080F7F80846"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/15",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/mrtouch93/exploits/tree/main/NConvert7.136/User%20Mode%20Write%20AV",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.xnview.com/en/nconvert/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43251.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43251.json
new file mode 100644
index 00000000000..38778a20275
--- /dev/null
+++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43251.json
@@ -0,0 +1,104 @@
+{
+ "id": "CVE-2023-43251",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T15:15:09.583",
+ "lastModified": "2023-10-25T10:14:16.183",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XNSoft Nconvert 7.136 has an Exception Handler Chain Corrupted via a crafted image file. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution."
+ },
+ {
+ "lang": "es",
+ "value": "XNSoft Nconvert 7.136 tiene una Exception Handler Chain Corrupted a trav\u00e9s de un archivo de imagen manipulado. Los atacantes podr\u00edan aprovechar este problema para una Denegaci\u00f3n de Servicio (DoS) o posiblemente para lograr la ejecuci\u00f3n del c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-755"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:xnview:nconvert:7.136:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09169F03-B48E-4461-933A-4080F7F80846"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/15",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/mrtouch93/exploits/tree/main/NConvert7.136/SEH",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.xnview.com/en/nconvert/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43252.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43252.json
new file mode 100644
index 00000000000..a57b4011549
--- /dev/null
+++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43252.json
@@ -0,0 +1,104 @@
+{
+ "id": "CVE-2023-43252",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T13:15:10.013",
+ "lastModified": "2023-10-25T10:13:59.047",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XNSoft Nconvert 7.136 is vulnerable to Buffer Overflow via a crafted image file."
+ },
+ {
+ "lang": "es",
+ "value": "XNSoft Nconvert 7.136 es vulnerable al desbordamiento del b\u00fafer a trav\u00e9s de un archivo de imagen manipulado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:xnview:nconvert:7.136:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09169F03-B48E-4461-933A-4080F7F80846"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
+ },
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/15",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/mrtouch93/exploits/tree/main/NConvert7.136/Stack%20Buffer%20Overrun",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.xnview.com/en/nconvert/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43281.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43281.json
new file mode 100644
index 00000000000..beb8ada5a5a
--- /dev/null
+++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43281.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-43281",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:31.707",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Double Free vulnerability in Nothings Stb Image.h v.2.28 allows a remote attacker to cause a denial of service via a crafted file to the stbi_load_gif_main function."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Double Free en Nothings Stb Image.h v.2.28 permite a un atacante remoto provocar una Denegaci\u00f3n de Servicio (DoS) a trav\u00e9s de un archivo manipulado en la funci\u00f3n stbi_load_gif_main."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/peccc/d8761f6ac45ad55cbd194dd7e6fdfdac",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/peccc/double-stb",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43322.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43322.json
new file mode 100644
index 00000000000..0907922054c
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43322.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-43322",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-28T01:15:51.657",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "ZPE Systems, Inc Nodegrid OS v5.0.0 to v5.0.17, v5.2.0 to v5.2.19, v5.4.0 to v5.4.16, v5.6.0 to v5.6.13, v5.8.0 to v5.8.10, and v5.10.0 to v5.10.3 was discovered to contain a command injection vulnerability via the endpoint /v1/system/toolkit/files/."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://psirt.zpesystems.com/portal/en/kb/articles/security-advisory-zpe-ng-2023-001-12-10-2023",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43340.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43340.json
new file mode 100644
index 00000000000..217fd44bdab
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43340.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-43340",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T23:15:08.867",
+ "lastModified": "2023-10-27T15:24:59.333",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-site scripting (XSS) vulnerability in evolution v.3.2.3 allows a local attacker to execute arbitrary code via a crafted payload injected into the cmsadmin, cmsadminemail, cmspassword and cmspasswordconfim parameters"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) en evolution v.3.2.3 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado inyectado en los par\u00e1metros cmsadmin, cmsadminemail, cmspassword y cmspasswordconfim."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.2,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:evo:evolution_cms:3.2.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5470FF1E-D2D9-45CD-8321-69BA847BC81A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Admin-Options",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43341.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43341.json
new file mode 100644
index 00000000000..e507882a397
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43341.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-43341",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T22:15:09.123",
+ "lastModified": "2023-10-20T11:27:31.330",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-site scripting (XSS) vulnerability in evolution evo v.3.2.3 allows a local attacker to execute arbitrary code via a crafted payload injected uid parameter."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) en Evolution evo v.3.2.3 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un par\u00e1metro uid inyectado en un payload manipulado."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection-",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Connection-",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43342.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43342.json
new file mode 100644
index 00000000000..8c31c6ec706
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43342.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-43342",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T22:15:09.557",
+ "lastModified": "2023-10-20T11:27:31.330",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Languages Menu component."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) en opensolution Quick CMS v.6.7 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para el componente Men\u00fa de Idiomas."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Frontend",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43344.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43344.json
new file mode 100644
index 00000000000..15978ec3577
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43344.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-43344",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T22:15:09.673",
+ "lastModified": "2023-10-20T11:27:31.330",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the SEO - Meta description parameter in the Pages Menu component."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) en opensolution Quick CMS v.6.7 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para el par\u00e1metro SEO - Meta descripci\u00f3n en el componente Men\u00fa de P\u00e1ginas."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43345.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43345.json
new file mode 100644
index 00000000000..b7e86df5e17
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43345.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-43345",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T23:15:08.910",
+ "lastModified": "2023-10-27T15:13:29.200",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Content - Name parameter in the Pages Menu component."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) en opensolution Quick CMS v.6.7 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro Content - Name en el componente Pages Menu."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.6,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:opensolution:quick_cms:6.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B571ABB-F2E3-4C39-9560-74C3E9E98593"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43346.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43346.json
new file mode 100644
index 00000000000..be52dc4ba56
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43346.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-43346",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T23:15:08.637",
+ "lastModified": "2023-10-25T09:54:11.453",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Backend - Dashboard parameter in the Languages Menu component."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) en opensolution Quick CMS v.6.7 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un scrip manipulado en el par\u00e1metro Backend - Dashboard en el componente Men\u00fa de Idiomas."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:opensolution:quick_cms:6.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B571ABB-F2E3-4C39-9560-74C3E9E98593"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Backend",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43352.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43352.json
new file mode 100644
index 00000000000..ffd602836a2
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43352.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-43352",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T22:15:08.700",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted payload to the Content Manager Menu component."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en CMSmadesimple v.2.2.18 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el componente Content Manager Menu."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CMSmadesimple-SSTI--Content",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43353.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43353.json
new file mode 100644
index 00000000000..447a7a83302
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43353.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-43353",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T22:15:10.640",
+ "lastModified": "2023-10-25T09:55:23.023",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the extra parameter in the news menu component."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Cross Site Scripting en CMSmadesimple v.2.2.18 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para el par\u00e1metro adicional en el componente del men\u00fa de noticias."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.18:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEF989DA-0199-49AE-A793-1CE18C1E045A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43354.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43354.json
new file mode 100644
index 00000000000..65d3f861bec
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43354.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-43354",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T22:15:10.683",
+ "lastModified": "2023-10-25T09:55:06.573",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Profiles parameter in the Extensions -MicroTiny WYSIWYG editor component."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross Site Scripting en CMSmadesimple v.2.2.18 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro Profiles en el componente del editor Extensions -MicroTiny WYSIWYG."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.18:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEF989DA-0199-49AE-A793-1CE18C1E045A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43355.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43355.json
new file mode 100644
index 00000000000..b21ccb68e23
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43355.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-43355",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T22:15:10.727",
+ "lastModified": "2023-10-25T09:54:56.877",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the password and password again parameters in the My Preferences - Add user component."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de Cross Site Scripting en CMSmadesimple v.2.2.18 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para los par\u00e1metros contrase\u00f1a y contrase\u00f1a nuevamente en My Preferences - Add user."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.18:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEF989DA-0199-49AE-A793-1CE18C1E045A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CMSmadesimple-Reflected-XSS---Add-user",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43356.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43356.json
new file mode 100644
index 00000000000..3b4c62b3bb3
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43356.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-43356",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T22:15:10.767",
+ "lastModified": "2023-10-25T09:54:26.260",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Global Meatadata parameter in the Global Settings Menu component."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Cross Site Scripting en CMSmadesimple v.2.2.18 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para el par\u00e1metro Global Meatadata en el componente del Global Settings Menu."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.18:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEF989DA-0199-49AE-A793-1CE18C1E045A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43357.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43357.json
new file mode 100644
index 00000000000..6697b2932d0
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43357.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-43357",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T22:15:10.807",
+ "lastModified": "2023-10-25T09:54:39.540",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the Manage Shortcuts component."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Cross Site Scripting en CMSmadesimple v.2.2.18 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro Title en el componente Manage Shortcuts."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.18:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AEF989DA-0199-49AE-A793-1CE18C1E045A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43358.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43358.json
new file mode 100644
index 00000000000..6faf3ae98c3
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43358.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-43358",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T22:15:09.210",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the News Menu component."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Cross Site Scripting en CMSmadesimple v.2.2.18 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro T\u00edtulo en el componente Men\u00fa de noticias."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CMSmadesimple-Stored-XSS---News",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43358-CMSmadesimple-Stored-XSS---News",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43359.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43359.json
new file mode 100644
index 00000000000..690077e9c5a
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43359.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-43359",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T22:15:09.720",
+ "lastModified": "2023-10-20T11:27:31.330",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Page Specific Metadata and Smarty data parameters in the Content Manager Menu component."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de Cross-Site Scripting (XSS) en CMSmadesimple v.2.2.18 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para los par\u00e1metros de datos Smarty y metadatos espec\u00edficos de la p\u00e1gina en el componente del Men\u00fa del Administrador de Contenido."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43360.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43360.json
new file mode 100644
index 00000000000..1b73a5b1912
--- /dev/null
+++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43360.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-43360",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:31.757",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Top Directory parameter in the File Picker Menu component."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en CMSmadesimple v.2.2.18 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro Top Directory en el componente File Picker Menu."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CMSmadesimple-Stored-XSS---File-Picker-extension",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-434xx/CVE-2023-43485.json b/CVE-2023/CVE-2023-434xx/CVE-2023-43485.json
index 92866766c07..9c1245e60dc 100644
--- a/CVE-2023/CVE-2023-434xx/CVE-2023-43485.json
+++ b/CVE-2023/CVE-2023-434xx/CVE-2023-43485.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-43485",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:21.590",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T20:31:53.560",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nWhen TACACS+ audit forwarding is configured on BIG-IP or BIG-IQ system, sharedsecret is logged in plaintext in the audit log.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
+ },
+ {
+ "lang": "es",
+ "value": "Cuando el reenv\u00edo de auditor\u00eda TACACS+ est\u00e1 configurado en el sistema BIG-IP o BIG-IQ, el secreto compartido se registra en texto plano en el audit log. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan."
}
],
"metrics": {
@@ -46,10 +50,723 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0.0",
+ "versionEndExcluding": "8.2.0.1.0.13.97-eng",
+ "matchCriteriaId": "E34BE5E9-1146-4C8F-85B9-6FBB14610520"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.3.0",
+ "versionEndExcluding": "8.3.0.0.12.118-eng",
+ "matchCriteriaId": "10AB2B3E-8FE6-4EFD-BD7F-60FA0AE4A779"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F11226F6-9080-4126-ACBD-7211A2746214"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A8F16422-A642-4614-96F2-E5B4877E8206"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "6603ED6A-3366-4572-AFCD-B3D4B1EC7606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "88978E38-81D3-4EFE-8525-A300B101FA69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "6DD4CF11-44E9-4596-9397-AF7DBD81277B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "DE979976-11C7-4AFF-8BE4-A094CC9C39CF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "922AA845-530A-4B4B-9976-4CBC30C8A324"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F938EB43-8373-47EB-B269-C6DF058A9244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "8D82BCD8-136A-476C-AC86-710CA8B32EB7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "377DE308-CF91-488A-B296-30A3B09451D3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "C0FE692A-CD63-4354-B599-2F47EEEFDD37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "B2F02EC0-E6C2-4E00-9804-043982D88BCE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7A4607BF-41AC-4E84-A110-74E085FF0445"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "672067B7-C838-4F0B-B3D0-E85F71715B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A4C17D18-1172-4396-9099-F1F5EAEACE5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "05E452AA-A520-4CBE-8767-147772B69194"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "596FC5D5-7329-4E39-841E-CAE937C02219"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F7280AA3-6EB0-4D9B-895B-B6883071740E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "95617B72-E7D8-44D2-AFF2-976595A72AFA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "9167FEC1-2C37-4946-9657-B4E69301FB24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7B4B3442-E0C0-48CD-87AD-060E15C9801E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "16795277-E8E2-4713-BD65-207655546649"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "0835E39B-F21E-4231-A4B9-5D511FF1B87A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F005EFFD-3A40-4762-B0D6-8760C406130F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "8705476E-A246-4B57-A0E1-FD626C1B0DE5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "C7E422F6-C4C2-43AC-B137-0997B5739030"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "CC3F710F-DBCB-4976-9719-CF063DA22377"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "18CD2C82-0080-495E-8A11-957E0C182A48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "3C508A36-C041-406C-9C8A-A396C6EDC750"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "4C9FCBCB-9CE0-49E7-85C8-69E71D211912"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "112DFA85-90AD-478D-BD70-8C7C0C074F1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E912382D-131E-40F2-A337-72D6F2A3AD23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "91ED3C5E-92E8-44CF-AA99-A38C60AE677E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "2FBCE2D1-9D93-415D-AB2C-2060307C305A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "47962DDC-899F-4A98-ABF7-CC8A1AE7FF1C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "46A7F81E-84A2-4304-B18F-53E5CDBCEA43"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "BC36311E-BB00-4750-85C8-51F5A2604F07"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E4958167-AB1F-4458-A06B-1B2DA313EEBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "D982C3E6-43DE-4AA8-889F-044E70C7FCB2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E6018B01-048C-43BB-A78D-66910ED60CA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "944B8F9C-E5C6-4DA8-BF2B-1C0B6A388BC4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "7DB6C626-BA78-4C06-8582-BFFCDF957429"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D9EC2237-117F-43BD-ADEC-516CF72E04EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "DCFAFFAC-000C-414D-83CF-B8B2C529D9CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "E68BFC75-6977-4644-A169-48263B896849"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8257AA59-C14D-4EC1-B22C-DFBB92CBC297"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "1871634A-7609-4D01-8469-3D86F36DC19D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "603324D6-FE7A-4209-B92B-94EF09AB5FF2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8A6F9699-A485-4614-8F38-5A556D31617E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "5A90F547-97A2-41EC-9FDF-25F869F0FA38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "220FD008-8919-48D4-84CF-8C4D99C3C474"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1935A1CF-50B2-4572-AA06-3504DB25B954"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "D47B7691-A95B-45C0-BAB4-27E047F3C379"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "077EBF51-B843-48B7-B31C-4BE1C99CE6F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "5EAC82FA-41CC-425A-89A0-CC9E2BF678EE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "338010BF-EFC6-42B9-9F12-865C48D421EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "14776B4F-DDEC-4B22-82A5-EA231B3895F0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K06110200",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-434xx/CVE-2023-43488.json b/CVE-2023/CVE-2023-434xx/CVE-2023-43488.json
new file mode 100644
index 00000000000..b9e68e18b35
--- /dev/null
+++ b/CVE-2023/CVE-2023-434xx/CVE-2023-43488.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-43488",
+ "sourceIdentifier": "psirt@bosch.com",
+ "published": "2023-10-25T18:17:31.800",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The vulnerability allows a low privileged (untrusted) application to\r\nmodify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged shell on the device without requiring the physical access through USB."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad permite que una aplicaci\u00f3n con pocos privilegios (no confiable) modifique una propiedad cr\u00edtica del sistema que deber\u00eda negarse, para permitir que el protocolo ADB (Android Debug Bridge) quede expuesto en la red, explot\u00e1ndolo para obtener un shell privilegiado en el dispositivo. sin requerir el acceso f\u00edsico a trav\u00e9s de USB."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.9,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 5.3
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html",
+ "source": "psirt@bosch.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-434xx/CVE-2023-43492.json b/CVE-2023/CVE-2023-434xx/CVE-2023-43492.json
new file mode 100644
index 00000000000..f3197cc77ad
--- /dev/null
+++ b/CVE-2023/CVE-2023-434xx/CVE-2023-43492.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-43492",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T20:15:09.230",
+ "lastModified": "2023-10-20T11:27:35.620",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\n\n\n\n\nIn Weintek's cMT3000 HMI Web CGI device, the cgi-bin codesys.cgi contains a stack-based buffer overflow, which could allow an anonymous attacker to hijack control flow and bypass login authentication.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En el dispositivo cMT3000 HMI Web CGI de Weintek, el cgi-bin codesys.cgi contiene un desbordamiento de b\u00fafer basado en pila, que podr\u00eda permitir a un atacante an\u00f3nimo secuestrar el flujo de control y evitar la autenticaci\u00f3n de inicio de sesi\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://dl.weintek.com/public/Document/TEC/TEC23005E_cMT_Web_Security_Update.pdf",
+ "source": "ics-cert@hq.dhs.gov"
+ },
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-12",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43506.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43506.json
new file mode 100644
index 00000000000..bbaac795447
--- /dev/null
+++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43506.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-43506",
+ "sourceIdentifier": "security-alert@hpe.com",
+ "published": "2023-10-25T18:17:31.870",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability in the ClearPass OnGuard Linux agent could\u00a0allow malicious users on a Linux instance to elevate their\u00a0user privileges to those of a higher role. A successful\u00a0exploit allows malicious users to execute arbitrary code\u00a0with root level privileges on the Linux instance."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en el agente de Linux ClearPass OnGuard podr\u00eda permitir a usuarios malintencionados elevar sus privilegios de usuario a aquellos de una funci\u00f3n superior. Un exploit exitoso permite a usuarios malintencionados ejecutar c\u00f3digo arbitrario con privilegios de root en la instancia de Linux."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-alert@hpe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt",
+ "source": "security-alert@hpe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43507.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43507.json
new file mode 100644
index 00000000000..64ca0349403
--- /dev/null
+++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43507.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-43507",
+ "sourceIdentifier": "security-alert@hpe.com",
+ "published": "2023-10-25T18:17:31.930",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability in the web-based management interface of\u00a0ClearPass Policy Manager could allow an authenticated\u00a0remote attacker to conduct SQL injection attacks against\u00a0the ClearPass Policy Manager instance. An attacker could\u00a0exploit this vulnerability to obtain and modify sensitive\u00a0information in the underlying database potentially leading\u00a0to complete compromise of the ClearPass Policy Manager\u00a0cluster."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de ClearPass Policy Manager podr\u00eda permitir que un atacante remoto autenticado realice ataques de inyecci\u00f3n SQL contra la instancia de ClearPass Policy Manager. Un atacante podr\u00eda aprovechar esta vulnerabilidad para obtener y modificar informaci\u00f3n confidencial en la base de datos subyacente, lo que podr\u00eda comprometer por completo el cl\u00faster de ClearPass Policy Manager."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-alert@hpe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt",
+ "source": "security-alert@hpe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43508.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43508.json
new file mode 100644
index 00000000000..01cb2ef8942
--- /dev/null
+++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43508.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-43508",
+ "sourceIdentifier": "security-alert@hpe.com",
+ "published": "2023-10-25T18:17:31.990",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vulnerabilities in the web-based management interface of\u00a0ClearPass Policy Manager allow an attacker with read-only\u00a0privileges to perform actions that change the state of the\u00a0ClearPass Policy Manager instance. Successful exploitation\u00a0of these vulnerabilities allow an attacker to complete\u00a0state-changing actions in the web-based management interface\u00a0that should not be allowed by their current level of\u00a0authorization on the platform."
+ },
+ {
+ "lang": "es",
+ "value": "Las vulnerabilidades en la interfaz de administraci\u00f3n basada en web de ClearPass Policy Manager permiten que un atacante con privilegios de solo lectura realice acciones que cambien el estado de la instancia de ClearPass Policy Manager. La explotaci\u00f3n exitosa de estas vulnerabilidades permite a un atacante completar acciones de cambio del estado en la interfaz de administraci\u00f3n basada en web que no deber\u00edan estar permitidas por su nivel actual de autorizaci\u00f3n en la plataforma."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-alert@hpe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt",
+ "source": "security-alert@hpe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43509.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43509.json
new file mode 100644
index 00000000000..7cdde40b426
--- /dev/null
+++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43509.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-43509",
+ "sourceIdentifier": "security-alert@hpe.com",
+ "published": "2023-10-25T18:17:32.050",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability in the web-based management interface of\u00a0ClearPass Policy Manager could allow an unauthenticated\u00a0remote attacker to send notifications to computers that are\u00a0running ClearPass OnGuard. These notifications can then be\u00a0used to phish users or trick them into downloading malicious\u00a0software."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de ClearPass Policy Manager podr\u00eda permitir que un atacante remoto no autenticado env\u00ede notificaciones a ordenadores que ejecutan ClearPass OnGuard. Estas notificaciones pueden utilizarse para realizar phishing a los usuarios o enga\u00f1arlos para que descarguen software malicioso."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-alert@hpe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt",
+ "source": "security-alert@hpe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43510.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43510.json
new file mode 100644
index 00000000000..4db550d808b
--- /dev/null
+++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43510.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-43510",
+ "sourceIdentifier": "security-alert@hpe.com",
+ "published": "2023-10-25T18:17:32.107",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability in the ClearPass Policy Manager web-based\u00a0management interface allows remote authenticated users to\u00a0run arbitrary commands on the underlying host. A successful\u00a0exploit could allow an attacker to execute arbitrary\u00a0commands as a non-privileged user on the underlying\u00a0operating system leading to partial system compromise."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de ClearPass Policy Manager permite a usuarios remotos autenticados ejecutar comandos arbitrarios en el host subyacente. Un exploit exitoso podr\u00eda permitir a un atacante ejecutar comandos arbitrarios como usuario sin privilegios en el sistema operativo subyacente, lo que podr\u00eda comprometer parcialmente el sistema."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-alert@hpe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-016.txt",
+ "source": "security-alert@hpe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43611.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43611.json
index cca77f639c7..1c740f5ea9d 100644
--- a/CVE-2023/CVE-2023-436xx/CVE-2023-43611.json
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43611.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-43611",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:21.687",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T01:37:18.377",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nThe BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process.\u00a0 This vulnerability is due to an incomplete fix for CVE-2023-38418.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El instalador del cliente BIG-IP Edge en macOS no sigue las mejores pr\u00e1cticas para elevar los privilegios durante el proceso de instalaci\u00f3n. Esta vulnerabilidad se debe a una soluci\u00f3n incompleta para CVE-2023-38418. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan"
}
],
"metrics": {
@@ -46,10 +50,576 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.2.3",
+ "versionEndExcluding": "7.2.4.4",
+ "matchCriteriaId": "4DD8B945-A8AC-453B-9993-76D39FCC0E71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F11226F6-9080-4126-ACBD-7211A2746214"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A8F16422-A642-4614-96F2-E5B4877E8206"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "6603ED6A-3366-4572-AFCD-B3D4B1EC7606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "88978E38-81D3-4EFE-8525-A300B101FA69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "6DD4CF11-44E9-4596-9397-AF7DBD81277B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "DE979976-11C7-4AFF-8BE4-A094CC9C39CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "05E452AA-A520-4CBE-8767-147772B69194"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "596FC5D5-7329-4E39-841E-CAE937C02219"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F7280AA3-6EB0-4D9B-895B-B6883071740E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "95617B72-E7D8-44D2-AFF2-976595A72AFA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "9167FEC1-2C37-4946-9657-B4E69301FB24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7B4B3442-E0C0-48CD-87AD-060E15C9801E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "16795277-E8E2-4713-BD65-207655546649"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "0835E39B-F21E-4231-A4B9-5D511FF1B87A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F005EFFD-3A40-4762-B0D6-8760C406130F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "8705476E-A246-4B57-A0E1-FD626C1B0DE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "922AA845-530A-4B4B-9976-4CBC30C8A324"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F938EB43-8373-47EB-B269-C6DF058A9244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "8D82BCD8-136A-476C-AC86-710CA8B32EB7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "377DE308-CF91-488A-B296-30A3B09451D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "C7E422F6-C4C2-43AC-B137-0997B5739030"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "CC3F710F-DBCB-4976-9719-CF063DA22377"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "18CD2C82-0080-495E-8A11-957E0C182A48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "3C508A36-C041-406C-9C8A-A396C6EDC750"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "4C9FCBCB-9CE0-49E7-85C8-69E71D211912"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "112DFA85-90AD-478D-BD70-8C7C0C074F1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E912382D-131E-40F2-A337-72D6F2A3AD23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "91ED3C5E-92E8-44CF-AA99-A38C60AE677E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "2FBCE2D1-9D93-415D-AB2C-2060307C305A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "47962DDC-899F-4A98-ABF7-CC8A1AE7FF1C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "46A7F81E-84A2-4304-B18F-53E5CDBCEA43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "C0FE692A-CD63-4354-B599-2F47EEEFDD37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "B2F02EC0-E6C2-4E00-9804-043982D88BCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "BC2A757B-4521-4DB7-89B0-7CAE1E4155E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "0A1D4B18-DB59-41C4-B769-5DF93B8EBBAD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "D819F58A-826E-49E0-A06F-4D85E04D3D9F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1E86895C-EC5A-4303-978E-8807FE7A5E9A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "BC36311E-BB00-4750-85C8-51F5A2604F07"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E4958167-AB1F-4458-A06B-1B2DA313EEBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "D982C3E6-43DE-4AA8-889F-044E70C7FCB2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E6018B01-048C-43BB-A78D-66910ED60CA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "944B8F9C-E5C6-4DA8-BF2B-1C0B6A388BC4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "7DB6C626-BA78-4C06-8582-BFFCDF957429"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D9EC2237-117F-43BD-ADEC-516CF72E04EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "DCFAFFAC-000C-414D-83CF-B8B2C529D9CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "E68BFC75-6977-4644-A169-48263B896849"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7A4607BF-41AC-4E84-A110-74E085FF0445"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "672067B7-C838-4F0B-B3D0-E85F71715B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A4C17D18-1172-4396-9099-F1F5EAEACE5A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8257AA59-C14D-4EC1-B22C-DFBB92CBC297"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "1871634A-7609-4D01-8469-3D86F36DC19D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "603324D6-FE7A-4209-B92B-94EF09AB5FF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8A6F9699-A485-4614-8F38-5A556D31617E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "5A90F547-97A2-41EC-9FDF-25F869F0FA38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "220FD008-8919-48D4-84CF-8C4D99C3C474"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1935A1CF-50B2-4572-AA06-3504DB25B954"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "D47B7691-A95B-45C0-BAB4-27E047F3C379"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "077EBF51-B843-48B7-B31C-4BE1C99CE6F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "5EAC82FA-41CC-425A-89A0-CC9E2BF678EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "338010BF-EFC6-42B9-9F12-865C48D421EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "14776B4F-DDEC-4B22-82A5-EA231B3895F0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K000136185",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43615.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43615.json
index a641b22b9cb..4819a69bbbf 100644
--- a/CVE-2023/CVE-2023-436xx/CVE-2023-43615.json
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43615.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-43615",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-07T01:15:10.783",
- "lastModified": "2023-10-13T04:15:13.840",
+ "lastModified": "2023-10-26T03:15:09.870",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -74,13 +74,35 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
- "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7SB7L6A56QZALDTOZ6O4X7PTC4I647R/",
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGRB5MO2KUJKYPMGXMIZH2WRH6QR5UZS/",
"source": "cve@mitre.org"
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7SB7L6A56QZALDTOZ6O4X7PTC4I647R/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
+ },
{
"url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/",
"source": "cve@mitre.org",
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43622.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43622.json
new file mode 100644
index 00000000000..08954565c1e
--- /dev/null
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43622.json
@@ -0,0 +1,40 @@
+{
+ "id": "CVE-2023-43622",
+ "sourceIdentifier": "security@apache.org",
+ "published": "2023-10-23T07:15:11.243",
+ "lastModified": "2023-10-27T15:15:13.857",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known \"slow loris\" attack pattern.\nThis has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.\n\nThis issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.\n\nUsers are recommended to upgrade to version 2.4.58, which fixes the issue.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Un atacante, al abrir una conexi\u00f3n HTTP/2 con un tama\u00f1o de ventana inicial de 0, pudo bloquear el manejo de esa conexi\u00f3n indefinidamente en el servidor HTTP Apache. Esto podr\u00eda usarse para agotar los recursos de los trabajadores en el servidor, similar al conocido patr\u00f3n de ataque \"slow loris\". Esto se solucion\u00f3 en la versi\u00f3n 2.4.58, de modo que dicha conexi\u00f3n finalice correctamente despu\u00e9s del tiempo de espera de conexi\u00f3n configurado. Este problema afecta al servidor HTTP Apache: desde 2.4.55 hasta 2.4.57. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.58, que soluciona el problema."
+ }
+ ],
+ "metrics": {},
+ "weaknesses": [
+ {
+ "source": "security@apache.org",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://httpd.apache.org/security/vulnerabilities_24.html",
+ "source": "security@apache.org"
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0011/",
+ "source": "security@apache.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43624.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43624.json
new file mode 100644
index 00000000000..d9bd8b06142
--- /dev/null
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43624.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-43624",
+ "sourceIdentifier": "vultures@jpcert.or.jp",
+ "published": "2023-10-23T05:15:07.877",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CX-Designer Ver.3.740 and earlier (included in CX-One CXONE-AL[][]D-V4) contains an improper restriction of XML external entity reference (XXE) vulnerability. If a user opens a specially crafted project file created by an attacker, sensitive information in the file system where CX-Designer is installed may be disclosed."
+ },
+ {
+ "lang": "es",
+ "value": "CX-Designer Ver.3.740 y anteriores (incluido en CX-One CXONE-AL[][]D-V4) contiene una restricci\u00f3n inadecuada de la vulnerabilidad de referencia de entidad externa XML (XXE). Si un usuario abre un archivo de proyecto especialmente manipulado creado por un atacante, se puede revelar informaci\u00f3n confidencial en el sistema de archivos donde est\u00e1 instalado CX-Designer."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://jvn.jp/en/vu/JVNVU98683567/",
+ "source": "vultures@jpcert.or.jp"
+ },
+ {
+ "url": "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2023-011_en.pdf",
+ "source": "vultures@jpcert.or.jp"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json
index 76e6b500e0c..0b0a0813355 100644
--- a/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43641",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-09T22:15:12.707",
- "lastModified": "2023-10-13T03:15:11.140",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-27T17:53:23.093",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -11,11 +11,31 @@
},
{
"lang": "es",
- "value": "libcue proporciona una API para analizar y extraer datos de hojas CUE. Las versiones 2.2.1 y anteriores son vulnerables al acceso a matrices fuera de los l\u00edmites. Un usuario del entorno de escritorio GNOME puede ser explotado descargando una hoja CUE de una p\u00e1gina web maliciosa. Debido a que el archivo se guarda en `~/Downloads`, los tracker-miners lo escanean autom\u00e1ticamente. Y debido a que tiene una extensi\u00f3n de nombre de archivo .cue, los tracker-miners usan libcue para analizar el archivo. El archivo explota la vulnerabilidad en libcue para obtener ejecuci\u00f3n de c\u00f3digo."
+ "value": "libcue proporciona una API para analizar y extraer datos de hojas CUE. Las versiones 2.2.1 y anteriores son vulnerables al acceso a matrices fuera de los l\u00edmites. Un usuario del entorno de escritorio GNOME puede ser explotado descargando una hoja CUE de una p\u00e1gina web maliciosa. Debido a que el archivo se guarda en `~/Downloads`, los tracker-miners lo escanean autom\u00e1ticamente. Y debido a que tiene una extensi\u00f3n de nombre de archivo .cue, los tracker-miners usan libcue para analizar el archivo. El archivo explota la vulnerabilidad en libcue para obtener la ejecuci\u00f3n del c\u00f3digo. Este problema se solucion\u00f3 en la versi\u00f3n 2.3.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -50,42 +70,138 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lipnitsk:libcue:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.3.0",
+ "matchCriteriaId": "AA6D33B0-FEB7-4FF4-A14E-AEE786CE96E6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/lipnitsk/libcue/commit/cfb98a060fd79dbc3463d85f0f29c3c335dfa0ea",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/lipnitsk/libcue/commit/fdf72c8bded8d24cfa0608b8e97f2eed210a920e",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cj",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00018.html",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57JEYTRFG4PVGZZ7HIEFTX5I7OONFFMI/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQOMFDBXGM3DOICCXKCUS76OTKTSPMN/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XUS4HTNGGGUIFLYSKTODCRIOXLX5HGV3/",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5524",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43658.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43658.json
index d2b09e7c90b..1b5d1ce3bac 100644
--- a/CVE-2023/CVE-2023-436xx/CVE-2023-43658.json
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43658.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43658",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T22:15:12.143",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T17:47:32.207",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -50,18 +70,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse_calendar:*:*:*:*:*:discourse:*:*",
+ "versionEndIncluding": "2023-10-16",
+ "matchCriteriaId": "F346D3A9-CFE0-4941-BCFB-52700D54CABD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/discourse/discourse-calendar/commit/9788310906febb36822d6823d14f1059c39644de",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-3fwj-f6ww-7hr6",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43659.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43659.json
index b751cab7e53..fd20af21f3d 100644
--- a/CVE-2023/CVE-2023-436xx/CVE-2023-43659.json
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43659.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43659",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T22:15:12.237",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:56:26.263",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -50,14 +70,43 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
+ "versionEndIncluding": "3.1.1",
+ "matchCriteriaId": "6AC25048-A9DA-4EB4-A05B-33B6348539CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*",
+ "matchCriteriaId": "1BFF647B-6CEF-43BF-BF5E-C82B557F78E2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-g4qg-5q2h-m8ph",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43661.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43661.json
index a59eb64445e..e7d7af6adc1 100644
--- a/CVE-2023/CVE-2023-436xx/CVE-2023-43661.json
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43661.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-43661",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-11T20:15:10.787",
- "lastModified": "2023-10-11T21:04:47.110",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T02:02:20.857",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cachet, the open-source status page system. Prior to the 2.4 branch, a template functionality which allows users to create templates allows them to execute any code on the server during the bad filtration and old twig version. Commit 6fb043e109d2a262ce3974e863c54e9e5f5e0587 of the 2.4 branch contains a patch for this issue."
+ },
+ {
+ "lang": "es",
+ "value": "Cachet, el sistema de p\u00e1ginas de estado de c\u00f3digo abierto. Antes de la rama 2.4, tiene una funcionalidad de plantilla que permit\u00eda a los usuarios crear plantillas, les permit\u00eda ejecutar cualquier c\u00f3digo en el servidor durante la filtraci\u00f3n incorrecta y la versi\u00f3n antigua de twig. El commit 6fb043e109d2a262ce3974e863c54e9e5f5e0587 de la rama 2.4 contiene un parche para este problema."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ],
"cvssMetricV30": [
{
"source": "security-advisories@github.com",
@@ -36,8 +62,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-74"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -46,14 +82,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:all-three:cachet:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.4",
+ "matchCriteriaId": "B341A3F1-E791-4688-8C56-DFF77B4E9197"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/cachethq/cachet/commit/6fb043e109d2a262ce3974e863c54e9e5f5e0587",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/cachethq/cachet/security/advisories/GHSA-hv79-p62r-wg3p",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Mitigation",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43666.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43666.json
index c8fbb5eebe1..4f95333674d 100644
--- a/CVE-2023/CVE-2023-436xx/CVE-2023-43666.json
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43666.json
@@ -2,15 +2,42 @@
"id": "CVE-2023-43666",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-16T09:15:10.417",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:57:44.023",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Insufficient Verification of Data Authenticity vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0,\u00a0\n\nGeneral user can view all user data like Admin account.\n\nUsers are advised to upgrade to Apache InLong's 1.9.0 or cherry-pick [1] to solve it.\n\n[1]\u00a0 https://github.com/apache/inlong/pull/8623 \n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Verificaci\u00f3n Insuficiente de Autenticidad de Datos en Apache InLong. Este problema afecta a Apache InLong: desde la versi\u00f3n 1.4.0 hasta la 1.8.0, el usuario general puede ver todos los datos del usuario, como la cuenta de administrador. Se recomienda a los usuarios actualizar a Apache InLong 1.9.0 o al cherry-pick [1] para resolverlo. \n[1] https://github.com/apache/inlong/pull/8623"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "security@apache.org",
@@ -23,10 +50,34 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.4.0",
+ "versionEndIncluding": "1.8.0",
+ "matchCriteriaId": "419D6A8F-7C90-47D0-9780-FB3C0EE88FE2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://lists.apache.org/thread/scbgh3ty3xcxm3q33r2t9f42gwwo1why",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43667.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43667.json
index 993e5d34b96..ee4becf610f 100644
--- a/CVE-2023/CVE-2023-436xx/CVE-2023-43667.json
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43667.json
@@ -2,15 +2,42 @@
"id": "CVE-2023-43667",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-16T09:15:10.500",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:36:28.993",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0, the attacker can create misleading or false records, making it harder to audit\nand trace malicious activities.\u00a0Users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick [1] to solve it.\n\n[1] https://github.com/apache/inlong/pull/8628 \n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Neutralizaci\u00f3n Inadecuada de Elementos Especiales utilizados en una vulnerabilidad de Comando SQL ('inyecci\u00f3n SQL') en Apache InLong. Este problema afecta a Apache InLong: desde la versi\u00f3n 1.4.0 hasta la 1.8.0, el atacante puede crear registros enga\u00f1osos o falsos, lo que dificulta la auditor\u00eda y rastrear actividades maliciosas. Se recomienda a los usuarios actualizar a Apache InLong 1.8.0 o al cherry-pick [1] para resolverlo. \n[1] https://github.com/apache/inlong/pull/8628"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "security@apache.org",
@@ -23,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.4.0",
+ "versionEndIncluding": "1.8.0",
+ "matchCriteriaId": "419D6A8F-7C90-47D0-9780-FB3C0EE88FE2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://lists.apache.org/thread/spnb378g268p1f902fr9kqyph2k8n543",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43668.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43668.json
index f0ce3d2498c..15fb773c039 100644
--- a/CVE-2023/CVE-2023-436xx/CVE-2023-43668.json
+++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43668.json
@@ -2,19 +2,56 @@
"id": "CVE-2023-43668",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-16T09:15:10.573",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:18:55.470",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Authorization Bypass Through User-Controlled Key vulnerability in Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.8.0,\u00a0\n\nsome sensitive params checks will be bypassed, like \"autoDeserizalize\",\"allowLoadLocalInfile\"....\n\n.\u00a0\u00a0\n\nUsers are advised to upgrade to Apache InLong's 1.9.0 or cherry-pick [1] to solve it.\n\n[1]\u00a0 https://github.com/apache/inlong/pull/8604 \n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Omisi\u00f3n de Autorizaci\u00f3n a Trav\u00e9s de la Clave Controlada por el Usuario en Apache InLong. Este problema afecta a Apache InLong: desde 1.4.0 hasta 1.8.0, se omitir\u00e1n algunas comprobaciones de par\u00e1metros confidenciales, como \"\"autoDeserizalize\"\", \"\"allowLoadLocalInfile\"\".... Se recomienda a los usuarios actualizar a Apache InLong 1.9.0 o al cherry-pick [1] para resolverlo. \n[1] https://github.com/apache/inlong/pull/8604"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
- "source": "security@apache.org",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-639"
+ }
+ ]
+ },
+ {
+ "source": "security@apache.org",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -23,10 +60,33 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.4.0",
+ "versionEndIncluding": "1.8.0",
+ "matchCriteriaId": "419D6A8F-7C90-47D0-9780-FB3C0EE88FE2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://lists.apache.org/thread/16gtk7rpdm1rof075ro83fkrnhbzn5sh",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43702.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43702.json
index 9008d04cf40..552179beadf 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43702.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43702.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43702",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T02:15:09.167",
- "lastModified": "2023-10-06T16:15:13.320",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:40:35.577",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43703.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43703.json
index acf6366a43b..4dabd68db54 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43703.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43703.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43703",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T02:15:09.220",
- "lastModified": "2023-10-06T16:15:13.440",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:42:24.453",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43704.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43704.json
index 5357a6ebb97..2862394dc24 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43704.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43704.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43704",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T02:15:09.277",
- "lastModified": "2023-10-06T16:15:13.543",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:42:57.623",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43705.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43705.json
index 5cf1281d2e1..a23355d3f7c 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43705.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43705.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43705",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T02:15:09.337",
- "lastModified": "2023-10-06T16:15:13.643",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:43:21.543",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43706.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43706.json
index 632c9303db4..31ea20b87cc 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43706.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43706.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43706",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T02:15:09.397",
- "lastModified": "2023-10-06T16:15:13.737",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:43:36.807",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43707.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43707.json
index bb1a50925c7..563459c2e69 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43707.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43707.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43707",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T03:15:09.233",
- "lastModified": "2023-10-06T16:15:13.827",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:44:25.483",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43708.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43708.json
index 3bb7e57f384..3b2da8c9ddc 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43708.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43708.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43708",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T03:15:09.300",
- "lastModified": "2023-10-06T16:15:13.910",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:46:55.997",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43709.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43709.json
index e6355453b0f..08164491f81 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43709.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43709.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43709",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T03:15:09.363",
- "lastModified": "2023-10-06T16:15:14.003",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:48:02.037",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43710.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43710.json
index 2794a0f71b7..9edc3af1e66 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43710.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43710.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43710",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T03:15:09.423",
- "lastModified": "2023-10-06T16:15:14.093",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:48:35.803",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43711.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43711.json
index bab616f31b9..16f3ca5b129 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43711.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43711.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43711",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T03:15:09.487",
- "lastModified": "2023-10-06T16:15:14.183",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:49:16.020",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43712.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43712.json
index e80dbb3510a..c1b9920d25b 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43712.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43712.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43712",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T21:15:09.850",
- "lastModified": "2023-10-06T16:15:14.273",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:50:52.147",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43713.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43713.json
index e3c8d347875..1d3fcb69c9f 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43713.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43713.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43713",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T21:15:09.947",
- "lastModified": "2023-10-06T16:15:14.370",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:52:12.623",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43714.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43714.json
index f7128582dd4..27a08636991 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43714.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43714.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43714",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T21:15:10.010",
- "lastModified": "2023-10-06T16:15:14.457",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:53:10.013",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43715.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43715.json
index c07d742c1b6..19293bbd173 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43715.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43715.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43715",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T21:15:10.077",
- "lastModified": "2023-10-06T16:15:14.547",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:54:16.323",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43716.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43716.json
index eb1b902f219..1e333e17875 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43716.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43716.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43716",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T21:15:10.140",
- "lastModified": "2023-10-06T16:15:14.647",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:56:43.863",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43717.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43717.json
index ff86118ba6b..3c5eb3ac722 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43717.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43717.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43717",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.347",
- "lastModified": "2023-10-06T16:15:14.740",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:57:12.883",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43718.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43718.json
index 1da4a3f3178..519f2c9a42b 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43718.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43718.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43718",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.410",
- "lastModified": "2023-10-06T16:15:14.823",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T20:19:03.787",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43719.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43719.json
index ac7617eb862..eff93301df0 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43719.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43719.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43719",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.467",
- "lastModified": "2023-10-06T16:15:14.917",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:29:03.923",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43720.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43720.json
index 6f113898d73..206e1abc016 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43720.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43720.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43720",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.533",
- "lastModified": "2023-10-06T16:15:15.007",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:30:40.323",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43721.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43721.json
index ac60858e379..936aab07835 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43721.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43721.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43721",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.597",
- "lastModified": "2023-10-06T16:15:15.097",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:30:34.613",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43722.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43722.json
index 608e53db2d6..5a5377e1400 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43722.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43722.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43722",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.657",
- "lastModified": "2023-10-06T16:15:15.187",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:30:31.410",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43723.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43723.json
index a760334d1e2..542efb90036 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43723.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43723.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43723",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.717",
- "lastModified": "2023-10-06T16:15:15.273",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:30:27.697",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43724.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43724.json
index 42a4c850ce8..9551762e075 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43724.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43724.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43724",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.777",
- "lastModified": "2023-10-06T16:15:15.367",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:32:25.060",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43725.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43725.json
index 956507afe07..567231c02f1 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43725.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43725.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43725",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.843",
- "lastModified": "2023-10-06T16:15:15.460",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:32:10.103",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43726.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43726.json
index 94136dd2ca9..afd13d0332b 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43726.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43726.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43726",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.903",
- "lastModified": "2023-10-06T16:15:15.553",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:32:06.240",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43727.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43727.json
index aaf35553814..bc08a56acab 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43727.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43727.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43727",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.967",
- "lastModified": "2023-10-06T16:15:15.640",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:31:34.573",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43728.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43728.json
index f959609403d..7b4647328ae 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43728.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43728.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43728",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:11.027",
- "lastModified": "2023-10-06T16:15:15.733",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:31:30.990",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43729.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43729.json
index d8f29ba639f..753603a7116 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43729.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43729.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43729",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:11.097",
- "lastModified": "2023-10-06T16:15:15.817",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:31:27.307",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43730.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43730.json
index 9f3f713f9b7..a92b706d4b8 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43730.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43730.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43730",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:11.163",
- "lastModified": "2023-10-06T17:15:12.260",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:36:10.843",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43731.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43731.json
index 31256e5f848..ed1eeb7dfb1 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43731.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43731.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43731",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:11.227",
- "lastModified": "2023-10-06T17:15:12.367",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:36:50.947",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43732.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43732.json
index 9676e6809d1..c4687eeef07 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43732.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43732.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43732",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.127",
- "lastModified": "2023-10-06T17:15:12.463",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:37:34.603",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43733.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43733.json
index 114f14c6518..fbcdeb1b09b 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43733.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43733.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43733",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.203",
- "lastModified": "2023-10-06T17:15:12.553",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:38:48.107",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43734.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43734.json
index ab56ebefdd2..f454d5f9745 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43734.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43734.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43734",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.260",
- "lastModified": "2023-10-06T17:15:12.643",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:39:15.397",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43735.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43735.json
index fe2ec082e50..7bfc1955220 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43735.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43735.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43735",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.320",
- "lastModified": "2023-10-06T17:15:12.740",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T01:40:09.940",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43737.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43737.json
new file mode 100644
index 00000000000..452389d5482
--- /dev/null
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43737.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-43737",
+ "sourceIdentifier": "help@fluidattacks.com",
+ "published": "2023-10-26T23:15:09.310",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'fnm' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Online Art Gallery v1.0 es vulnerable a m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL no autenticada. El par\u00e1metro 'fnm' del recurso header.php no valida los caracteres recibidos y se env\u00edan sin filtrar a la base de datos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://fluidattacks.com/advisories/ono",
+ "source": "help@fluidattacks.com"
+ },
+ {
+ "url": "https://https://projectworlds.in/",
+ "source": "help@fluidattacks.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43738.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43738.json
new file mode 100644
index 00000000000..c7301488906
--- /dev/null
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43738.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-43738",
+ "sourceIdentifier": "help@fluidattacks.com",
+ "published": "2023-10-27T03:15:07.960",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'email' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Online Art Gallery v1.0 es vulnerable a m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL no autenticada. El par\u00e1metro 'email' del recurso header.php no valida los caracteres recibidos y se env\u00edan sin filtrar a la base de datos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://fluidattacks.com/advisories/ono",
+ "source": "help@fluidattacks.com"
+ },
+ {
+ "url": "https://https://projectworlds.in/",
+ "source": "help@fluidattacks.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43776.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43776.json
index f1e42e08b02..fad87d0fa40 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43776.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43776.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-43776",
"sourceIdentifier": "CybersecurityCOE@eaton.com",
"published": "2023-10-17T13:15:11.750",
- "lastModified": "2023-10-17T13:15:11.750",
- "vulnStatus": "Received",
+ "lastModified": "2023-10-25T13:38:32.223",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Eaton easyE4 PLC offers a device password protection functionality to facilitate a secure connection and prevent unauthorized access. It was observed that the device password was stored with a weak encoding algorithm in the easyE4 program file when exported to SD card (*.PRG file ending)."
+ },
+ {
+ "lang": "es",
+ "value": "Eaton easyE4 PLC ofrece una funcionalidad de protecci\u00f3n con contrase\u00f1a del dispositivo para facilitar una conexi\u00f3n segura y evitar el acceso no autorizado. Se observ\u00f3 que la contrase\u00f1a del dispositivo se almacen\u00f3 con un algoritmo de codificaci\u00f3n d\u00e9bil en el archivo del programa easyE4 cuando se export\u00f3 a la tarjeta SD (final de archivo *.PRG)."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.6,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.7,
+ "impactScore": 5.9
+ },
{
"source": "CybersecurityCOE@eaton.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-326"
+ }
+ ]
+ },
{
"source": "CybersecurityCOE@eaton.com",
"type": "Secondary",
@@ -46,10 +80,632 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-box-e4-ac1_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "C5BBDB77-0A3E-469B-B76D-8EC19B302DF8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-box-e4-ac1:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8206719B-D602-4085-8936-A764C8C8400D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-box-e4-dc1_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "5A3817C5-D716-41B2-A9C4-E43B6A214F7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-box-e4-dc1:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "75CD25E6-E3DF-411D-A47D-8B00F46863BF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-box-e4-uc1_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "A64743A8-383F-47DA-AADA-93F97A40EC97"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-box-e4-uc1:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09C357B2-009E-4302-B7E4-D0A3843FB87A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-ac-12rc1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "A1557C4B-5FE7-4679-8EC7-229159BF87E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-ac-12rc1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EFD509FB-5AEC-4FC5-980C-A7F10C283068"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-ac-12rcx1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "1C824881-E4E5-4937-B35B-99DD0D3106A7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-ac-12rcx1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E2FC53F4-065C-44AB-802D-A379F2F310DF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-ac-16re1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "DD7B996D-B682-4541-A48E-E7250BC372FB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-ac-16re1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6A1AD643-3CE2-4E48-A782-49EFCF032658"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy_e4-ac-8re1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "7EFB9F56-3BEC-44C2-A99F-DC69648D25FE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy_e4-ac-8re1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "40B64BF7-0DB6-494C-8CB9-6026E85E6B82"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-dc-12tc1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "700AD35D-FF04-4AAE-8A33-1C34761818B1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-dc-12tc1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B786B47D-BDE2-405F-BB0D-4D665769AEF8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-dc-12tcx1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "3F33FE20-0D6B-4ACA-81CB-6FC343D41D7E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-dc-12tcx1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B85AA28F-9316-4C83-846D-6061F2C635A9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-dc-16te1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "BA15EBFB-11CC-4758-A64A-9157F505D464"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-dc-16te1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "937463C0-CE8A-44E8-A270-511D239D9AE5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-dc-4pe1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "298AE4F1-FF3B-4D0E-8278-F2DBAA3FCD3D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-dc-4pe1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "48D501EE-3A96-4503-8F26-C84CC4C66DD2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-dc-6ae1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "58501BCB-F11B-4734-92A9-5745979212BE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-dc-6ae1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "68B9AB6C-A483-426C-B6A4-2D5935606FFE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-dc-8te1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "BCE9EB77-1EF2-4CAB-A131-F8919ED82FBB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-dc-8te1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8015DCE-6C8C-4DAE-95F4-82D661305788"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-uc-12rc1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "4671E23E-8104-449B-B1E2-D0F9B61D48B2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-uc-12rc1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DDB7DAF7-3AD5-4F7B-9F10-699BFED9070D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-uc-12rcx1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "DE075495-E6B4-428C-BCD6-FE5A9A3A45BA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-uc-12rcx1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D06C9DD3-7E47-4151-8F26-321F0349796F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-uc-16re1_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "9EC7853B-16AE-4F1B-AEE7-0652A4F45B1C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-uc-16re1:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCA1EC8B-8ED6-48A7-9928-3AB39C0A97BE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-uc-16re1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "B2EB8D62-5B36-45F6-AA07-FF23A2A82126"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-uc-16re1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87D7ACFC-9057-4E1A-AFA6-86C52501EB7D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:easy-e4-uc-8re1p_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "44CF72BE-1470-4FA3-B0B9-1C2104B2574C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:easy-e4-uc-8re1p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDC6E077-EC3C-4731-9121-A398946B6B30"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:xv-102-a035tqrb-1e4_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "C66C13D9-6D90-4076-B05B-1658958FD8EB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:xv-102-a035tqrb-1e4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "034E43AF-EF91-4C67-9040-939822748250"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:xv-102-a3-57tvrb-1e4_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "286C4664-5450-4F2D-81F1-A76B034136A6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:xv-102-a3-57tvrb-1e4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B5B35A76-958F-4B5A-BC96-E2F1A17D11FE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:xv100-box-e4-dc1_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "C3585D6D-4786-4C25-A878-D453CFD0AA59"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:xv100-box-e4-dc1:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC9E5C72-66BF-49D3-A95D-07D226B95787"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:eaton:xv100-box-e4-uc1_firmware:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.02",
+ "matchCriteriaId": "2AFCCDCF-377D-49B0-BD03-BDE286A50622"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:eaton:xv100-box-e4-uc1:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "740AD1F6-E59F-4343-AFB1-B8CB75543F62"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2023-1010.pdf",
- "source": "CybersecurityCOE@eaton.com"
+ "source": "CybersecurityCOE@eaton.com",
+ "tags": [
+ "Mitigation",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43777.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43777.json
index 8bb9388bfbc..c4bf9b9d166 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43777.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43777.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-43777",
"sourceIdentifier": "CybersecurityCOE@eaton.com",
"published": "2023-10-17T13:15:11.827",
- "lastModified": "2023-10-17T13:15:11.827",
- "vulnStatus": "Received",
+ "lastModified": "2023-10-25T12:34:03.390",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Eaton easySoft software is used to program easy controllers and displays for configuring, programming and defining parameters for all the intelligent relays. This software has a password protection functionality to secure the project file from unauthorized access. This password was being stored insecurely and could be retrieved by skilled adversaries.\u00a0"
+ },
+ {
+ "lang": "es",
+ "value": "El software Eaton easySoft se utiliza para programar controladores y pantallas f\u00e1ciles para configurar, programar y definir par\u00e1metros para todos los rel\u00e9s inteligentes. Este software tiene una funci\u00f3n de protecci\u00f3n con contrase\u00f1a para proteger el archivo del proyecto contra accesos no autorizados. Esta contrase\u00f1a se almacenaba de forma insegura y adversarios expertos pod\u00edan recuperarla."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
{
"source": "CybersecurityCOE@eaton.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-522"
+ }
+ ]
+ },
{
"source": "CybersecurityCOE@eaton.com",
"type": "Secondary",
@@ -46,10 +80,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eaton:easysoft:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "8.01",
+ "matchCriteriaId": "F269B5CB-F6D8-49D0-AC99-398B7FE1ABFB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2023-1011.pdf",
- "source": "CybersecurityCOE@eaton.com"
+ "source": "CybersecurityCOE@eaton.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43782.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43782.json
index c38d9b1d867..d1e2c2bded1 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43782.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43782.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43782",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-22T06:15:10.557",
- "lastModified": "2023-10-05T12:15:09.863",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T17:59:42.910",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -71,7 +71,11 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/05/4",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Mailing List"
+ ]
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1213983",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43783.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43783.json
index 442df63cd46..eff4d0d8978 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43783.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43783.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43783",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-22T06:15:10.697",
- "lastModified": "2023-10-05T12:15:09.957",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T17:59:35.273",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -71,7 +71,11 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/05/4",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Mailing List"
+ ]
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1213985",
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json
index 306c719208b..ad16ec975fa 100644
--- a/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-43789",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-12T12:15:10.710",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T18:05:37.910",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en libXpm donde existe una vulnerabilidad debido a una condici\u00f3n de los l\u00edmite, un usuario local puede desencadenar un error de lectura fuera de los l\u00edmites y leer el contenido de la memoria en el sistema."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "secalert@redhat.com",
"type": "Secondary",
@@ -34,14 +58,86 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:libxpm_project:libxpm:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "3.5.17",
+ "matchCriteriaId": "82648CDA-3F1C-4558-AE15-4AD1A059C5BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-43789",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242249",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Issue Tracking",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43794.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43794.json
new file mode 100644
index 00000000000..ef6e8a3b7b2
--- /dev/null
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43794.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-43794",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-17T21:15:46.120",
+ "lastModified": "2023-10-24T21:00:27.387",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Nocodb is an open source Airtable alternative. Affected versions of nocodb contain a SQL injection vulnerability, that allows an authenticated attacker with creator access to query the underlying database. By supplying a specially crafted payload to the given an attacker can inject arbitrary SQL queries to be executed. Since this is a blind SQL injection, an attacker may need to use time-based payloads which would include a function to delay execution for a given number of seconds. The response time indicates, whether the result of the query execution was true or false. Depending on the result, the HTTP response will be returned after a given number of seconds, indicating TRUE, or immediately, indicating FALSE. In that way, an attacker can reveal the data present in the database. This vulnerability has been addressed in version 0.111.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-141`."
+ },
+ {
+ "lang": "es",
+ "value": "Nocodb es una alternativa de c\u00f3digo abierto a Airtable. Las versiones afectadas de nocodb contienen una vulnerabilidad de inyecci\u00f3n SQL, que permite a un atacante autenticado con acceso de creador consultar la base de datos subyacente. Al proporcionar un payload especialmente manipulada, un atacante puede inyectar consultas SQL arbitrarias para su ejecuci\u00f3n. Dado que se trata de una inyecci\u00f3n blind SQL, es posible que un atacante necesite utilizar payloads basados en el tiempo que incluir\u00edan una funci\u00f3n para retrasar la ejecuci\u00f3n durante un n\u00famero determinado de segundos. El tiempo de respuesta indica si el resultado de la ejecuci\u00f3n de la consulta fue verdadero o falso. Dependiendo del resultado, la respuesta HTTP se devolver\u00e1 despu\u00e9s de un n\u00famero determinado de segundos, indicando VERDADERO, o inmediatamente, indicando FALSO. De esa forma, un atacante puede revelar los datos presentes en la base de datos. Esta vulnerabilidad se ha solucionado en la versi\u00f3n 0.111.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad. Este problema tambi\u00e9n se rastrea como \"GHSL-2023-141\"."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:xgenecloud:nocodb:0.109.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3193E82C-7D6C-4A7D-8DA8-F0E9F5D8ED8B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nocodb/nocodb/security/advisories/GHSA-3m5q-q39v-xf8f",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43795.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43795.json
new file mode 100644
index 00000000000..e1eb480fc02
--- /dev/null
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43795.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-43795",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:32.180",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2."
+ },
+ {
+ "lang": "es",
+ "value": "GeoServer es un servidor de software de c\u00f3digo abierto escrito en Java que permite a los usuarios compartir y editar datos geoespaciales. La especificaci\u00f3n del Servicio de procesamiento web (WPS) de OGC est\u00e1 dise\u00f1ada para procesar informaci\u00f3n de cualquier servidor mediante solicitudes GET y POST. Esto presenta la oportunidad de falsificar solicitudes del lado del servidor. Esta vulnerabilidad ha sido parcheada en las versiones 2.22.5 y 2.23.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 8.6,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-5pr3-m5hm-9956",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43800.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43800.json
new file mode 100644
index 00000000000..70a569b6036
--- /dev/null
+++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43800.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-43800",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-18T22:15:09.173",
+ "lastModified": "2023-10-19T12:59:35.787",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Arduino Create Agent is a package to help manage Arduino development. The vulnerability affects the endpoint `/v2/pkgs/tools/installed`. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate his privileges to those of the user running the Arduino Create Agent service via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this issue."
+ },
+ {
+ "lang": "es",
+ "value": "Arduino Create Agent es un paquete para ayudar a gestionar el desarrollo de Arduino. La vulnerabilidad afecta al endpoint `/v2/pkgs/tools/installed`. Un usuario que tiene la capacidad de realizar solicitudes HTTP a la interfaz del host local, o que puede omitir la configuraci\u00f3n CORS, puede escalar sus privilegios a los del usuario que ejecuta el servicio Arduino Create Agent a trav\u00e9s de una solicitud HTTP POST manipulada. Este problema se solucion\u00f3 en la versi\u00f3n \"1.3.3\". Se recomienda a los usuarios que actualicen. No se conocen workarounds para este problema."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-345"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-4x5q-q7wc-q22p",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43801.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43801.json
new file mode 100644
index 00000000000..1c6a40f0c7b
--- /dev/null
+++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43801.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-43801",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-18T22:15:09.247",
+ "lastModified": "2023-10-19T12:59:35.787",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP DELETE request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this issue.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Arduino Create Agent es un paquete para ayudar a gestionar el desarrollo de Arduino. Esta vulnerabilidad afecta el endpoint `/v2/pkgs/tools/installed` y la forma en que maneja los nombres de complementos proporcionados como entrada del usuario. Un usuario que tiene la capacidad de realizar solicitudes HTTP a la interfaz del host local, o puede omitir la configuraci\u00f3n CORS, puede eliminar archivos o carpetas arbitrarios que pertenezcan al usuario que ejecuta Arduino Create Agent a trav\u00e9s de una solicitud DELETE HTTP manipulada. Este problema se solucion\u00f3 en la versi\u00f3n \"1.3.3\". Se recomienda a los usuarios que actualicen. No se conocen workarounds para este problema."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-mjq6-pv9c-qppq",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43802.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43802.json
new file mode 100644
index 00000000000..e0c8dcd4784
--- /dev/null
+++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43802.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-43802",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-18T21:15:09.187",
+ "lastModified": "2023-10-19T12:59:40.337",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/upload` which handles request with the `filename` parameter. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate their privileges to those of the user running the Arduino Create Agent service via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Arduino Create Agent es un paquete para ayudar a gestionar el desarrollo de Arduino. Esta vulnerabilidad afecta al endpoint `/upload` que maneja la solicitud con el par\u00e1metro `filename`. Un usuario que tiene la capacidad de realizar solicitudes HTTP a la interfaz del host local, o que puede omitir la configuraci\u00f3n CORS, puede escalar sus privilegios a los del usuario que ejecuta el servicio Arduino Create Agent a trav\u00e9s de una solicitud HTTP POST manipulada. Este problema se solucion\u00f3 en la versi\u00f3n \"1.3.3\". Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-75j7-w798-cwwx",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43803.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43803.json
new file mode 100644
index 00000000000..e0274bf1ab6
--- /dev/null
+++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43803.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-43803",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-18T21:15:09.260",
+ "lastModified": "2023-10-19T12:59:35.787",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Arduino Create Agent es un paquete para ayudar a gestionar el desarrollo de Arduino. Esta vulnerabilidad afecta el endpoint `/v2/pkgs/tools/installed` y la forma en que maneja los nombres de complementos proporcionados como entrada del usuario. Un usuario que tiene la capacidad de realizar solicitudes HTTP a la interfaz del host local, o que puede omitir la configuraci\u00f3n CORS, puede eliminar archivos o carpetas arbitrarios que pertenezcan al usuario que ejecuta Arduino Create Agent a trav\u00e9s de una solicitud HTTP POST manipulada. Este problema se solucion\u00f3 en la versi\u00f3n \"1.3.3\". Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-m5jc-r4gf-c6p8",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43814.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43814.json
index 6a3eee2f233..4c3e730722b 100644
--- a/CVE-2023/CVE-2023-438xx/CVE-2023-43814.json
+++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43814.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43814",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T22:15:12.317",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T17:48:38.917",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.7,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -40,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -54,10 +84,36 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
+ "versionEndIncluding": "3.1.1",
+ "matchCriteriaId": "6AC25048-A9DA-4EB4-A05B-33B6348539CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*",
+ "matchCriteriaId": "1BFF647B-6CEF-43BF-BF5E-C82B557F78E2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-3x57-846g-7qcw",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43875.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43875.json
new file mode 100644
index 00000000000..140df1eff49
--- /dev/null
+++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43875.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-43875",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T22:15:09.777",
+ "lastModified": "2023-10-20T11:27:31.330",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Multiple Cross-Site Scripting (XSS) vulnerabilities in installation of Subrion CMS v.4.2.1 allows a local attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost, dbname, dbuser, adminusername and adminemail."
+ },
+ {
+ "lang": "es",
+ "value": "M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) en la instalaci\u00f3n de Subrion CMS v.4.2.1 permiten a un atacante local ejecutar scripts web arbitrarios a trav\u00e9s de un payload manipulado inyectado en bhost, dbname, dbuser, adminusername y adminemail. "
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/sromanhu/Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43877.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43877.json
index 7080961b344..adc1fa61f0b 100644
--- a/CVE-2023/CVE-2023-438xx/CVE-2023-43877.json
+++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43877.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43877",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-04T22:15:09.937",
- "lastModified": "2023-10-10T23:15:10.983",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:58:54.877",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -70,7 +70,11 @@
"references": [
{
"url": "https://github.com/sromanhu/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu/blob/main/README.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/sromanhu/RiteCMS-Stored-XSS---Home",
diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43896.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43896.json
index d5a820519e3..ba2351f7db5 100644
--- a/CVE-2023/CVE-2023-438xx/CVE-2023-43896.json
+++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43896.json
@@ -2,23 +2,90 @@
"id": "CVE-2023-43896",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T16:15:10.047",
- "lastModified": "2023-10-10T16:37:27.690",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-25T18:17:32.273",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow in Macrium Reflect 8.1.7544 and below allows attackers to escalate privileges or execute arbitrary code."
+ },
+ {
+ "lang": "es",
+ "value": "Un desbordamiento de b\u00fafer en Macrium Reflect 8.1.7544 y versiones anteriores permite a los atacantes escalar privilegios o ejecutar c\u00f3digo arbitrario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:macrium:reflect:8.1.7544:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6F66109-567C-4DB9-92EE-FDA4B528FE5F"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "http://macrium.com",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://knowledgebase.macrium.com/display/KNOW80/CVE-2023-43896+Advisory",
"source": "cve@mitre.org"
},
{
"url": "https://northwave-cybersecurity.com/vulnerability-notice/macrium-reflect-driver-out-of-bounds-write",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43898.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43898.json
index 5e35be7de65..bcfec4225f7 100644
--- a/CVE-2023/CVE-2023-438xx/CVE-2023-43898.json
+++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43898.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-43898",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-03T21:15:10.440",
- "lastModified": "2023-10-05T18:23:15.117",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-27T21:15:09.450",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -68,6 +68,14 @@
}
],
"references": [
+ {
+ "url": "https://github.com/nothings/stb/issues/1452",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/nothings/stb/pull/1454",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://github.com/peccc/null-stb",
"source": "cve@mitre.org",
diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43905.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43905.json
new file mode 100644
index 00000000000..4c14207b534
--- /dev/null
+++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43905.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-43905",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T00:15:12.017",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Incorrect access control in writercms v1.1.0 allows attackers to directly obtain backend account passwords via unspecified vectors."
+ },
+ {
+ "lang": "es",
+ "value": "El control de acceso incorrecto en writecms v1.1.0 permite a los atacantes obtener directamente contrase\u00f1as de cuentas de backend a trav\u00e9s de vectores no especificados."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/Playful-CR/CVE-paddle-/blob/main/CVE-2023-43905..md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43906.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43906.json
new file mode 100644
index 00000000000..9f3aea3d022
--- /dev/null
+++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43906.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-43906",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T00:15:12.063",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Xolo CMS v0.11 was discovered to contain a reflected cross-site scripting (XSS) vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Xolo CMS v0.11 contiene una vulnerabilidad de Cross-Site Scripting (XSS) Reflejado."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/Playful-CR/CVE-paddle-/blob/main/CVE-2023-43906",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43959.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43959.json
new file mode 100644
index 00000000000..2d5a4cea663
--- /dev/null
+++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43959.json
@@ -0,0 +1,101 @@
+{
+ "id": "CVE-2023-43959",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T14:15:09.883",
+ "lastModified": "2023-10-24T20:37:15.000",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in YeaLinkSIP-T19P-E2 v.53.84.0.15 allows a remote privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en YeaLinkSIP-T19P-E2 v.53.84.0.15 permite a un atacante remoto con privilegios ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada para la funci\u00f3n ping del componente diagnostic."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:yealink:sip-t19p-e2_firmware:53.84.0.15:*:*:*:*:*:*:*",
+ "matchCriteriaId": "96A72837-1AF1-4E35-B8E3-AAACFB8BBC1F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:yealink:sip-t19p-e2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC45397B-867F-44A0-8191-9656DF43FAFB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://hackmd.io/@tahaafarooq/auth_rce_voip",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.exploit-db.com/exploits/50509",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory",
+ "VDB Entry"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43961.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43961.json
new file mode 100644
index 00000000000..e4b3f1ad4fe
--- /dev/null
+++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43961.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-43961",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:32.357",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in Dromara SaToken version 1.3.50RC and before when using Spring dynamic controllers, a specially crafted request may cause an authentication bypass."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en Dromara SaToken versi\u00f3n 1.3.50RC y anteriores al usar controladores din\u00e1micos Spring, una solicitud especialmente manipulada puede provocar una omisi\u00f3n de autenticaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/dromara/Sa-Token/issues/511",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43986.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43986.json
new file mode 100644
index 00000000000..14ea6d9b77a
--- /dev/null
+++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43986.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-43986",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T19:15:15.757",
+ "lastModified": "2023-10-25T19:57:40.860",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "DM Concept configurator before v4.9.4 was discovered to contain a SQL injection vulnerability via the component ConfiguratorAttachment::getAttachmentByToken."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que el configurador de DM Concept anterior a v4.9.4 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente ConfiguratorAttachment::getAttachmentByToken."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dmconcept:configurator:*:*:*:*:*:prestashop:*:*",
+ "versionEndExcluding": "4.9.4",
+ "matchCriteriaId": "059796E1-4115-416D-9808-AC78F6EEB3FC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://addons.prestashop.com/fr/declinaisons-personnalisation/20343-configurateur-avance-de-produit-sur-mesure-par-etape.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://security.friendsofpresta.org/modules/2023/10/19/configurator.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4386.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4386.json
new file mode 100644
index 00000000000..d350e73662e
--- /dev/null
+++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4386.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-4386",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.340",
+ "lastModified": "2023-10-26T17:48:51.200",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.2.0 via deserialization of untrusted input in the get_posts function. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Essential Blocks para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en versiones hasta la 4.2.0 incluida a trav\u00e9s de la deserializaci\u00f3n de entradas que no son de confianza en la funci\u00f3n get_posts. Esto permite a atacantes no autenticados inyectar un objeto PHP. No hay ninguna cadena POP presente en el complemento vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "4.2.0",
+ "matchCriteriaId": "C5FAC734-09BC-4D92-BD13-485E799B312C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/essential-blocks/trunk/includes/API/PostBlock.php?rev=2950425#L30",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af468f83-d6ad-474c-bf7f-c4eeb6df1b54?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4388.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4388.json
index 78a8ae7f301..43bed8adb76 100644
--- a/CVE-2023/CVE-2023-43xx/CVE-2023-4388.json
+++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4388.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4388",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:15.663",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T16:23:10.920",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento EventON de WordPress anterior a 2.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting almacenados incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.2",
+ "matchCriteriaId": "B74ABCE3-9C39-44B9-83BB-BF992C57F5AA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/4086b62c-c527-4721-af63-7f2687c98648",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4399.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4399.json
index fe94b160caf..ef321722d20 100644
--- a/CVE-2023/CVE-2023-43xx/CVE-2023-4399.json
+++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4399.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4399",
"sourceIdentifier": "security@grafana.com",
"published": "2023-10-17T08:15:09.553",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T15:00:53.650",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ },
{
"source": "security@grafana.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "security@grafana.com",
"type": "Secondary",
@@ -50,10 +80,53 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "9.4.0",
+ "versionEndExcluding": "9.4.17",
+ "matchCriteriaId": "63D6BD69-0021-4425-815E-BCC6DC6A844D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "9.5.0",
+ "versionEndExcluding": "9.5.13",
+ "matchCriteriaId": "AE835FB5-83A3-4657-AE71-A6F42A0C6680"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "10.0.0",
+ "versionEndExcluding": "10.0.9",
+ "matchCriteriaId": "DC6EC05D-A16B-4DBD-9D2C-B63C5DE3B31E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "10.1.0",
+ "versionEndExcluding": "10.1.5",
+ "matchCriteriaId": "4984FF92-7D1B-4A1A-9C2B-79E052CC8483"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://grafana.com/security/security-advisories/cve-2023-4399/",
- "source": "security@grafana.com"
+ "source": "security@grafana.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-440xx/CVE-2023-44037.json b/CVE-2023/CVE-2023-440xx/CVE-2023-44037.json
index 4bdc7cf87f3..a517f023a11 100644
--- a/CVE-2023/CVE-2023-440xx/CVE-2023-44037.json
+++ b/CVE-2023/CVE-2023-440xx/CVE-2023-44037.json
@@ -2,19 +2,87 @@
"id": "CVE-2023-44037",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-14T05:15:55.267",
- "lastModified": "2023-10-14T17:32:33.483",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:41:28.530",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue in ZPE Systems, Inc Nodegrid OS v.5.8.10 thru v.5.8.13 and v.5.10.3 thru v.5.10.5 allows a remote attacker to obtain sensitive information via the TACACS+ server component."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en ZPE Systems, Inc Nodegrid OS v.5.8.10 hasta v.5.8.13 y v.5.10.3 hasta v.5.10.5 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente del servidor TACACS+."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-312"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:zpesystems:nodegrid_os:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.8.10",
+ "versionEndExcluding": "5.8.14",
+ "matchCriteriaId": "57D2EF6A-C017-4F73-8974-79013A9BE54E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:zpesystems:nodegrid_os:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "5.10.3",
+ "versionEndExcluding": "5.10.6",
+ "matchCriteriaId": "74A875A6-BA5E-4593-A2F2-EB247B9EBF31"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://psirt.zpesystems.com/portal/en/kb/articles/security-advisory-zpe-ng-2023-002",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-440xx/CVE-2023-44094.json b/CVE-2023/CVE-2023-440xx/CVE-2023-44094.json
index f844976bd7e..97fe87308f5 100644
--- a/CVE-2023/CVE-2023-440xx/CVE-2023-44094.json
+++ b/CVE-2023/CVE-2023-440xx/CVE-2023-44094.json
@@ -2,16 +2,53 @@
"id": "CVE-2023-44094",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T11:15:13.577",
- "lastModified": "2023-10-11T12:54:05.787",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T20:15:37.950",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de confusi\u00f3n de tipos en el m\u00f3dulo distributed file. La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar que el dispositivo se reinicie."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-843"
+ }
+ ]
+ },
{
"source": "psirt@huawei.com",
"type": "Secondary",
@@ -23,14 +60,87 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AD62E8B-CB4B-43A6-98E8-09A8A1A3505B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "64118936-E2A5-4935-8594-29DF29B5475A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "81995662-9C41-4E88-888D-C50703F858F8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2DF07E7F-3A18-4B74-B73D-DF3647C2A48F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-440xx/CVE-2023-44095.json b/CVE-2023/CVE-2023-440xx/CVE-2023-44095.json
index 58473870967..0ebbfbf5ca8 100644
--- a/CVE-2023/CVE-2023-440xx/CVE-2023-44095.json
+++ b/CVE-2023/CVE-2023-440xx/CVE-2023-44095.json
@@ -2,16 +2,53 @@
"id": "CVE-2023-44095",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T12:15:11.070",
- "lastModified": "2023-10-11T12:54:05.787",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:56:03.400",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad Use-After-Free (UAF) en el m\u00f3dulo Surfaceflinger. La explotaci\u00f3n exitosa de esta vulnerabilidad puede provocar una falla del sistema."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ },
{
"source": "psirt@huawei.com",
"type": "Secondary",
@@ -23,14 +60,57 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2DF07E7F-3A18-4B74-B73D-DF3647C2A48F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "64118936-E2A5-4935-8594-29DF29B5475A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/10/",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540",
- "source": "psirt@huawei.com"
+ "source": "psirt@huawei.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44154.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44154.json
index 22fabbfa215..693e5a585da 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44154.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44154.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-44154",
"sourceIdentifier": "security@acronis.com",
"published": "2023-09-27T15:19:37.650",
- "lastModified": "2023-09-28T09:15:12.857",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T20:08:48.693",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979."
+ },
+ {
+ "lang": "es",
+ "value": "Divulgaci\u00f3n y manipulaci\u00f3n de informaci\u00f3n sensible por autorizaci\u00f3n indebida. Los siguientes productos se ven afectados: Acronis Cyber Protect 15 (Linux, Windows) antes de la build 35979."
}
],
"metrics": {
@@ -17,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "NONE",
+ "privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
- "baseScore": 9.1,
- "baseSeverity": "CRITICAL"
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
},
- "exploitabilityScore": 3.9,
+ "exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
@@ -63,7 +67,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-863"
+ "value": "CWE-639"
}
]
},
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44162.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44162.json
new file mode 100644
index 00000000000..bb000c8dbe5
--- /dev/null
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44162.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-44162",
+ "sourceIdentifier": "help@fluidattacks.com",
+ "published": "2023-10-27T03:15:08.040",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'contact' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Online Art Gallery v1.0 es vulnerable a m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL no autenticada. El par\u00e1metro 'contact' del recurso header.php no valida los caracteres recibidos y se env\u00edan sin filtrar a la base de datos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://fluidattacks.com/advisories/ono",
+ "source": "help@fluidattacks.com"
+ },
+ {
+ "url": "https://https://projectworlds.in/",
+ "source": "help@fluidattacks.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44175.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44175.json
index 948c34d3ebf..a6507fbbc92 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44175.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44175.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44175",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-12T23:15:11.307",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:47:15.987",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nA Reachable Assertion vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows to send specific genuine PIM packets to the device resulting in rpd to crash causing a Denial of Service (DoS).\n\nContinued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nNote: This issue is not noticed when all the devices in the network are Juniper devices.\n\nThis issue affects Juniper Networks:\n\nJunos OS:\n\n\n\n * All versions prior to 20.4R3-S7;\n * 21.2 versions prior to 21.2R3-S5;\n * 21.3 versions prior to 21.3R3-S4;\n * 21.4 versions prior to 21.4R3-S4;\n * 22.1 versions prior to 22.1R3-S4;\n * 22.2 versions prior to 22.2R3;\n * 22.3 versions prior to 22.3R3;\n * 22.4 versions prior to 22.4R3.\n\n\n\n\nJunos OS Evolved:\n\n\n\n * All versions prior to 22.3R3-EVO;\n * 22.4-EVO versions prior to 22.4R3-EVO;\n * 23.2-EVO versions prior to 23.2R1-EVO.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de aserci\u00f3n accesible en Routing Protocol Daemon (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite enviar paquetes PIM genuinos espec\u00edficos al dispositivo, lo que provoca que rpd falle y provoque una Denegaci\u00f3n de Servicio (DoS). La recepci\u00f3n y procesamiento continuo de este paquete crear\u00e1 una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). Nota: Este problema no se detecta cuando todos los dispositivos de la red son dispositivos Juniper. Este problema afecta a Juniper Networks: Junos OS: * Todas las versiones anteriores a 20.4R3-S7; * Versiones 21.2 anteriores a 21.2R3-S5; * Versiones 21.3 anteriores a 21.3R3-S4; * Versiones 21.4 anteriores a 21.4R3-S4; * Versiones 22.1 anteriores a 22.1R3-S4; * Versiones 22.2 anteriores a 22.2R3; * Versiones 22.3 anteriores a 22.3R3; * Versiones 22.4 anteriores a 22.4R3. Junos OS Evolved: * Todas las versiones anteriores a 22.3R3-EVO; * Versiones 22.4-EVO anteriores a 22.4R3-EVO; * Versiones 23.2-EVO anteriores a 23.2R1-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-617"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,461 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73141",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44176.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44176.json
index 287c5250514..2721452be39 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44176.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44176.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44176",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.587",
- "lastModified": "2023-10-13T12:47:29.080",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T16:01:28.823",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nA Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service.\n\nRepeated actions by the attacker will create a sustained Denial of Service (DoS) condition.\n\nThis issue affects Juniper Networks:\n\nJunos OS:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions prior to 21.3R3-S5;\n * 22.1 versions prior to 22.1R3-S3;\n * 22.3 versions prior to 22.3R3;\n * 22.4 versions prior to 22.4R3.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en el comando CLI de Juniper Networks Junos OS permite a un atacante con pocos privilegios ejecutar comandos CLI espec\u00edficos que conducen a una Denegaci\u00f3n de Servicio. Las acciones repetidas del atacante crear\u00e1n una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). Este problema afecta a Juniper Networks: Junos OS: * Todas las versiones anteriores a 20.4R3-S8; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 22.1 anteriores a 22.1R3-S3; * Versiones 22.3 anteriores a 22.3R3; * Versiones 22.4 anteriores a 22.4R3."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -50,10 +84,787 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "5BDD5111-1BC2-456B-8A31-F2D252DF613C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "89B9BF7C-525C-4819-B80D-9B5F240F9878"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73140",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44177.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44177.json
index e17b9824839..5b6cbcd79c9 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44177.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44177.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44177",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.680",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:12:39.457",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nA Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos and Junos EVO allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service.\n\nRepeated actions by the attacker will create a sustained Denial of Service (DoS) condition.\n\nThis issue affects Juniper Networks:\n\nJunos OS:\n\n\n\n * All versions prior to 19.1R3-S10;\n * 19.2 versions prior to 19.2R3-S7;\n * 19.3 versions prior to 19.3R3-S8;\n * 19.4 versions prior to 19.4R3-S12;\n * 20.2 versions prior to 20.2R3-S8;\n * 20.4 versions prior to 20.4R3-S8;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S4;\n * 22.1 versions prior to 22.1R3-S3;\n * 22.2 versions prior to 22.2R3-S1;\n * 22.3 versions prior to 22.3R3;\n * 22.4 versions prior to 22.4R2.\n\n\n\n\nJunos OS Evolved:\n\n\n\n * All versions prior to 20.4R3-S8-EVO;\n * 21.2 versions prior to 21.2R3-S6-EVO;\n * 21.3 versions prior to 21.3R3-S5-EVO;\n * 21.4 versions prior to 21.4R3-S4-EVO;\n * 22.1 versions prior to 22.1R3-S3-EVO;\n * 22.2 versions prior to 22.2R3-S1-EVO;\n * 22.3 versions prior to 22.3R3-EVO;\n * 22.4 versions prior to 22.4R2-EVO.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en el comando CLI de Juniper Networks Junos y Junos EVO permite a un atacante con pocos privilegios ejecutar comandos CLI espec\u00edficos que conducen a una Denegaci\u00f3n de Servicio. Las acciones repetidas del atacante crear\u00e1n una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). Este problema afecta a Juniper Networks: Junos OS: * Todas las versiones anteriores a 19.1R3-S10; * Versiones 19.2 anteriores a 19.2R3-S7; * Versiones 19.3 anteriores a 19.3R3-S8; * Versiones 19.4 anteriores a 19.4R3-S12; * Versiones 20.2 anteriores a 20.2R3-S8; * Versiones 20.4 anteriores a 20.4R3-S8; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S4; * Versiones 22.1 anteriores a 22.1R3-S3; * Versiones 22.2 anteriores a 22.2R3-S1; * Versiones 22.3 anteriores a 22.3R3; * Versiones 22.4 anteriores a 22.4R2. Junos OS Evolved: * Todas las versiones anteriores a 20.4R3-S8-EVO; * Versiones 21.2 anteriores a 21.2R3-S6-EVO; * Versiones 21.3 anteriores a 21.3R3-S5-EVO; * Versiones 21.4 anteriores a 21.4R3-S4-EVO; * Versiones 22.1 anteriores a 22.1R3-S3-EVO; * Versiones 22.2 anteriores a 22.2R3-S1-EVO; * Versiones 22.3 anteriores a 22.3R3-EVO; * Versiones 22.4 anteriores a 22.4R2-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -50,10 +84,792 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "5BDD5111-1BC2-456B-8A31-F2D252DF613C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "89B9BF7C-525C-4819-B80D-9B5F240F9878"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73140",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44178.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44178.json
index 74b18291919..2eb4c861b24 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44178.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44178.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44178",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.760",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:12:22.540",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nA Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service.\n\nRepeated actions by the attacker will create a sustained Denial of Service (DoS) condition.\n\nThis issue affects Juniper Networks:\n\nJunos OS\n\n\n\n * All versions prior to 19.1R3-S10;\n * 19.2 versions prior to 19.2R3-S7;\n * 19.3 versions prior to 19.3R3-S8;\n * 19.4 versions prior to 19.4R3-S12;\n * 20.2 versions prior to 20.2R3-S8;\n * 20.4 versions prior to 20.4R3-S8;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S5;\n * 22.1 versions prior to 22.1R3-S3;\n * 22.2 versions prior to 22.2R3-S2;\n * 22.3 versions prior to 22.3R3-S1;\n * 22.4 versions prior to 22.4R2-S1;\n * 23.2 versions prior to 23.2R2.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en el comando CLI de Juniper Networks Junos OS permite a un atacante con pocos privilegios ejecutar comandos CLI espec\u00edficos que conducen a una Denegaci\u00f3n de Servicio. Las acciones repetidas del atacante crear\u00e1n una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). Este problema afecta a Juniper Networks: Junos OS * Todas las versiones anteriores a 19.1R3-S10; * Versiones 19.2 anteriores a 19.2R3-S7; * Versiones 19.3 anteriores a 19.3R3-S8; * Versiones 19.4 anteriores a 19.4R3-S12; * Versiones 20.2 anteriores a 20.2R3-S8; * Versiones 20.4 anteriores a 20.4R3-S8; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S5; * Versiones 22.1 anteriores a 22.1R3-S3; * Versiones 22.2 anteriores a 22.2R3-S2; * Versiones 22.3 anteriores a 22.3R3-S1; * Versiones 22.4 anteriores a 22.4R2-S1; * Versiones 23.2 anteriores a 23.2R2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -50,10 +84,792 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "5BDD5111-1BC2-456B-8A31-F2D252DF613C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "89B9BF7C-525C-4819-B80D-9B5F240F9878"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73140",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44181.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44181.json
index b9f9c6e2d43..6dd03f95c07 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44181.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44181.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44181",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.837",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:21:29.827",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improperly Implemented Security Check for Standard vulnerability in storm control of Juniper Networks Junos OS QFX5k devices allows packets to be punted to ARP queue causing a l2 loop resulting in a DDOS violations and DDOS syslog.\n\nThis issue is triggered when Storm control is enabled and ICMPv6 packets are present on device.\n\nThis issue affects Juniper Networks:\n\nJunos OS\n\n\n\n * All versions prior to 20.2R3-S6 on QFX5k;\n * 20.3 versions prior to 20.3R3-S5 on QFX5k;\n * 20.4 versions prior to 20.4R3-S5 on QFX5k;\n * 21.1 versions prior to 21.1R3-S4 on QFX5k;\n * 21.2 versions prior to 21.2R3-S3 on QFX5k;\n * 21.3 versions prior to 21.3R3-S2 on QFX5k;\n * 21.4 versions prior to 21.4R3 on QFX5k;\n * 22.1 versions prior to 22.1R3 on QFX5k;\n * 22.2 versions prior to 22.2R2 on QFX5k.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una verificaci\u00f3n de seguridad implementada incorrectamente para una vulnerabilidad est\u00e1ndar en el control de tormentas de los dispositivos Junos OS QFX5k de Juniper Networks permite que los paquetes se env\u00eden a la cola ARP, lo que provoca un bucle l2 que genera violaciones de DDOS y un registro del sistema DDOS. Este problema se activa cuando el control de tormentas est\u00e1 habilitado y hay paquetes ICMPv6 presentes en el dispositivo. Este problema afecta a Juniper Networks: Junos OS * Todas las versiones anteriores a 20.2R3-S6 en QFX5k; * Versiones 20.3 anteriores a 20.3R3-S5 en QFX5k; * Versiones 20.4 anteriores a 20.4R3-S5 en QFX5k; * Versiones 21.1 anteriores a 21.1R3-S4 en QFX5k; * Versiones 21.2 anteriores a 21.2R3-S3 en QFX5k; * Versiones 21.3 anteriores a 21.3R3-S2 en QFX5k; * Versiones 21.4 anteriores a 21.4R3 en QFX5k; * Versiones 22.1 anteriores a 22.1R3 en QFX5k; * Versiones 22.2 anteriores a 22.2R2 en QFX5k."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -34,14 +58,512 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-835"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.2",
+ "matchCriteriaId": "9D5DC3ED-1843-467F-903D-2DB6CDFF06F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "D4CF52CF-F911-4615-9171-42F84429149F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "18DB9401-5A51-4BB3-AC2F-58F58F1C788C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "06F53DA5-59AE-403C-9B1E-41CE267D8BB1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "3332262F-81DA-4D78-99C9-514CADA46611"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B46B63A2-1518-4A29-940C-F05624C9658D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "8E0D4959-3865-42A7-98CD-1103EBD84528"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "681AE183-7183-46E7-82EA-28C398FA1C3D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0A80F23B-CD13-4745-BA92-67C23B297A18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "67D4004B-1233-4258-9C7A-F05189146B44"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "69E33F24-D480-4B5F-956D-D435A551CBE7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "6E5E3FDB-3F33-4686-9B64-0152AD41939D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "03009CC1-21AC-4A46-A747-D0C67FCD41DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5C9BC697-C7C9-447D-9EBD-E9711462583E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7B80433B-57B1-49EF-B1A1-83781D6102E3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "A352BB7A-6F17-4E64-BC02-1A7E4CD42653"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "05D8427C-CDDE-4B2F-9CB8-41B9137660E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F3DC01F2-6DFE-4A8E-9962-5E59AA965935"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "7DA0E196-925E-4056-B411-E158702D5D4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E33A522F-E35C-4473-9CBD-9C6E5A831086"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E9AE26EB-699B-4B10-87E2-9E731B820F32"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "A29E0070-47E9-43DD-9303-C732FE8CC851"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86C7E154-9273-4FB0-BF75-BD2BD79F457D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5120:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32D0AE1E-12D6-4B91-A8B8-C3A451F58F45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7F920B8-83D2-478E-8F97-163D924F5021"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67B037F5-8C56-453B-8CE2-D7D3AEF5D467"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5210:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6329B6E-83D8-4F53-A204-9F53042DFAA7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5220:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "945B38BD-F339-48F9-B033-FBCDF62E73B5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B0CAA01-194D-4E89-BA95-226787517F78"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84F42D80-6D50-4136-9988-E9231BB59EA3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73145",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.juniper.net/documentation/us/en/software/junos/security-services/topics/task/rate-limiting-storm-control-disabling-cli-els.html",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Technical Description"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44182.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44182.json
index 47d99649874..7b81a0243a6 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44182.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44182.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44182",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.900",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:19:50.967",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Unchecked Return Value vulnerability in the user interfaces to the Juniper Networks Junos OS and Junos OS Evolved, the CLI, the XML API, the XML Management Protocol, the NETCONF Management Protocol, the gNMI interfaces, and the J-Web User Interfaces causes unintended effects such as demotion or elevation of privileges associated with an operators actions to occur.\n\nMultiple scenarios may occur; for example: privilege escalation over the device or another account, access to files that should not otherwise be accessible, files not being accessible where they should be accessible, code expected to run as non-root may run as root, and so forth.\n\nThis issue affects:\n\nJuniper Networks Junos OS\n\n\n\n * All versions prior to 20.4R3-S7;\n * 21.1 versions prior to 21.1R3-S5;\n * 21.2 versions prior to 21.2R3-S5;\n * 21.3 versions prior to 21.3R3-S4;\n * 21.4 versions prior to 21.4R3-S3;\n * 22.1 versions prior to 22.1R3-S2;\n * 22.2 versions prior to 22.2R2-S2, 22.2R3;\n * 22.3 versions prior to 22.3R1-S2, 22.3R2.\n\n\n\n\nJuniper Networks Junos OS Evolved\n\n\n\n * All versions prior to 21.4R3-S3-EVO;\n * 22.1-EVO version 22.1R1-EVO and later versions prior to 22.2R2-S2-EVO, 22.2R3-EVO;\n * 22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de valor de retorno no verificado en las interfaces de usuario de Juniper Networks Junos OS y Junos OS Evolved, el CLI, la API XML, el protocolo de administraci\u00f3n XML, el protocolo de administraci\u00f3n NETCONF, las interfaces gNMI y las interfaces de usuario J-Web provoca causas no deseadas. Se producir\u00e1n efectos tales como degradaci\u00f3n o elevaci\u00f3n de privilegios asociados con las acciones de un operador. Pueden ocurrir m\u00faltiples escenarios; por ejemplo: escalada de privilegios sobre el dispositivo u otra cuenta, acceso a archivos que de otro modo no deber\u00edan ser accesibles, archivos que no son accesibles donde deber\u00edan serlo, c\u00f3digo que se espera que se ejecute como no root puede ejecutarse como root, etc. Este problema afecta a: Juniper Networks Junos OS * Todas las versiones anteriores a 20.4R3-S7; * Versiones 21.1 anteriores a 21.1R3-S5; * Versiones 21.2 anteriores a 21.2R3-S5; * Versiones 21.3 anteriores a 21.3R3-S4; * Versiones 21.4 anteriores a 21.4R3-S3; * Versiones 22.1 anteriores a 22.1R3-S2; * Versiones 22.2 anteriores a 22.2R2-S2, 22.2R3; * Versiones 22.3 anteriores a 22.3R1-S2, 22.3R2. Juniper Networks Junos OS Evolved * Todas las versiones anteriores a 21.4R3-S3-EVO; * 22.1-EVO versi\u00f3n 22.1R1-EVO y versiones posteriores anteriores a 22.2R2-S2-EVO, 22.2R3-EVO; * Versiones 22.3-EVO anteriores a 22.3R1-S2-EVO, 22.3R2-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-252"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,18 +80,551 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "21.4",
+ "matchCriteriaId": "A51696D6-8503-4CBD-AD19-861E5BE94ED4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73149",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.juniper.net/documentation/en_US/junos/topics/concept/junos-software-user-interfaces-overview.html",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Technical Description"
+ ]
},
{
"url": "https://www.juniper.net/documentation/us/en/software/junos/interfaces-telemetry/topics/concept/junos-telemetry-interface-grpc-sensors.html",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Technical Description"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44183.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44183.json
index 0c518ef1feb..d92910ea9f0 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44183.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44183.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44183",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:11.983",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:23:35.583",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Input Validation vulnerability in the VxLAN packet forwarding engine (PFE) of Juniper Networks Junos OS on QFX5000 Series, EX4600 Series devices allows an unauthenticated, adjacent attacker, sending two or more genuine packets in the same VxLAN topology to possibly cause a DMA memory leak to occur under various specific operational conditions. The scenario described here is the worst-case scenario. There are other scenarios that require operator action to occur.\n\nAn indicator of compromise may be seen when multiple devices indicate that FPC0 has gone missing when issuing a show chassis fpc command for about 10 to 20 minutes, and a number of interfaces have also gone missing.\n\nUse the following command to determine if FPC0 has gone missing from the device.\n\nshow chassis fpc detail\nThis issue affects:\n\nJuniper Networks Junos OS on QFX5000 Series, EX4600 Series:\n\n\n\n * 18.4 version 18.4R2 and later versions prior to 20.4R3-S8;\n * 21.1 version 21.1R1 and later versions prior to 21.2R3-S6;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S4;\n * 22.1 versions prior to 22.1R3-S3;\n * 22.2 versions prior to 22.2R3-S1;\n * 22.3 versions prior to 22.3R2-S2, 22.3R3;\n * 22.4 versions prior to 22.4R2.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Packet Forwarding Engine (PFE) VxLAN de Juniper Networks Junos OS en dispositivos de las series QFX5000 y EX4600 permite que un atacante adyacente no autenticado env\u00ede dos o m\u00e1s paquetes genuinos en la misma topolog\u00eda VxLAN para causar posiblemente una memoria DMA que se produzca una fuga en diversas condiciones operativas espec\u00edficas. El escenario descrito aqu\u00ed es el peor de los casos. Hay otros escenarios que requieren la acci\u00f3n del operador. Se puede ver un indicador de compromiso cuando varios dispositivos indican que FPC0 ha desaparecido al emitir un comando show chasis fpc durante aproximadamente 10 a 20 minutos, y tambi\u00e9n han desaparecido varias interfaces. Utilice el siguiente comando para determinar si FPC0 ha desaparecido del dispositivo. muestre el detalle del fpc del chasis Este problema afecta a: Juniper Networks Junos OS en las series QFX5000 y EX4600: * 18.4 versi\u00f3n 18.4R2 y versiones posteriores anteriores a 20.4R3-S8; * 21.1 versi\u00f3n 21.1R1 y versiones posteriores anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S4; * Versiones 22.1 anteriores a 22.1R3-S3; * Versiones 22.2 anteriores a 22.2R3-S1; * Versiones 22.3 anteriores a 22.3R2-S2, 22.3R3; * Versiones 22.4 anteriores a 22.4R2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-401"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,18 +80,1296 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "D59D7A31-128B-4034-862B-8EF3CE3EE949"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0C5E097B-B79E-4E6A-9291-C8CB9674FED5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2-s10:*:*:*:*:*:*",
+ "matchCriteriaId": "F34512E2-7493-4EA2-8DA3-7A551514DF86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "819FA3ED-F934-4B20-BC0E-D638ACCB7787"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "3D7D773A-4988-4D7C-A105-1885EBE14426"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "1BD93674-9375-493E-BD6C-8AD41CC75DD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "34E28FD9-1089-42F7-8586-876DBEC965DE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "B7E72C49-1849-4A6F-81BC-D03F06D47D6D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "541535BD-20DC-4489-91A7-F6CBC6802352"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
+ "matchCriteriaId": "924C4EAC-2A52-45A9-BE0F-B62F070C3E3D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r2-s9:*:*:*:*:*:*",
+ "matchCriteriaId": "2073B497-CCE0-4819-9B0A-E80E577BF13E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "736B7A9F-E237-45AF-A6D6-84412475F481"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62E63730-F697-4FE6-936B-FD9B4F22EAE8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s10:*:*:*:*:*:*",
+ "matchCriteriaId": "6DCA0ADF-CC93-4369-95E5-B41D7301C58F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s11:*:*:*:*:*:*",
+ "matchCriteriaId": "9CCA5292-4722-4FE1-8070-2CBA666F160A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "064A7052-4EF5-4BFB-88FF-8122AEECB6A7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "08C58CCB-3BAA-4400-B371-556DF46DE69C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "28F7740D-C636-4FA3-8479-E5E039041DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "81F6DEA3-F07E-4FD0-87CB-4E8C0B768706"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "2C1601BB-CAB7-4C92-8416-1824BB85D820"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "14FC491D-8DA8-4E79-A9A6-3629E41C847A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
+ "matchCriteriaId": "44C4BE2C-814F-49AA-8B64-17245FC01270"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:18.4:r3-s9:*:*:*:*:*:*",
+ "matchCriteriaId": "BEF1775A-1C37-462B-B9F8-F55E0CEB73B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "768C0EB7-8456-4BF4-8598-3401A54D21DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5332B70A-F6B0-4C3B-90E2-5CBFB3326126"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81439FE8-5405-45C2-BC04-9823D2009A77"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E506138D-043E-485D-B485-94A2AB75F8E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0EF3C901-3599-463F-BEFB-8858768DC195"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "CD806778-A995-4A9B-9C05-F4D7B1CB1F7D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "02B42BE8-1EF2-47F7-9F10-DE486A017EED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "0B372356-D146-420B-95C3-381D0383B595"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DCAB79C9-6639-4ED0-BEC9-E7C8229DF977"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "C8CF858F-84BB-4AEA-B829-FCF22C326160"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "92292C23-DC38-42F1-97C1-8416BBB60FA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "59E2311C-075A-4C64-B614-728A21B17B1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "5405F361-AB96-4477-AA0D-49B874324B39"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E45E5421-2F6F-4AF9-8EB1-431A804FC649"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "93098975-4A06-4A72-8DF0-F2C5E1AF2F77"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E1F3AEE4-CEB8-4CAA-A48A-1B4647FFFCDB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "69E2DF80-63D8-48DD-BC73-C406B7AA3C7D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "8120EAC3-DCCB-4429-A372-C0DAA3270A1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "DF81F459-915E-468C-8E82-85F1A601095B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "9912E998-75FB-4EA0-8E36-0A1C38147AB8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r3-s8:*:*:*:*:*:*",
+ "matchCriteriaId": "C7AE90D0-D502-4262-A83E-F40308A81380"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.1:r3-s9:*:*:*:*:*:*",
+ "matchCriteriaId": "739E4B74-5769-4392-BAFE-39770B021859"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "0E7545CE-6300-4E81-B5AF-2BE150C1B190"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4CA3060F-1800-4A06-A453-FB8CE4B65312"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9A5B337A-727C-4767-AD7B-E0F7F99EB46F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "16FDE60B-7A99-4683-BC14-530B5B005F8B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "725D8C27-E4F8-4394-B4EC-B49B6D3C2709"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "8233C3AB-470E-4D13-9BFD-C9E90918FD0B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "5F7A233A-D4F6-46FA-92E9-2ACE13E4A6A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "ADCE4EA8-DDBA-4766-BB81-E4DA29723723"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r1-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "2849078A-447A-4615-94E1-58AF450ED22A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r1-s8:*:*:*:*:*:*",
+ "matchCriteriaId": "C2C625B6-25ED-4F6C-A778-6AB7FA7901CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r1-s9:*:*:*:*:*:*",
+ "matchCriteriaId": "84EC3EE0-F1D9-4CBB-B3FA-83C05C50EB5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7C71D2FA-B1A4-4004-807F-7B3BB347DF4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9E78E854-DDD3-4D1A-97AB-AEA70B9B811F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "512FB3D1-BA5B-4F73-BDB2-49D6889F5473"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7FCBFF57-83A1-4C1C-A38D-7DAB48BCA2EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "920FE638-BDE6-403D-9083-2BDBF6A3326F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E38CD1E2-41F5-42D1-B915-055A497C576A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "0C816B9A-F152-4E5F-8152-73635840A89A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "6E0EA9DA-2DAD-4FA4-8CCC-E2F3D7069305"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "F56182CE-376A-4B77-BB53-1E988842AEC5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.2:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "E5E449DB-9907-406F-B758-5E6377F2F28A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "59006503-B2CA-4F79-AC13-7C5615A74CE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "B8110DA9-54B1-43CF-AACB-76EABE0C9EF6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "11B5CC5A-1959-4113-BFCF-E4BA63D918C1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "AF24ACBD-5F84-47B2-BFF3-E9A56666269C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3935A586-41BD-4FA5-9596-DED6F0864777"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "B83FB539-BD7C-4BEE-9022-098F73902F38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "7659AC36-A5EA-468A-9793-C1EC914D36F4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "E0E018E1-568E-40F2-ADA5-F71509811879"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "122B09A3-299A-421C-9A6B-B3FEED8E19FA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "55F3E730-83F2-43C2-B6DC-77BAABB2F01D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B9295AF3-A883-47C3-BAF8-3D82F719733E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F09D3262-394A-43D1-A4ED-8887FCB20F87"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D3FEA876-302D-4F07-94E6-237C669538F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "B011854A-932C-4D5C-B469-71F72608DFCB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "94A44054-B47B-453C-BF0F-9E071EFF6542"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "CA3A4806-59AB-43D6-BFE3-A6DCE098335C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "45DA4D89-1362-421F-8218-585CE5D60E81"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "EEA350A8-9441-496C-A86C-0D209190A178"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s8:*:*:*:*:*:*",
+ "matchCriteriaId": "3ACBED3C-B186-4FCB-8731-17B44128192B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "9B342307-98CF-45C9-9F08-5EB06C679B79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "DC743EE4-8833-452A-94DB-655BF139F883"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "FE96A8EA-FFE3-4D8F-9266-21899149D634"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C12A75C6-2D00-4202-B861-00FF71585FA0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "70FF3DD4-14CB-435D-8529-0480EB853F60"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "84429093-AB3C-4C05-B8FA-87D94091820F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "4DCFA774-96EF-4018-82CF-95C807025C24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "76022948-4B07-43CB-824C-44E1AB3537CB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "25446F60-5CB9-4923-BCE8-609AE3CFDFBC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "760E2418-B945-4467-BDAC-7702DDF4C4EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "98097AB6-56CB-42E4-96B4-ABBD4F36553C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "7844B380-7986-4B71-B1AE-22D46E5007D1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "7EF24AFC-D359-4132-A133-1F6680F7BE46"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "758275F3-9457-45A2-8F57-65DCD659FC1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B46CB928-78B5-4D60-B747-9A0988C7060D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s10:*:*:*:*:*:*",
+ "matchCriteriaId": "7F449CD5-9D3D-4D99-8A6F-8C7946A4F2D0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s11:*:*:*:*:*:*",
+ "matchCriteriaId": "D85FF739-F299-479A-82F1-DB6788F3D4DE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s12:*:*:*:*:*:*",
+ "matchCriteriaId": "326872CD-EC68-4AC2-8EA2-8B8B20520AA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0886EFA6-47E3-4C1D-A278-D3891A487FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "A209EE6F-E676-4172-8FF3-4E03748DEB13"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "EC395200-9A69-468A-8461-D2219B34AA0E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "08584FCD-4593-4590-A988-C862295E618A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*",
+ "matchCriteriaId": "E69B0ED4-898D-4D7A-9711-8DB00EE3197B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s9:*:*:*:*:*:*",
+ "matchCriteriaId": "1BBF56BB-939A-4E38-BD9E-E3198E70F8E3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "19EAC3C9-D800-436F-8FEA-8BDFB5A9BD24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8328FDE6-9707-4142-B905-3B07C0E28E35"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41CD982F-E6F2-4951-9F96-A76C142DF08E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "19FDC05F-5582-4F7E-B628-E58A3C0E7F2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "401306D1-E9CE-49C6-8DC9-0E8747B9DC2C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "615EAF48-AD53-4CC2-B233-5EA5C0F72CB1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DC8E7547-6649-436D-BC45-184417680C72"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "D9789FF8-D55C-4AF9-A250-E543A0EB826F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5C238EB1-5A38-4877-8849-4A6D36918B3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "C21638A9-6AD8-4347-AA3F-64BC7BD71C0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "D621DB7F-BC6B-4A07-8803-596B3ED11CF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "A5620596-4DEE-41D7-A63F-224D814DAA77"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "A8BBCEC0-5915-4F69-90FD-070A94145BB9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "D3C93B13-DCEB-4861-87DC-3F1ECBAF7FFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.1:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "5887B680-E5A4-4A30-9543-69B42F50E8D7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "D4CF52CF-F911-4615-9171-42F84429149F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "18DB9401-5A51-4BB3-AC2F-58F58F1C788C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "06F53DA5-59AE-403C-9B1E-41CE267D8BB1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "3332262F-81DA-4D78-99C9-514CADA46611"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B46B63A2-1518-4A29-940C-F05624C9658D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "8E0D4959-3865-42A7-98CD-1103EBD84528"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "681AE183-7183-46E7-82EA-28C398FA1C3D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0A80F23B-CD13-4745-BA92-67C23B297A18"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "67D4004B-1233-4258-9C7A-F05189146B44"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "69E33F24-D480-4B5F-956D-D435A551CBE7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "6E5E3FDB-3F33-4686-9B64-0152AD41939D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "9C411A2E-A407-44E5-A2B2-3D049FB2DB4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "AA7259B5-6BDC-4CB8-AB81-2375803E42E3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s8:*:*:*:*:*:*",
+ "matchCriteriaId": "80594A3B-4C88-44F0-8D89-4976F3B9FA95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "03009CC1-21AC-4A46-A747-D0C67FCD41DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5C9BC697-C7C9-447D-9EBD-E9711462583E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7B80433B-57B1-49EF-B1A1-83781D6102E3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "A352BB7A-6F17-4E64-BC02-1A7E4CD42653"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "05D8427C-CDDE-4B2F-9CB8-41B9137660E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F3DC01F2-6DFE-4A8E-9962-5E59AA965935"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "7DA0E196-925E-4056-B411-E158702D5D4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E33A522F-E35C-4473-9CBD-9C6E5A831086"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E9AE26EB-699B-4B10-87E2-9E731B820F32"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "A29E0070-47E9-43DD-9303-C732FE8CC851"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "7B798133-105C-448B-B06E-57327E44E478"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "D0D7DB4B-683B-408B-8055-2C992CA43FFE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1BB20B5-EA30-4E8E-9055-2E629648436A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B425BB1-3C78-42B1-A6C1-216E514191F0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86C7E154-9273-4FB0-BF75-BD2BD79F457D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5120:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32D0AE1E-12D6-4B91-A8B8-C3A451F58F45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7F920B8-83D2-478E-8F97-163D924F5021"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67B037F5-8C56-453B-8CE2-D7D3AEF5D467"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5210:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6329B6E-83D8-4F53-A204-9F53042DFAA7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5220:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "945B38BD-F339-48F9-B033-FBCDF62E73B5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B0CAA01-194D-4E89-BA95-226787517F78"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84F42D80-6D50-4136-9988-E9231BB59EA3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73148",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.juniper.net/documentation/us/en/software/junos/evpn-vxlan/topics/topic-map/sdn-vxlan.html",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Technical Description"
+ ]
},
{
"url": "https://www.juniper.net/documentation/us/en/software/junos/multicast-l2/topics/topic-map/redundant-trunk-groups.html",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Technical Description"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44184.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44184.json
index 5bbc31bb789..b4e8d7d19b7 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44184.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44184.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44184",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.067",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:23:12.213",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the management daemon (mgd) process of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated low-privileged attacker, by executing a specific command via NETCONF, to cause a CPU Denial of Service to the device's control plane.\n\nThis issue affects:\n\nJuniper Networks Junos OS\n\n\n\n * All versions prior to 20.4R3-S7;\n * 21.2 versions prior to 21.2R3-S5;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S4;\n * 22.1 versions prior to 22.1R3-S2;\n * 22.2 versions prior to 22.2R3;\n * 22.3 versions prior to 22.3R2-S1, 22.3R3;\n * 22.4 versions prior to 22.4R1-S2, 22.4R2.\n\n\n\n\nJuniper Networks Junos OS Evolved\n\n\n\n * All versions prior to 21.4R3-S4-EVO;\n * 22.1 versions prior to 22.1R3-S2-EVO;\n * 22.2 versions prior to 22.2R3-EVO;\n * 22.3 versions prior to 22.3R3-EVO;\n * 22.4 versions prior to 22.4R2-EVO.\n\n\n\n\nAn indicator of compromise can be seen by first determining if the NETCONF client is logged in and fails to log out after a reasonable period of time and secondly reviewing the WCPU percentage for the mgd process by running the following command:\n\nmgd process example:\n\nuser@device-re#> show system processes extensive | match \"mgd|PID\" | except last\nPID USERNAME PRI NICE SIZE RES STATE C TIME WCPU COMMAND\n92476 root 100 0 500M 89024K CPU3 3 57.5H 89.60% mgd <<<<<<<<<<< review the high cpu percentage.\nExample to check for NETCONF activity:\n\nWhile there is no specific command that shows a specific session in use for NETCONF, you can review logs for UI_LOG_EVENT with \"client-mode 'netconf'\"\n\nFor example:\n\nmgd[38121]: UI_LOGIN_EVENT: User 'root' login, class 'super-user' [38121], ssh-connection '10.1.1.1 201 55480 10.1.1.2 22', client-mode 'netconf'\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en el proceso del Management Daemon (mgd) de Juniper Networks Junos OS y Junos OS Evolved permite a un atacante con pocos privilegios autenticado basado en red, ejecutando un comando espec\u00edfico a trav\u00e9s de NETCONF, para provocar una Denegaci\u00f3n de Servicio (DoS) de la CPU en el plano de control del dispositivo. Este problema afecta a: Juniper Networks Junos OS * Todas las versiones anteriores a 20.4R3-S7; * Versiones 21.2 anteriores a 21.2R3-S5; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S4; * Versiones 22.1 anteriores a 22.1R3-S2; * Versiones 22.2 anteriores a 22.2R3; * Versiones 22.3 anteriores a 22.3R2-S1, 22.3R3; * Versiones 22.4 anteriores a 22.4R1-S2, 22.4R2. Juniper Networks Junos OS Evolved * Todas las versiones anteriores a 21.4R3-S4-EVO; * Versiones 22.1 anteriores a 22.1R3-S2-EVO; * Versiones 22.2 anteriores a 22.2R3-EVO; * Versiones 22.3 anteriores a 22.3R3-EVO; * Versiones 22.4 anteriores a 22.4R2-EVO. Se puede ver un indicador de compromiso determinando primero si el cliente NETCONF ha iniciado sesi\u00f3n y no logra cerrar sesi\u00f3n despu\u00e9s de un per\u00edodo de tiempo razonable y, en segundo lugar, revisando el porcentaje de WCPU para el proceso mgd ejecutando el siguiente comando: mgd process example: user@device-re#> show system processes extensive | match \"mgd|PID\" | excepto el \u00faltimo PID USERNAME PRI NICE SIZE RES STATE C TIME WCPU COMMAND 92476 root 100 0 500M 89024K CPU3 3 57.5H 89.60% mgd <<<<<<<<<<< revise el alto porcentaje de CPU. Ejemplo para comprobar la actividad de NETCONF: si bien no existe un comando espec\u00edfico que muestre una sesi\u00f3n espec\u00edfica en uso para NETCONF, puede revisar los registros de UI_LOG_EVENT con \"client-mode 'netconf'\". Por ejemplo: mgd[38121]: UI_LOGIN_EVENT: Usuario 'root' de inicio de sesi\u00f3n, clase 'super-user' [38121], conexi\u00f3n ssh '10.1.1.1 201 55480 10.1.1.2 22', modo cliente 'netconf'"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-119"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,572 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "21.4",
+ "matchCriteriaId": "A51696D6-8503-4CBD-AD19-861E5BE94ED4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73147",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44185.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44185.json
index 51813f55759..6a1b53a6d5b 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44185.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44185.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44185",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.147",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:11:51.280",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Input Validation vulnerability in the routing protocol daemon (rpd) of Juniper Networks allows an attacker to cause a Denial of Service (DoS )to the device upon receiving and processing a specific malformed ISO VPN BGP UPDATE packet.\n\nContinued receipt of this packet will cause a sustained Denial of Service condition.\n\nThis issue affects:\n\n\n\n * Juniper Networks Junos OS:\n * All versions prior to 20.4R3-S6;\n * 21.1 versions prior to 21.1R3-S5;\n * 21.2 versions prior to 21.2R3-S4;\n * 21.3 versions prior to 21.3R3-S3;\n * 21.4 versions prior to 21.4R3-S3;\n * 22.1 versions prior to 22.1R2-S2, 22.1R3;\n * 22.2 versions prior to 22.2R2-S1, 22.2R3;\n * 22.3 versions prior to 22.3R1-S2, 22.3R2.\n\n\n\n\nJuniper Networks Junos OS Evolved:\n\n\n\n * All versions prior to 20.4R3-S6-EVO;\n * 21.1-EVO version 21.1R1-EVO and later versions prior to 21.2R3-S4-EVO;\n * 21.3-EVO versions prior to 21.3R3-S3-EVO;\n * 21.4-EVO versions prior to 21.4R3-S3-EVO;\n * 22.1-EVO versions prior to 22.1R3-EVO;\n * 22.2-EVO versions prior to 22.2R2-S1-EVO, 22.2R3-EVO;\n * 22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en el Routing Protocol Daemon (rpd) de Juniper Networks permite a un atacante causar una Denegaci\u00f3n de Servicio (DoS) al dispositivo al recibir y procesar un paquete de ACTUALIZACI\u00d3N BGP de VPN ISO con formato incorrecto espec\u00edfico. La recepci\u00f3n continua de este paquete provocar\u00e1 una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio. Este problema afecta a: * Juniper Networks Junos OS: * Todas las versiones anteriores a 20.4R3-S6; * Versiones 21.1 anteriores a 21.1R3-S5; * Versiones 21.2 anteriores a 21.2R3-S4; * Versiones 21.3 anteriores a 21.3R3-S3; * Versiones 21.4 anteriores a 21.4R3-S3; * Versiones 22.1 anteriores a 22.1R2-S2, 22.1R3; * Versiones 22.2 anteriores a 22.2R2-S1, 22.2R3; * Versiones 22.3 anteriores a 22.3R1-S2, 22.3R2. Juniper Networks Junos OS Evolved: * Todas las versiones anteriores a 20.4R3-S6-EVO; * 21.1-EVO versi\u00f3n 21.1R1-EVO y versiones posteriores anteriores a 21.2R3-S4-EVO; * Versiones 21.3-EVO anteriores a 21.3R3-S3-EVO; * Versiones 21.4-EVO anteriores a 21.4R3-S3-EVO; * Versiones 22.1-EVO anteriores a 22.1R3-EVO; * Versiones 22.2-EVO anteriores a 22.2R2-S1-EVO, 22.2R3-EVO; * Versiones 22.3-EVO anteriores a 22.3R1-S2-EVO, 22.3R2-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,682 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "52C3552E-798F-4719-B38D-F74E34EAAA40"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "AE674DD3-3590-4434-B144-5AD7EB5F039D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0099BDA9-9D4B-4D6C-8234-EFD9E8C63476"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "D8729BC1-FB09-4E6D-A5D5-8BDC589555B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "9D72C3DF-4513-48AC-AAED-C1AADF0794E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8C583289-96C4-4451-A320-14CA1C390819"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA43782E-0719-496E-9237-E1ABD3C4C664"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "78897DD2-E161-4191-94FF-7400FB612DF5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73146",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44186.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44186.json
index 1e98c6397fa..ddd5cc66e94 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44186.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44186.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44186",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-11T21:15:09.890",
- "lastModified": "2023-10-16T21:15:11.033",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:21:41.143",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -11,11 +11,31 @@
},
{
"lang": "es",
- "value": "Una vulnerabilidad de Improper Handling of Exceptional Conditions en el procesamiento AS PATH de Juniper Networks Junos OS y Junos OS Evolved permite a un atacante enviar un mensaje de actualizaci\u00f3n de BGP con un AS PATH que contiene una gran cantidad de AS de 4 bytes, lo que lleva a una Denegaci\u00f3n de Servicio (DoS). La recepci\u00f3n y el procesamiento continuo de estas actualizaciones de BGP crear\u00e1n una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). Este problema se produce cuando el router tiene habilitado el Non-Stop Routing (NSR), tiene un vecino BGP que no es de 4 bytes con capacidad AS, recibe un mensaje de actualizaci\u00f3n de BGP con un prefijo que incluye un AS PATH larga que contiene una gran cantidad de 4 bytes. AS de bytes y tiene que anunciar el prefijo hacia el vecino BGP que no es compatible con AS de 4 bytes. Este problema afecta a: \nJuniper Networks Junos OS: * Todas las versiones anteriores a 20.4R3-S8; * 21.1 versiones 21.1R1 y posteriores; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S5; * Versiones 22.1 anteriores a 22.1R3-S4; * Versiones 22.2 anteriores a 22.2R3-S2; * Versiones 22.3 anteriores a 22.3R2-S2, 22.3R3-S1; * Versiones 22.4 anteriores a 22.4R2-S1, 22.4R3; * Versiones 23.2 anteriores a 23.2R2. \nJuniper Networks Junos OS Evolved * Todas las versiones anteriores a 20.4R3-S8-EVO; * 21.1 versiones 21.1R1-EVO y posteriores; * Versiones 21.2 anteriores a 21.2R3-S6-EVO; * Versiones 21.3 anteriores a 21.3R3-S5-EVO; * Versiones 21.4 anteriores a 21.4R3-S5-EVO; * Versiones 22.1 anteriores a 22.1R3-S4-EVO; * Versiones 22.2 anteriores a 22.2R3-S2-EVO; * Versiones 22.3 anteriores a 22.3R2-S2-EVO, 22.3R3-S1-EVO; * Versiones 22.4 anteriores a 22.4R2-S1-EVO, 22.4R3-EVO; * Versiones 23.2 anteriores a 23.2R2-EVO."
+ "value": "Una vulnerabilidad de Improper Handling of Exceptional Conditions en el procesamiento AS PATH de Juniper Networks Junos OS y Junos OS Evolved permite a un atacante enviar un mensaje de actualizaci\u00f3n de BGP con un AS PATH que contiene una gran cantidad de AS de 4 bytes, lo que lleva a una Denegaci\u00f3n de Servicio ( DoS). La recepci\u00f3n y el procesamiento continuo de estas actualizaciones de BGP crear\u00e1n una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS). Este problema se produce cuando el router tiene habilitado Non-Stop Routing (NSR), tiene un vecino BGP que no es de 4 bytes con capacidad AS, recibe un mensaje de actualizaci\u00f3n de BGP con un prefijo que incluye un AS PATH largo que contiene una gran cantidad de 4 bytes. AS de bytes y tiene que anunciar el prefijo hacia el vecino BGP que no es compatible con AS de 4 bytes.\nNota: NSR no es compatible con la serie SRX y, por lo tanto, no se ve afectado por esta vulnerabilidad. \nEste problema afecta a: \nJuniper Networks Junos OS: * Todas las versiones anteriores a 20.4R3-S8; * 21.1 versiones 21.1R1 y posteriores; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S5; * Versiones 22.1 anteriores a 22.1R3-S4; * Versiones 22.2 anteriores a 22.2R3-S2; * Versiones 22.3 anteriores a 22.3R2-S2, 22.3R3-S1; * Versiones 22.4 anteriores a 22.4R2-S1, 22.4R3; * Versiones 23.2 anteriores a 23.2R2. \nJuniper Networks Junos OS Evolved * Todas las versiones anteriores a 20.4R3-S8-EVO; * 21.1 versiones 21.1R1-EVO y posteriores; * Versiones 21.2 anteriores a 21.2R3-S6-EVO; * Versiones 21.3 anteriores a 21.3R3-S5-EVO; * Versiones 21.4 anteriores a 21.4R3-S5-EVO; * Versiones 22.1 anteriores a 22.1R3-S4-EVO; * Versiones 22.2 anteriores a 22.2R3-S2-EVO; * Versiones 22.3 anteriores a 22.3R2-S2-EVO, 22.3R3-S1-EVO; * Versiones 22.4 anteriores a 22.4R2-S1-EVO, 22.4R3-EVO; * Versiones 23.2 anteriores a 23.2R2-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-755"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -50,10 +80,953 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:23.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "0038F142-6F5E-476D-A1EC-E977FD30F155"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "5BDD5111-1BC2-456B-8A31-F2D252DF613C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "89B9BF7C-525C-4819-B80D-9B5F240F9878"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "52C3552E-798F-4719-B38D-F74E34EAAA40"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "AE674DD3-3590-4434-B144-5AD7EB5F039D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0099BDA9-9D4B-4D6C-8234-EFD9E8C63476"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "D8729BC1-FB09-4E6D-A5D5-8BDC589555B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "9D72C3DF-4513-48AC-AAED-C1AADF0794E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8C583289-96C4-4451-A320-14CA1C390819"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA43782E-0719-496E-9237-E1ABD3C4C664"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "78897DD2-E161-4191-94FF-7400FB612DF5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73150",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Mitigation",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44187.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44187.json
index f4271518915..5616c2edcb6 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44187.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44187.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44187",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-11T21:15:09.970",
- "lastModified": "2023-10-11T22:13:59.567",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:20:48.923",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system.\n\nThis issue affects Juniper Networks Junos OS Evolved:\n * All versions prior to 20.4R3-S7-EVO;\n * 21.1 versions 21.1R1-EVO and later;\n * 21.2 versions prior to 21.2R3-S5-EVO;\n * 21.3 versions prior to 21.3R3-S4-EVO;\n * 21.4 versions prior to 21.4R3-S4-EVO;\n * 22.1 versions prior to 22.1R3-S2-EVO;\n * 22.2 versions prior to 22.2R2-EVO.\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Exposici\u00f3n de Informaci\u00f3n Confidencial en el comando 'file copy' de Junos OS Evolved permite a un atacante local autenticado con acceso al shell ver las contrase\u00f1as proporcionadas en la l\u00ednea de comandos CLI. Estas credenciales se pueden utilizar para proporcionar acceso no autorizado al sistema remoto. Este problema afecta a Juniper Networks Junos OS Evolved: * Todas las versiones anteriores a 20.4R3-S7-EVO; * 21.1 versiones 21.1R1-EVO y posteriores; * Versiones 21.2 anteriores a 21.2R3-S5-EVO; * Versiones 21.3 anteriores a 21.3R3-S4-EVO; * Versiones 21.4 anteriores a 21.4R3-S4-EVO; * Versiones 22.1 anteriores a 22.1R3-S2-EVO; * Versiones 22.2 anteriores a 22.2R2-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,356 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "5BDD5111-1BC2-456B-8A31-F2D252DF613C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "52C3552E-798F-4719-B38D-F74E34EAAA40"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "AE674DD3-3590-4434-B144-5AD7EB5F039D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0099BDA9-9D4B-4D6C-8234-EFD9E8C63476"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "D8729BC1-FB09-4E6D-A5D5-8BDC589555B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "9D72C3DF-4513-48AC-AAED-C1AADF0794E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8C583289-96C4-4451-A320-14CA1C390819"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA43782E-0719-496E-9237-E1ABD3C4C664"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "78897DD2-E161-4191-94FF-7400FB612DF5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73151",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44188.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44188.json
index 601ee90e8a0..91a73c41ba8 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44188.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44188.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44188",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-11T21:15:10.047",
- "lastModified": "2023-10-11T22:13:59.567",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-25T23:15:17.703",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "\nA Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in telemetry processing of Juniper Networks Junos OS allows a network-based authenticated attacker to flood the system with multiple telemetry requests, causing the Junos Kernel Debugging Streaming Daemon (jkdsd) process to crash, leading to a Denial of Service (DoS). Continued receipt and processing of telemetry requests will repeatedly crash the jkdsd process and sustain the Denial of Service (DoS) condition.\n\nThis issue is seen on all Junos platforms. The crash is triggered when multiple telemetry requests come from different collectors. As the load increases, the Dynamic Rendering Daemon (drend) decides to defer processing and continue later, which results in a timing issue accessing stale memory, causing the jkdsd process to crash and restart.\n\nThis issue affects:\n\nJuniper Networks Junos OS:\n\n\n\n * 20.4 versions prior to 20.4R3-S9;\n * 21.1 versions 21.1R1 and later;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S5;\n * 22.1 versions prior to 22.1R3-S4;\n * 22.2 versions prior to 22.2R3-S2;\n * 22.3 versions prior to 22.3R2-S1, 22.3R3-S1;\n * 22.4 versions prior to 22.4R2-S2, 22.4R3;\n * 23.1 versions prior to 23.1R2;\n * 23.2 versions prior to 23.2R2.\n\n\n\n\nThis issue does not affect Juniper Networks Junos OS versions prior to 19.4R1.\n\n\n\n"
+ "value": "\nA Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in telemetry processing of Juniper Networks Junos OS allows a network-based authenticated attacker to flood the system with multiple telemetry requests, causing the Junos Kernel Debugging Streaming Daemon (jkdsd) process to crash, leading to a Denial of Service (DoS). Continued receipt and processing of telemetry requests will repeatedly crash the jkdsd process and sustain the Denial of Service (DoS) condition.\n\nThis issue is seen on all Junos platforms. The crash is triggered when multiple telemetry requests come from different collectors. As the load increases, the Dynamic Rendering Daemon (drend) decides to defer processing and continue later, which results in a timing issue accessing stale memory, causing the jkdsd process to crash and restart.\n\nNote: jkdsd is not shipped with SRX Series devices and therefore are not affected by this vulnerability.\nThis issue affects:\n\nJuniper Networks Junos OS:\n\n\n\n * 20.4 versions prior to 20.4R3-S9;\n * 21.1 versions 21.1R1 and later;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S5;\n * 22.1 versions prior to 22.1R3-S4;\n * 22.2 versions prior to 22.2R3-S2;\n * 22.3 versions prior to 22.3R2-S1, 22.3R3-S1;\n * 22.4 versions prior to 22.4R2-S2, 22.4R3;\n * 23.1 versions prior to 23.1R2;\n * 23.2 versions prior to 23.2R2.\n\n\n\n\nThis issue does not affect Juniper Networks Junos OS versions prior to 19.4R1.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n de Tiempo de Verificaci\u00f3n y Tiempo de Uso (TOCTOU) en el procesamiento de telemetr\u00eda de Juniper Networks Junos OS permite que un atacante autenticado basado en red inunde el sistema con m\u00faltiples solicitudes de telemetr\u00eda, lo que provoca que Junos Kernel Debugging Streaming Daemon (jkdsd ) falle el proceso, lo que provoca una Denegaci\u00f3n de Servicio (DoS). La recepci\u00f3n y el procesamiento continuo de solicitudes de telemetr\u00eda bloquear\u00e1n repetidamente el proceso jkdsd y mantendr\u00e1n la condici\u00f3n de Denegaci\u00f3n de Servicio (DoS). Este problema se observa en todas las plataformas Junos. El bloqueo se desencadena cuando varias solicitudes de telemetr\u00eda provienen de diferentes recopiladores. A medida que aumenta la carga, el Dynamic Rendering Daemon (drend) decide posponer el procesamiento y continuar m\u00e1s tarde, lo que genera un problema de sincronizaci\u00f3n al acceder a la memoria obsoleta, lo que provoca que el proceso jkdsd falle y se reinicie. Nota: jkdsd no se env\u00eda con los dispositivos de la serie SRX y, por lo tanto, no se ve afectado por esta vulnerabilidad. Este problema afecta a: Juniper Networks Junos OS: * Versiones 20.4 anteriores a 20.4R3-S9; * 21.1 versiones 21.1R1 y posteriores; * Versiones 21.2 anteriores a 21.2R3-S6; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S5; * Versiones 22.1 anteriores a 22.1R3-S4; * Versiones 22.2 anteriores a 22.2R3-S2; * Versiones 22.3 anteriores a 22.3R2-S1, 22.3R3-S1; * Versiones 22.4 anteriores a 22.4R2-S2, 22.4R3; * Versiones 23.1 anteriores a 23.1R2; * Versiones 23.2 anteriores a 23.2R2. Este problema no afecta a las versiones de Juniper Networks Junos OS anteriores a 19.4R1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-367"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,507 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionStartExcluding": "19.4",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "509A2868-8A74-4575-8A22-910366B92FAA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*",
+ "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:23.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "0038F142-6F5E-476D-A1EC-E977FD30F155"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73152",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44189.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44189.json
index a199b5857f8..893614fb20f 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44189.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44189.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44189",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-11T22:15:09.983",
- "lastModified": "2023-10-12T12:59:39.183",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:17:54.260",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device.\n\nThis issue affects Juniper Networks Junos OS Evolved on PTX10003 Series:\n\n\n\n * All versions prior to 21.4R3-S4-EVO;\n * 22.1 versions prior to 22.1R3-S3-EVO;\n * 22.2 version 22.2R1-EVO and later versions;\n * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;\n * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO;\n * 23.2 versions prior to 23.2R2-EVO.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de validaci\u00f3n de origen en la validaci\u00f3n de direcciones MAC de Juniper Networks Junos OS Evolved en la serie PTX10003 permite que un atacante adyacente a la red omita la verificaci\u00f3n de direcciones MAC, lo que permite que las direcciones MAC que no est\u00e1n destinadas a llegar a la LAN adyacente se reenv\u00eden a la red descendente. Debido a este problema, el router comenzar\u00e1 a reenviar tr\u00e1fico si hay una ruta v\u00e1lida en la tabla de reenv\u00edo, lo que provocar\u00e1 un bucle y una congesti\u00f3n en el dominio de capa 2 descendente conectado al dispositivo. Este problema afecta a Juniper Networks Junos OS Evolved en la serie PTX10003: * Todas las versiones anteriores a 21.4R3-S4-EVO; * Versiones 22.1 anteriores a 22.1R3-S3-EVO; * 22.2 versi\u00f3n 22.2R1-EVO y versiones posteriores; * Versiones 22.3 anteriores a 22.3R2-S2-EVO, 22.3R3-S1-EVO; * Versiones 22.4 anteriores a 22.4R2-S1-EVO, 22.4R3-EVO; * Versiones 23.2 anteriores a 23.2R2-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-346"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,243 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "21.4",
+ "matchCriteriaId": "A51696D6-8503-4CBD-AD19-861E5BE94ED4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5BD05415-9F94-4EB8-805A-C9C0FFA9D0DF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10003_160c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1E88A41-B158-4A66-9DFD-438931C6BE68"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10003_80c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C97FFB5-8755-474B-ABCF-98DC7659208E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10003_81cd:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FAECB1BF-0F3A-4AD9-AF6B-E54A13D9D804"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73153",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44190.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44190.json
index e26ae83c83a..aac4f7e57f9 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44190.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44190.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44190",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-11T22:15:10.067",
- "lastModified": "2023-10-12T12:59:39.183",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:17:08.740",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device.\n\nThis issue affects Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016:\n\n\n\n * All versions prior to 21.4R3-S5-EVO;\n * 22.1 versions prior to 22.1R3-S4-EVO;\n * 22.2 versions 22.2R1-EVO and later;\n * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;\n * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO;\n * 23.2 versions prior to 23.2R1-S1-EVO, 23.2R2-EVO.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de validaci\u00f3n de origen en la validaci\u00f3n de direcciones MAC de Juniper Networks Junos OS Evolved en dispositivos PTX10001, PTX10004, PTX10008 y PTX10016 permite que un atacante adyacente a la red omita la verificaci\u00f3n de direcciones MAC, lo que permite reenviar direcciones MAC que no est\u00e1n destinadas a llegar a la LAN adyacente a la red descendente. Debido a este problema, el router comenzar\u00e1 a reenviar tr\u00e1fico si hay una ruta v\u00e1lida en la tabla de reenv\u00edo, lo que provocar\u00e1 un bucle y una congesti\u00f3n en el dominio de capa 2 descendente conectado al dispositivo. Este problema afecta a Juniper Networks Junos OS Evolved en PTX10001, PTX10004, PTX10008 y PTX10016: * Todas las versiones anteriores a 21.4R3-S5-EVO; * Versiones 22.1 anteriores a 22.1R3-S4-EVO; * 22.2 versiones 22.2R1-EVO y posteriores; * Versiones 22.3 anteriores a 22.3R2-S2-EVO, 22.3R3-S1-EVO; * Versiones 22.4 anteriores a 22.4R2-S1-EVO, 22.4R3-EVO; * Versiones 23.2 anteriores a 23.2R1-S1-EVO, 23.2R2-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-346"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,253 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "21.4",
+ "matchCriteriaId": "A51696D6-8503-4CBD-AD19-861E5BE94ED4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10001:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6CDCCB33-D428-4D64-977E-71C62F89AE5A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C188428C-0558-44FB-845C-E885DE9A0733"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C432E543-37F5-4CA0-B239-2B97C6A16907"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65A64A26-4606-4D33-8958-5A3B7FFC4CDB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1879799F-18B2-4958-AA90-FD19348C889F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73154",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44191.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44191.json
index f11fa731a45..6e68b86bbc5 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44191.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44191.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44191",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.220",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T13:22:16.003",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).\n\nOn all Junos OS QFX5000 Series and EX4000 Series platforms, when a high number of VLANs are configured, a specific DHCP packet will cause PFE hogging which will lead to dropping of socket connections.\n\nThis issue affects:\n\nJuniper Networks Junos OS on QFX5000 Series and EX4000 Series\n\n\n\n * 21.1 versions prior to 21.1R3-S5;\n * 21.2 versions prior to 21.2R3-S5;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S4;\n * 22.1 versions prior to 22.1R3-S3;\n * 22.2 versions prior to 22.2R3-S1;\n * 22.3 versions prior to 22.3R2-S2, 22.3R3;\n * 22.4 versions prior to 22.4R2.\n\n\n\n\nThis issue does not affect Juniper Networks Junos OS versions prior to 21.1R1\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de asignaci\u00f3n de recursos sin l\u00edmites ni limitaci\u00f3n en Juniper Networks Junos OS permite que un atacante no autenticado basado en la red provoque una Denegaci\u00f3n de Servicio (DoS). En todas las plataformas Junos OS QFX5000 Series y EX4000 Series, cuando se configura una gran cantidad de VLAN, un paquete DHCP espec\u00edfico provocar\u00e1 un acaparamiento de PFE, lo que provocar\u00e1 la ca\u00edda de las conexiones del socket. Este problema afecta a: Juniper Networks Junos OS en las series QFX5000 y EX4000 * versiones 21.1 anteriores a 21.1R3-S5; * Versiones 21.2 anteriores a 21.2R3-S5; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S4; * Versiones 22.1 anteriores a 22.1R3-S3; * Versiones 22.2 anteriores a 22.2R3-S1; * Versiones 22.3 anteriores a 22.3R2-S2, 22.3R3; * Versiones 22.4 anteriores a 22.4R2. Este problema no afecta a las versiones de Juniper Networks Junos OS anteriores a 21.1R1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-770"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,492 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B3302CB-457F-4BD2-B80B-F70FB4C4542E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "979C3597-C53B-4F4B-9EA7-126DA036C86D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300_multigigabit:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "332F4692-7E33-4FB6-9DE2-09E0A0068DB2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47DAF5E7-E610-4D74-8573-41C16D642837"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2521C83-E8F2-4621-9727-75BB3FC11E64"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4100-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F496D19-D28C-4517-90A3-90EC62BC5D79"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4100_multigigabit:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC6E4532-5DD9-45D4-996A-37C7E5742856"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E594D6DC-87F6-40D2-8268-ED6021462168"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4300_multigigabit:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B410BA4-181A-4241-A95E-2238CE1627A3"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4400-24x:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1EEC1C95-E6B2-4364-88AD-C69EC00353FE"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4400_multigigabit:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D77FA1A-4B09-4184-A03E-AE4831C9BBAB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1BB20B5-EA30-4E8E-9055-2E629648436A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B425BB1-3C78-42B1-A6C1-216E514191F0"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D08A8D94-134A-41E7-8396-70D8B0735E9C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CCB1E61-07A1-40B0-B616-F1A6E06D11C4"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86C7E154-9273-4FB0-BF75-BD2BD79F457D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5120:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32D0AE1E-12D6-4B91-A8B8-C3A451F58F45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7F920B8-83D2-478E-8F97-163D924F5021"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67B037F5-8C56-453B-8CE2-D7D3AEF5D467"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5210:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6329B6E-83D8-4F53-A204-9F53042DFAA7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5220:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "945B38BD-F339-48F9-B033-FBCDF62E73B5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B0CAA01-194D-4E89-BA95-226787517F78"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84F42D80-6D50-4136-9988-E9231BB59EA3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73155",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44192.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44192.json
index d8d49711866..818b5cc0c65 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44192.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44192.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44192",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.297",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T13:30:47.390",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Input Validation vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause memory leak, leading to Denial of Service (DoS).\n\nOn all Junos OS QFX5000 Series platforms, when pseudo-VTEP (Virtual Tunnel End Point) is configured under EVPN-VXLAN scenario, and specific DHCP packets are transmitted, DMA memory leak is observed. Continuous receipt of these specific DHCP packets will cause memory leak to reach 99% and then cause the protocols to stop working and traffic is impacted, leading to Denial of Service (DoS) condition. A manual reboot of the system recovers from the memory leak.\n\nTo confirm the memory leak, monitor for \"sheaf:possible leak\" and \"vtep not found\" messages in the logs.\n\nThis issue affects:\n\nJuniper Networks Junos OS QFX5000 Series:\n\n\n\n * All versions prior to 20.4R3-S6;\n * 21.1 versions prior to 21.1R3-S5;\n * 21.2 versions prior to 21.2R3-S5;\n * 21.3 versions prior to 21.3R3-S4;\n * 21.4 versions prior to 21.4R3-S3;\n * 22.1 versions prior to 22.1R3-S2;\n * 22.2 versions prior to 22.2R2-S2, 22.2R3;\n * 22.3 versions prior to 22.3R2-S1, 22.3R3;\n * 22.4 versions prior to 22.4R1-S2, 22.4R2.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de validaci\u00f3n de entrada incorrecta en Packet Forwarding Engine (PFE) de Juniper Networks Junos OS permite que un atacante basado en red no autenticado cause una p\u00e9rdida de memoria, lo que lleva a una Denegaci\u00f3n de Servicio (DoS). En todas las plataformas de la serie Junos OS QFX5000, cuando se configura pseudo-VTEP (Virtual Tunnel End Point) en el escenario EVPN-VXLAN y se transmiten paquetes DHCP espec\u00edficos, se observa una p\u00e9rdida de memoria DMA. La recepci\u00f3n continua de estos paquetes DHCP espec\u00edficos provocar\u00e1 que la p\u00e9rdida de memoria alcance el 99 % y luego har\u00e1 que los protocolos dejen de funcionar y el tr\u00e1fico se vea afectado, lo que provocar\u00e1 una condici\u00f3n de Denegaci\u00f3n de Servicio (DoS). Un reinicio manual del sistema se recupera de la p\u00e9rdida de memoria. Para confirmar la p\u00e9rdida de memoria, controle los mensajes \"sheaf:possible leak\" y \"vtep not found\" en los registros. Este problema afecta a: Juniper Networks Junos OS QFX5000 Series: * Todas las versiones anteriores a 20.4R3-S6; * Versiones 21.1 anteriores a 21.1R3-S5; * Versiones 21.2 anteriores a 21.2R3-S5; * Versiones 21.3 anteriores a 21.3R3-S4; * Versiones 21.4 anteriores a 21.4R3-S3; * Versiones 22.1 anteriores a 22.1R3-S2; * Versiones 22.2 anteriores a 22.2R2-S2, 22.2R3; * Versiones 22.3 anteriores a 22.3R2-S1, 22.3R3; * Versiones 22.4 anteriores a 22.4R1-S2, 22.4R2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-401"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,463 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86C7E154-9273-4FB0-BF75-BD2BD79F457D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5120:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32D0AE1E-12D6-4B91-A8B8-C3A451F58F45"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7F920B8-83D2-478E-8F97-163D924F5021"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67B037F5-8C56-453B-8CE2-D7D3AEF5D467"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5210:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6329B6E-83D8-4F53-A204-9F53042DFAA7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5220:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "945B38BD-F339-48F9-B033-FBCDF62E73B5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5230:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B0CAA01-194D-4E89-BA95-226787517F78"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfk5700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84F42D80-6D50-4136-9988-E9231BB59EA3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73156",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44193.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44193.json
index 0a8b308c905..c9953fedbd9 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44193.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44193.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44193",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.377",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T13:31:08.350",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Release of Memory Before Removing Last Reference vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a local, low privileged attacker to cause an FPC crash, leading to Denial of Service (DoS).\n\nOn all Junos MX Series with MPC1 - MPC9, LC480, LC2101, MX10003, and MX80, when Connectivity-Fault-Management (CFM) is enabled in a VPLS scenario, and a specific LDP related command is run, an FPC will crash and reboot. Continued execution of this specific LDP command can lead to sustained Denial of Service condition.\n\nThis issue affects:\n\nJuniper Networks Junos OS on MX Series:\n\n\n\n * All versions prior to 20.4R3-S7;\n * 21.1 versions prior to 21.1R3-S5;\n * 21.2 versions prior to 21.2R3-S4;\n * 21.3 versions prior to 21.3R3-S4;\n * 21.4 versions prior to 21.4R3-S3;\n * 22.1 versions prior to 22.1R3-S1;\n * 22.2 versions prior to 22.2R2-S1, 22.2R3;\n * 22.3 versions prior to 22.3R1-S2, 22.3R2.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de liberaci\u00f3n inadecuada de memoria antes de eliminar la \u00faltima referencia en Packet Forwarding Engine (PFE) de Juniper Networks Junos OS permite que un atacante local con pocos privilegios provoque una falla del FPC, lo que lleva a una Denegaci\u00f3n de Servicio (DoS). En todas las series Junos MX con MPC1 - MPC9, LC480, LC2101, MX10003 y MX80, cuando Connectivity-Fault-Management (CFM) est\u00e1 habilitada en un escenario VPLS y se ejecuta un comando relacionado con LDP espec\u00edfico, un FPC fallar\u00e1 y se reiniciar\u00e1. La ejecuci\u00f3n continua de este comando LDP espec\u00edfico puede provocar una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio. Este problema afecta a: Juniper Networks Junos OS en la serie MX: * Todas las versiones anteriores a 20.4R3-S7; * Versiones 21.1 anteriores a 21.1R3-S5; * Versiones 21.2 anteriores a 21.2R3-S4; * Versiones 21.3 anteriores a 21.3R3-S4; * Versiones 21.4 anteriores a 21.4R3-S3; * Versiones 22.1 anteriores a 22.1R3-S1; * Versiones 22.2 anteriores a 22.2R2-S1, 22.2R3; * Versiones 22.3 anteriores a 22.3R1-S2, 22.3R2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-401"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,438 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx10004:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84F7BB7E-3A52-4C23-A4D2-50E75C912AFC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "27175D9A-CA2C-4218-8042-835E25DFCA43"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00C7FC57-8ACF-45AA-A227-7E3B350FD24F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2754C2DF-DF6E-4109-9463-38B4E0465B77"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx304:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F7FB0CC-624D-4AB9-A7AC-BB19838C3B22"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73157",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44194.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44194.json
index c2d71db5069..d308d663f4f 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44194.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44194.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44194",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.450",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T17:58:47.993",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Incorrect Default Permissions vulnerability in Juniper Networks Junos OS allows an unauthenticated attacker with local access to the device to create a backdoor with root privileges. The issue is caused by improper directory permissions on a certain system directory, allowing an attacker with access to this directory to create a backdoor with root privileges.\n\nThis issue affects Juniper Networks Junos OS:\n\n\n\n * All versions prior to 20.4R3-S5;\n * 21.1 versions prior to 21.1R3-S4;\n * 21.2 versions prior to 21.2R3-S4;\n * 21.3 versions prior to 21.3R3-S3;\n * 21.4 versions prior to 21.4R3-S1.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de permisos predeterminados incorrectos en Juniper Networks Junos OS permite que un atacante no autenticado con acceso local al dispositivo cree un backdoor con privilegios de root. El problema se debe a permisos de directorio inadecuados en un determinado directorio del sistema, lo que permite a un atacante con acceso a este directorio crear un backdoor con privilegios de root. Este problema afecta a Juniper Networks Junos OS: * Todas las versiones anteriores a 20.4R3-S5; * Versiones 21.1 anteriores a 21.1R3-S4; * Versiones 21.2 anteriores a 21.2R3-S4; * Versiones 21.3 anteriores a 21.3R3-S3; * Versiones 21.4 anteriores a 21.4R3-S1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-276"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,276 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73158",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44195.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44195.json
index 202630fd0b1..708b288e03d 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44195.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44195.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44195",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.530",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T12:55:50.237",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the NetworkStack agent daemon (nsagentd) of Juniper Networks Junos OS Evolved allows an unauthenticated network based attacker to cause limited impact to the availability of the system.\n\nIf specific packets reach the Routing-Engine (RE) these will be processed normally even if firewall filters are in place which should have prevented this. This can lead to a limited, increased consumption of resources resulting in a Denial-of-Service (DoS), and unauthorized access.\n\nCVE-2023-44196 is a prerequisite for this issue.\n\nThis issue affects Juniper Networks Junos OS Evolved:\n\n\n\n * 21.3-EVO versions prior to 21.3R3-S5-EVO;\n * 21.4-EVO versions prior to 21.4R3-S4-EVO;\n * 22.1-EVO version 22.1R1-EVO and later;\n * 22.2-EVO version 22.2R1-EVO and later;\n * 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;\n * 22.4-EVO versions prior to 22.4R3-EVO.\n\n\n\n\nThis issue doesn't not affected Junos OS Evolved versions prior to 21.3R1-EVO.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Restricci\u00f3n Inadecuada del Canal de Comunicaci\u00f3n a los Endpoints Previstos en el daemon del agente NetworkStack (nsagentd) de Juniper Networks Junos OS Evolved permite que un atacante basado en red no autenticado cause un impacto limitado en la disponibilidad del sistema. Si paquetes espec\u00edficos llegan al Routing-Engine (RE), se procesar\u00e1n normalmente incluso si existen filtros de firewall que deber\u00edan haberlo impedido. Esto puede provocar un consumo mayor y limitado de recursos, lo que resulta en una Denegaci\u00f3n de Servicio (DoS) y un acceso no autorizado. CVE-2023-44196 es un requisito previo para este problema. Este problema afecta a Juniper Networks Junos OS Evolved: * Versiones 21.3-EVO anteriores a 21.3R3-S5-EVO; * Versiones 21.4-EVO anteriores a 21.4R3-S4-EVO; * 22.1-EVO versi\u00f3n 22.1R1-EVO y posteriores; * 22.2-EVO versi\u00f3n 22.2R1-EVO y posteriores; * Versiones 22.3-EVO anteriores a 22.3R2-S2-EVO, 22.3R3-S1-EVO; * Versiones 22.4-EVO anteriores a 22.4R3-EVO. Este problema no afecta a las versiones evolucionadas de Junos OS anteriores a 21.3R1-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,220 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "10F9C2B1-BD81-4EDC-ADF5-4B0F39001C7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "82A4E4C8-2D50-4675-8A96-8C9DADCE46CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "54B79847-EBC1-480E-87BE-60D411C93FC6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "8135057E-D346-4925-96BA-FE22C7C03903"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "33F4EEEE-77E9-4973-A770-99E7BA2F05F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "D657944B-2066-4F2C-BC92-EDF4DE1C165C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "75A58924-6348-44CF-AB39-1FCE17FE81AC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73160",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44196.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44196.json
index e6ede7fac34..fea3ff5bc0f 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44196.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44196.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44196",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.610",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:05:47.740",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Check for Unusual or Exceptional Conditions in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS Evolved on PTX10003 Series allows an unauthenticated adjacent attacker to cause an impact to the integrity of the system.\n\nWhen specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the RE. This issue is a prerequisite for CVE-2023-44195.\n\nThis issue affects Juniper Networks Junos OS Evolved:\n\n\n\n * All versions prior to 20.4R3-S8-EVO;\n * 21.1-EVO version 21.1R1-EVO and later;\n * 21.2-EVO versions prior to 21.2R3-S6-EVO;\n * 21.3-EVO version 21.3R1-EVO and later;\n * 21.4-EVO versions prior to 21.4R3-S3-EVO;\n * 22.1-EVO versions prior to 22.1R3-S4-EVO;\n * 22.2-EVO versions prior to 22.2R3-S3-EVO;\n * 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-EVO;\n * 22.4-EVO versions prior to 22.4R2-EVO.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una Verificaci\u00f3n Inadecuada de Condiciones Inusuales o Excepcionales en Packet Forwarding Engine (pfe) de Juniper Networks Junos OS Evolved en la serie PTX10003 permite que un atacante adyacente no autenticado cause un impacto en la integridad del sistema. Cuando el PFE recibe paquetes MPLS de tr\u00e1nsito espec\u00edficos, estos paquetes se reenv\u00edan internamente al RE. Este problema es un requisito previo para CVE-2023-44195. Este problema afecta a Juniper Networks Junos OS Evolved: * Todas las versiones anteriores a 20.4R3-S8-EVO; * 21.1-EVO versi\u00f3n 21.1R1-EVO y posteriores; * Versiones 21.2-EVO anteriores a 21.2R3-S6-EVO; * 21.3-EVO versi\u00f3n 21.3R1-EVO y posteriores; * Versiones 21.4-EVO anteriores a 21.4R3-S3-EVO; * Versiones 22.1-EVO anteriores a 22.1R3-S4-EVO; * Versiones 22.2-EVO anteriores a 22.2R3-S3-EVO; * Versiones 22.3-EVO anteriores a 22.3R2-S2-EVO, 22.3R3-EVO; * Versiones 22.4-EVO anteriores a 22.4R2-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-754"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,433 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "5BDD5111-1BC2-456B-8A31-F2D252DF613C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "89B9BF7C-525C-4819-B80D-9B5F240F9878"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "AE674DD3-3590-4434-B144-5AD7EB5F039D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0099BDA9-9D4B-4D6C-8234-EFD9E8C63476"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "D8729BC1-FB09-4E6D-A5D5-8BDC589555B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "9D72C3DF-4513-48AC-AAED-C1AADF0794E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8C583289-96C4-4451-A320-14CA1C390819"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA43782E-0719-496E-9237-E1ABD3C4C664"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "78897DD2-E161-4191-94FF-7400FB612DF5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5BD05415-9F94-4EB8-805A-C9C0FFA9D0DF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73162",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44197.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44197.json
index dbedbd7b6bf..a5621883e5b 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44197.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44197.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44197",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.687",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:38:18.297",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Out-of-Bounds Write vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).\n\nOn all Junos OS and Junos OS Evolved devices an rpd crash and restart can occur while processing BGP route updates received over an established BGP session. This specific issue is observed for BGP routes learned via a peer which is configured with a BGP import policy that has hundreds of terms matching IPv4 and/or IPv6 prefixes.\n\nThis issue affects Juniper Networks Junos OS:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.1 version 21.1R1 and later versions;\n * 21.2 versions prior to 21.2R3-S2;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R2-S1, 21.4R3-S5.\n\n\n\n\nThis issue affects Juniper Networks Junos OS Evolved:\n\n\n\n * All versions prior to 20.4R3-S8-EVO;\n * 21.1-EVO version 21.1R1-EVO and later versions;\n * 21.2-EVO versions prior to 21.2R3-S2-EVO;\n * 21.3-EVO version 21.3R1-EVO and later versions;\n * 21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-S5-EVO.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Escritura Fuera de los L\u00edmites en el Routing Protocol Daemon (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante basado en red no autenticado provoque una Denegaci\u00f3n de Servicio (DoS). En todos los dispositivos Junos OS y Junos OS Evolved, se puede producir un bloqueo y reinicio de rpd mientras se procesan las actualizaciones de ruta BGP recibidas a trav\u00e9s de una sesi\u00f3n BGP establecida. Este problema espec\u00edfico se observa para las rutas BGP aprendidas a trav\u00e9s de un par que est\u00e1 configurado con una pol\u00edtica de importaci\u00f3n de BGP que tiene cientos de t\u00e9rminos que coinciden con los prefijos IPv4 y/o IPv6. Este problema afecta a Juniper Networks Junos OS: * Todas las versiones anteriores a 20.4R3-S8; * 21.1 versi\u00f3n 21.1R1 y versiones posteriores; * Versiones 21.2 anteriores a 21.2R3-S2; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R2-S1, 21.4R3-S5. Este problema afecta a Juniper Networks Junos OS Evolved: * Todas las versiones anteriores a 20.4R3-S8-EVO; * 21.1-EVO versi\u00f3n 21.1R1-EVO y versiones posteriores; * Versiones 21.2-EVO anteriores a 21.2R3-S2-EVO; * 21.3-EVO versi\u00f3n 21.3R1-EVO y versiones posteriores; * Versiones 21.4-EVO anteriores a 21.4R2-S1-EVO, 21.4R3-S5-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,577 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "5BDD5111-1BC2-456B-8A31-F2D252DF613C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "89B9BF7C-525C-4819-B80D-9B5F240F9878"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "AE674DD3-3590-4434-B144-5AD7EB5F039D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0099BDA9-9D4B-4D6C-8234-EFD9E8C63476"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "D8729BC1-FB09-4E6D-A5D5-8BDC589555B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "9D72C3DF-4513-48AC-AAED-C1AADF0794E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8C583289-96C4-4451-A320-14CA1C390819"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA43782E-0719-496E-9237-E1ABD3C4C664"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "78897DD2-E161-4191-94FF-7400FB612DF5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73163",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44198.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44198.json
index f71643edf07..c88f3a92ae7 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44198.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44198.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44198",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.760",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T17:27:09.837",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Check for Unusual or Exceptional Conditions vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated network-based attacker to cause an integrity impact in connected networks.\n\nIf the SIP ALG is configured and a device receives a specifically malformed SIP packet, the device prevents this packet from being forwarded, but any subsequently received retransmissions of the same packet are forwarded as if they were valid.\n\nThis issue affects Juniper Networks Junos OS on SRX Series and MX Series:\n\n\n\n * 20.4 versions prior to 20.4R3-S5;\n * 21.1 versions prior to 21.1R3-S4;\n * 21.2 versions prior to 21.2R3-S4;\n * 21.3 versions prior to 21.3R3-S3;\n * 21.4 versions prior to 21.4R3-S2;\n * 22.1 versions prior to 22.1R2-S2, 22.1R3;\n * 22.2 versions prior to 22.2R2-S1, 22.2R3;\n * 22.3 versions prior to 22.3R1-S2, 22.3R2.\n\n\n\n\nThis issue doesn't not affected releases prior to 20.4R1.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Verificaci\u00f3n Inadecuada de Condiciones Inusuales o Excepcionales en SIP ALG de Juniper Networks Junos OS en las series SRX y MX permite que un atacante basado en red no autenticado cause un impacto en la integridad de las redes conectadas. Si SIP ALG est\u00e1 configurado y un dispositivo recibe un paquete SIP espec\u00edficamente mal formado, el dispositivo impide que este paquete se reenv\u00ede, pero cualquier retransmisi\u00f3n recibida posteriormente del mismo paquete se reenv\u00eda como si fuera v\u00e1lida. Este problema afecta a Juniper Networks Junos OS en las series SRX y MX: * Versiones 20.4 anteriores a 20.4R3-S5; * Versiones 21.1 anteriores a 21.1R3-S4; * Versiones 21.2 anteriores a 21.2R3-S4; * Versiones 21.3 anteriores a 21.3R3-S3; * Versiones 21.4 anteriores a 21.4R3-S2; * Versiones 22.1 anteriores a 22.1R2-S2, 22.1R3; * Versiones 22.2 anteriores a 22.2R2-S1, 22.2R3; * Versiones 22.3 anteriores a 22.3R1-S2, 22.3R2. Este problema no afecta a las versiones anteriores a 20.4R1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-754"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,523 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx10004:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84F7BB7E-3A52-4C23-A4D2-50E75C912AFC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "27175D9A-CA2C-4218-8042-835E25DFCA43"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00C7FC57-8ACF-45AA-A227-7E3B350FD24F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2754C2DF-DF6E-4109-9463-38B4E0465B77"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx304:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F7FB0CC-624D-4AB9-A7AC-BB19838C3B22"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2CEBF85C-736A-4E7D-956A-3E8210D4F70B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4AE06B18-BFB5-4029-A05D-386CFBFBF683"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "48A1DCCD-208C-46D9-8E14-89592B49AB9A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80F9DC32-5ADF-4430-B1A6-357D0B29DB78"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B82D4C4-7A65-409A-926F-33C054DCBFBA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE535749-F4CE-4FFA-B23D-BF09C92481E5"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CCC5F6F5-4347-49D3-909A-27A3A96D36C9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "826F893F-7B06-43B5-8653-A8D9794C052E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56BA6B86-D3F4-4496-AE46-AC513C6560FA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "462CFD52-D3E2-4F7A-98AC-C589D2420556"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FDDC897-747F-44DD-9599-7266F9B5B7B1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62FC145A-D477-4C86-89E7-F70F52773801"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73164",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44199.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44199.json
index 05cba205f7b..4d8de7c8b6b 100644
--- a/CVE-2023/CVE-2023-441xx/CVE-2023-44199.json
+++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44199.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44199",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.837",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T17:03:27.823",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\nOn Junos MX Series platforms with Precision Time Protocol (PTP) configured, a prolonged routing protocol churn can lead to an FPC crash and restart.\n\nThis issue affects Juniper Networks Junos OS on MX Series:\n\n\n\n * All versions prior to 20.4R3-S4;\n * 21.1 version 21.1R1 and later versions;\n * 21.2 versions prior to 21.2R3-S2;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3;\n * 22.1 versions prior to 22.1R3;\n * 22.2 versions prior to 22.2R1-S1, 22.2R2.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Verificaci\u00f3n Inadecuada de Condiciones Inusuales o Excepcionales en Packet Forwarding Engine (PFE) de Juniper Networks Junos OS en la serie MX permite que un atacante no autenticado basado en la red provoque una Denegaci\u00f3n de Servicio (DoS). En las plataformas Junos MX Series con Precision Time Protocol (PTP) configurado, una rotaci\u00f3n prolongada del protocolo de enrutamiento puede provocar un bloqueo y reinicio del FPC. Este problema afecta a Juniper Networks Junos OS en la serie MX: * Todas las versiones anteriores a 20.4R3-S4; * 21.1 versi\u00f3n 21.1R1 y versiones posteriores; * Versiones 21.2 anteriores a 21.2R3-S2; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3; * Versiones 22.1 anteriores a 22.1R3; * Versiones 22.2 anteriores a 22.2R1-S1, 22.2R2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-754"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,388 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "5C1C3B09-3800-493E-A319-57648305FE6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "4BFDCC2B-FAB5-4164-8D70-28E4DFF052AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5627740-42E3-4FB1-B8B9-0B768AFFA1EC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx10004:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84F7BB7E-3A52-4C23-A4D2-50E75C912AFC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6F0EA2F-BF7E-45D0-B2B4-8A7B67A9475A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FEF33EB-B2E0-42EF-A1BB-D41021B6D08F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "27175D9A-CA2C-4218-8042-835E25DFCA43"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00C7FC57-8ACF-45AA-A227-7E3B350FD24F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2754C2DF-DF6E-4109-9463-38B4E0465B77"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4A26704-A6A4-4C4F-9E12-A0A0259491EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx304:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3F7FB0CC-624D-4AB9-A7AC-BB19838C3B22"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "104858BD-D31D-40E0-8524-2EC311F10EAC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B5E08E1E-0FE4-4294-9497-BBFFECA2A220"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73165",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44201.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44201.json
index 9fe82b9d68c..2c7aaace4f3 100644
--- a/CVE-2023/CVE-2023-442xx/CVE-2023-44201.json
+++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44201.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44201",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.910",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:52:10.113",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Incorrect Permission Assignment for Critical Resource vulnerability in a specific file of Juniper Networks Junos OS and Junos OS Evolved allows a local authenticated attacker to read configuration changes without having the permissions.\n\nWhen a user with the respective permissions commits a configuration change, a specific file is created. That file is readable even by users with no permissions to access the configuration. This can lead to privilege escalation as the user can read the password hash when a password change is being committed.\n\nThis issue affects:\n\nJuniper Networks Junos OS\n\n\n\n * All versions prior to 20.4R3-S4;\n * 21.1 versions prior to 21.1R3-S4;\n * 21.2 versions prior to 21.2R3-S2;\n * 21.3 versions prior to 21.3R2-S2, 21.3R3-S1;\n * 21.4 versions prior to 21.4R2-S1, 21.4R3.\n\n\n\n\nJuniper Networks Junos OS Evolved\n\n\n\n * All versions prior to 20.4R3-S4-EVO;\n * 21.1 versions prior to 21.1R3-S2-EVO;\n * 21.2 versions prior to 21.2R3-S2-EVO;\n * 21.3 versions prior to 21.3R3-S1-EVO;\n * 21.4 versions prior to 21.4R2-S2-EVO.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de asignaci\u00f3n de permisos incorrecta para recursos cr\u00edticos en un archivo espec\u00edfico de Juniper Networks Junos OS y Junos OS Evolved permite a un atacante autenticado local leer cambios de configuraci\u00f3n sin tener los permisos. Cuando un usuario con los permisos respectivos realiza un cambio de configuraci\u00f3n, se crea un archivo espec\u00edfico. Ese archivo es legible incluso por usuarios sin permisos para acceder a la configuraci\u00f3n. Esto puede provocar una escalada de privilegios, ya que el usuario puede leer el hash de la contrase\u00f1a cuando se realiza un cambio de esta. Este problema afecta a: Juniper Networks Junos OS * Todas las versiones anteriores a 20.4R3-S4; * Versiones 21.1 anteriores a 21.1R3-S4; * Versiones 21.2 anteriores a 21.2R3-S2; * Versiones 21.3 anteriores a 21.3R2-S2, 21.3R3-S1; * Versiones 21.4 anteriores a 21.4R2-S1, 21.4R3. Juniper Networks Junos OS Evolved * Todas las versiones anteriores a 20.4R3-S4-EVO; * Versiones 21.1 anteriores a 21.1R3-S2-EVO; * Versiones 21.2 anteriores a 21.2R3-S2-EVO; * Versiones 21.3 anteriores a 21.3R3-S1-EVO; * Versiones 21.4 anteriores a 21.4R2-S2-EVO."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-732"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,467 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
+ "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
+ "matchCriteriaId": "5BDD5111-1BC2-456B-8A31-F2D252DF613C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s7:*:*:*:*:*:*",
+ "matchCriteriaId": "89B9BF7C-525C-4819-B80D-9B5F240F9878"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "52C3552E-798F-4719-B38D-F74E34EAAA40"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "AE674DD3-3590-4434-B144-5AD7EB5F039D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "0099BDA9-9D4B-4D6C-8234-EFD9E8C63476"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "D8729BC1-FB09-4E6D-A5D5-8BDC589555B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "9D72C3DF-4513-48AC-AAED-C1AADF0794E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8C583289-96C4-4451-A320-14CA1C390819"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supprtportal.juniper.net/JSA73167",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Broken Link"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44203.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44203.json
index 4b86d576e6e..b4aac82a22c 100644
--- a/CVE-2023/CVE-2023-442xx/CVE-2023-44203.json
+++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44203.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44203",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:12.987",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:42:44.980",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Check or Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600 allows a adjacent attacker to send specific traffic, which leads to packet flooding, resulting in a Denial of Service (DoS).\n\nWhen a specific IGMP packet is received in an isolated VLAN, it is duplicated to all other ports under the primary VLAN, which causes a flood.\n\nThis issue affects QFX5000 series, EX2300, EX3400, EX4100, EX4400 and EX4600 platforms only.\n\nThis issue affects Juniper Junos OS on on QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600:\n\n\n\n * All versions prior to 20.4R3-S5;\n * 21.1 versions prior to 21.1R3-S4;\n * 21.2 versions prior to 21.2R3-S3;\n * 21.3 versions prior to 21.3R3-S5;\n * 21.4 versions prior to 21.4R3-S2;\n * 22.1 versions prior to 22.1R3;\n * 22.2 versions prior to 22.2R3;\n * 22.3 versions prior to 22.3R2.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de verificaci\u00f3n o manejo inadecuado de condiciones excepcionales en Packet Forwarding Engine (pfe) de Juniper Networks Junos OS en las series QFX5000, EX2300, EX3400, EX4100, EX4400 y EX4600 permite que un atacante adyacente env\u00ede tr\u00e1fico espec\u00edfico, lo que provoca una inundaci\u00f3n de paquetes. resultando en una Denegaci\u00f3n de Servicio (DoS). Cuando se recibe un paquete IGMP espec\u00edfico en una VLAN aislada, se duplica en todos los dem\u00e1s puertos de la VLAN principal, lo que provoca una inundaci\u00f3n. Este problema afecta \u00fanicamente a las series QFX5000, EX2300, EX3400, EX4100, EX4400 y EX4600. Este problema afecta a Juniper Junos OS en las series QFX5000, EX2300, EX3400, EX4100, EX4400 y EX4600: * Todas las versiones anteriores a 20.4R3-S5; * Versiones 21.1 anteriores a 21.1R3-S4; * Versiones 21.2 anteriores a 21.2R3-S3; * Versiones 21.3 anteriores a 21.3R3-S5; * Versiones 21.4 anteriores a 21.4R3-S2; * Versiones 22.1 anteriores a 22.1R3; * Versiones 22.2 anteriores a 22.2R3; * Versiones 22.3 anteriores a 22.3R2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,498 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "20.4",
+ "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "54010163-0810-4CF5-95FE-7E62BC6CA4F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3B3302CB-457F-4BD2-B80B-F70FB4C4542E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3A0D9C0-34D3-430F-ABFA-B68010A8825D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5E04B126-F290-4242-BB80-5F573D623E6E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "671D9977-7657-48C7-A07C-4AED54380A86"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E100C3C-070D-4132-927F-756538B91491"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2032E7DD-96FD-48B7-922C-5FE04675796C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2D907D6A-B7C4-4A10-AA58-0F908575A435"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "979C3597-C53B-4F4B-9EA7-126DA036C86D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62A536DA-5A57-4255-AB22-F99F8B7FF62A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "47DAF5E7-E610-4D74-8573-41C16D642837"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2521C83-E8F2-4621-9727-75BB3FC11E64"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4100-f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F496D19-D28C-4517-90A3-90EC62BC5D79"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B43F6CB-0595-4957-8B3B-ADD4EA84D8C2"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1BB20B5-EA30-4E8E-9055-2E629648436A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E974B4BC-64C5-4BB6-AF31-D46AF3763416"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5100-96s:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BD0F680-ED30-48F3-A5D9-988D510CFC0D"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "79A8847B-4F98-4949-8639-5CD2B411D10F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09EBDE4B-764F-4DF1-844A-BB8A52CD53EF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5130:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AB58A6E9-FFCF-4331-AC3B-45C37BD1943E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EDC5478F-A047-4F6D-BB11-0077A74C0174"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5200-32c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38D790AD-D00F-4FED-96FE-3046C827356B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5200-48y:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAD9AD5C-947D-41EF-9969-FCCEB144984F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D877320D-1997-4B66-B11B-864020C755E1"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5210-64c:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B86047DE-A0A0-4698-9414-B66C0FA7B544"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:juniper:qfx5220:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D193BEBD-9436-468D-B89E-D5720603451D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73169",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44204.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44204.json
index aa221da668e..ac1b82c86ee 100644
--- a/CVE-2023/CVE-2023-442xx/CVE-2023-44204.json
+++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44204.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44204",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-10-13T00:15:13.070",
- "lastModified": "2023-10-13T12:47:39.540",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:47:15.987",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nAn Improper Validation of Syntactic Correctness of Input vulnerability in Routing Protocol Daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS).\n\nWhen a malformed BGP UPDATE packet is received over an established BGP session, the rpd crashes and restarts.\n\nThis issue affects both eBGP and iBGP implementations.\n\nThis issue affects:\n\nJuniper Networks Junos OS\n\n\n\n * 21.4 versions prior to 21.4R3-S4;\n * 22.1 versions prior to 22.1R3-S3;\n * 22.2 versions prior to 22.2R3-S2;\n * 22.3 versions prior to 22.3R2-S2, 22.3R3;\n * 22.4 versions prior to 22.4R2-S1, 22.4R3;\n * 23.2 versions prior to 23.2R1, 23.2R2;\n\n\n\n\nJuniper Networks Junos OS Evolved\n\n\n\n * 21.4 versions prior to 21.4R3-S5-EVO;\n * 22.1 versions prior to 22.1R3-S3-EVO;\n * 22.2 versions prior to 22.2R3-S3-EVO;\n * 22.3 versions prior to 22.3R2-S2-EVO;\n * 22.4 versions prior to 22.4R3-EVO;\n * 23.2 versions prior to 23.2R2-EVO;\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una validaci\u00f3n inadecuada de la correcci\u00f3n sint\u00e1ctica de la vulnerabilidad de entrada en Routing Protocol Daemon (rpd) Juniper Networks Junos OS y Junos OS Evolved permite que un atacante basado en red no autenticado provoque una Denegaci\u00f3n de Servicio (DoS). Cuando se recibe un paquete de ACTUALIZACI\u00d3N de BGP con formato incorrecto a trav\u00e9s de una sesi\u00f3n BGP establecida, el rpd falla y se reinicia. Este problema afecta tanto a las implementaciones de eBGP como de iBGP. Este problema afecta a: Juniper Networks Junos OS * versiones 21.4 anteriores a 21.4R3-S4; * Versiones 22.1 anteriores a 22.1R3-S3; * Versiones 22.2 anteriores a 22.2R3-S2; * Versiones 22.3 anteriores a 22.3R2-S2, 22.3R3; * Versiones 22.4 anteriores a 22.4R2-S1, 22.4R3; * Versiones 23.2 anteriores a 23.2R1, 23.2R2; Juniper Networks Junos OS Evolved * Versiones 21.4 anteriores a 21.4R3-S5-EVO; * Versiones 22.1 anteriores a 22.1R3-S3-EVO; * Versiones 22.2 anteriores a 22.2R3-S3-EVO; * Versiones 22.3 anteriores a 22.3R2-S2-EVO; * Versiones 22.4 anteriores a 22.4R3-EVO; * Versiones 23.2 anteriores a 23.2R2-EVO;"
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ },
{
"source": "sirt@juniper.net",
"type": "Secondary",
@@ -46,10 +80,445 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
+ "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*",
+ "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*",
+ "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "1FD8C240-A7FE-4FD5-ADCC-289C1BC461BF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*",
+ "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*",
+ "matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*",
+ "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*",
+ "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*",
+ "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://supportportal.juniper.net/JSA73170",
- "source": "sirt@juniper.net"
+ "source": "sirt@juniper.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44219.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44219.json
new file mode 100644
index 00000000000..6aa33e5c9ee
--- /dev/null
+++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44219.json
@@ -0,0 +1,36 @@
+{
+ "id": "CVE-2023-44219",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-27T08:15:31.060",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A local privilege escalation vulnerability in SonicWall Directory Services Connector Windows MSI client 4.1.21 and earlier versions allows a local low-privileged user to gain system privileges through running the recovery feature."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de escalada de privilegios local en SonicWall Directory Services Connector Windows MSI client 4.1.21 y versiones anteriores permite a un usuario local con pocos privilegios obtener permisos del sistema mediante la ejecuci\u00f3n de la funci\u00f3n de recuperaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "weaknesses": [
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0016",
+ "source": "PSIRT@sonicwall.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44220.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44220.json
new file mode 100644
index 00000000000..918a69ede21
--- /dev/null
+++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44220.json
@@ -0,0 +1,36 @@
+{
+ "id": "CVE-2023-44220",
+ "sourceIdentifier": "PSIRT@sonicwall.com",
+ "published": "2023-10-27T08:15:31.207",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SonicWall NetExtender Windows (32-bit and 64-bit) client 10.2.336 and earlier versions have a DLL Search Order Hijacking vulnerability in the start-up DLL component. Successful exploitation via a local attacker could result in command execution in the target system."
+ },
+ {
+ "lang": "es",
+ "value": "El cliente SonicWall NetExtender Windows (32 bits y 64 bits) 10.2.336 y versiones anteriores tienen una vulnerabilidad de Secuestro de Orden de B\u00fasqueda de DLL en el componente DLL de inicio. La explotaci\u00f3n exitosa a trav\u00e9s de un atacante local podr\u00eda resultar en la ejecuci\u00f3n de comandos en el sistema de destino."
+ }
+ ],
+ "metrics": {},
+ "weaknesses": [
+ {
+ "source": "PSIRT@sonicwall.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-427"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0017",
+ "source": "PSIRT@sonicwall.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44229.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44229.json
index bfb6d66bd9b..0493987e064 100644
--- a/CVE-2023/CVE-2023-442xx/CVE-2023-44229.json
+++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44229.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44229",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:44.500",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:51:50.413",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Tiny Carousel Horizontal Slider plugin <=\u00a08.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Gopi Ramasamy Tiny Carousel Horizontal Slider en versiones <= 8.1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gopiplus:tiny_carosel_horizontal_slider:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "8.1",
+ "matchCriteriaId": "F36490F7-9C4D-41B2-AFE7-D1C6F21B39F8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/tiny-carousel-horizontal-slider/wordpress-tiny-carousel-horizontal-slider-plugin-8-1-cross-site-scripting-xss?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44249.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44249.json
index 740a1501e1f..ed71b71305a 100644
--- a/CVE-2023/CVE-2023-442xx/CVE-2023-44249.json
+++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44249.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44249",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:13.047",
- "lastModified": "2023-10-12T20:35:13.497",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:32.407",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -155,6 +155,10 @@
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x8rp-jfwc-gqqj",
+ "source": "psirt@fortinet.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44256.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44256.json
new file mode 100644
index 00000000000..b3f6b891942
--- /dev/null
+++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44256.json
@@ -0,0 +1,51 @@
+{
+ "id": "CVE-2023-44256",
+ "sourceIdentifier": "psirt@fortinet.com",
+ "published": "2023-10-20T10:15:12.870",
+ "lastModified": "2023-10-20T11:27:04.140",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de server-side request forgery [CWE-918] en Fortinet FortiAnalyzer versi\u00f3n 7.4.0, versi\u00f3n 7.2.0 a 7.2.3 y anteriores a 7.0.8 y FortiManager versi\u00f3n 7.4.0, versi\u00f3n 7.2.0 a 7.2.3 y anteriores 7.0.8 permite a un atacante remoto con privilegios bajos ver datos confidenciales de servidores internos o realizar un escaneo de puerto local a trav\u00e9s de una solicitud HTTP manipulada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@fortinet.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://fortiguard.com/psirt/FG-IR-19-039",
+ "source": "psirt@fortinet.com"
+ },
+ {
+ "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-2hc5-p5mc-8vrh",
+ "source": "psirt@fortinet.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44267.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44267.json
new file mode 100644
index 00000000000..8eeb3d4498c
--- /dev/null
+++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44267.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-44267",
+ "sourceIdentifier": "help@fluidattacks.com",
+ "published": "2023-10-26T20:15:08.637",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'lnm' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Online Art Gallery v1.0 es vulnerable a m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL no autenticada. El par\u00e1metro 'lnm' del recurso header.php no valida los caracteres recibidos y se env\u00edan sin filtrar a la base de datos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://fluidattacks.com/advisories/ono",
+ "source": "help@fluidattacks.com"
+ },
+ {
+ "url": "https://https://projectworlds.in/",
+ "source": "help@fluidattacks.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44268.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44268.json
new file mode 100644
index 00000000000..47fa7d80d28
--- /dev/null
+++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44268.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-44268",
+ "sourceIdentifier": "help@fluidattacks.com",
+ "published": "2023-10-26T23:15:09.387",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'gender' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Online Art Gallery v1.0 es vulnerable a m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL no autenticada. El par\u00e1metro 'gender' del recurso header.php no valida los caracteres recibidos y se env\u00edan sin filtrar a la base de datos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://fluidattacks.com/advisories/ono",
+ "source": "help@fluidattacks.com"
+ },
+ {
+ "url": "https://https://projectworlds.in/",
+ "source": "help@fluidattacks.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44309.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44309.json
index b584d161246..7e8a8b70735 100644
--- a/CVE-2023/CVE-2023-443xx/CVE-2023-44309.json
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44309.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44309",
"sourceIdentifier": "security@liferay.com",
"published": "2023-10-17T09:15:10.347",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T17:15:31.203",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -50,10 +80,77 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
+ "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
+ "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
+ "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
+ "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
+ "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
+ "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
+ "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.4.2",
+ "versionEndExcluding": "7.4.3.53",
+ "matchCriteriaId": "96FC68D1-4118-42AB-B167-864FB0B4152D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44309",
- "source": "security@liferay.com"
+ "source": "security@liferay.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44310.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44310.json
index a2c5e7cbcb4..5b790a9c5ba 100644
--- a/CVE-2023/CVE-2023-443xx/CVE-2023-44310.json
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44310.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44310",
"sourceIdentifier": "security@liferay.com",
"published": "2023-10-17T10:15:09.793",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T17:47:18.317",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -50,10 +80,207 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
+ "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
+ "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
+ "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
+ "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
+ "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
+ "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
+ "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
+ "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
+ "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_18:*:*:*:*:*:*",
+ "matchCriteriaId": "D18ACD28-9182-435C-A30F-DF3BFE13C39A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_19:*:*:*:*:*:*",
+ "matchCriteriaId": "CFE4CC72-C15A-40DE-AFF4-0B6B79BFB2BA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
+ "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_20:*:*:*:*:*:*",
+ "matchCriteriaId": "43C11288-1C48-47A0-95DF-A48F3C0285F6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_21:*:*:*:*:*:*",
+ "matchCriteriaId": "5ECF3B18-D0DB-4FB6-9F6F-B63A6CE45081"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_22:*:*:*:*:*:*",
+ "matchCriteriaId": "79AC7C0B-4135-4C24-8D37-A9431156E3E9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_23:*:*:*:*:*:*",
+ "matchCriteriaId": "7289F71D-ECEB-4FB9-A53F-D3F4D1315ADD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
+ "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
+ "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
+ "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
+ "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
+ "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
+ "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
+ "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
+ "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
+ "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
+ "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
+ "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
+ "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
+ "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
+ "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
+ "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
+ "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
+ "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
+ "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.3.6",
+ "versionEndExcluding": "7.4.3.49",
+ "matchCriteriaId": "3CD5A1D3-7822-4D13-842D-18A7F04802A6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44310",
- "source": "security@liferay.com"
+ "source": "security@liferay.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44311.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44311.json
index a34cc4b6742..a8d2ab9fba6 100644
--- a/CVE-2023/CVE-2023-443xx/CVE-2023-44311.json
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44311.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44311",
"sourceIdentifier": "security@liferay.com",
"published": "2023-10-17T10:15:09.947",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T17:52:15.953",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
{
"source": "security@liferay.com",
"type": "Secondary",
@@ -50,10 +80,97 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
+ "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
+ "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
+ "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
+ "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
+ "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
+ "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
+ "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
+ "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
+ "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
+ "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
+ "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
+ "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
+ "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.4.3.41",
+ "versionEndExcluding": "7.4.3.90",
+ "matchCriteriaId": "6204FB7B-6129-4E68-A811-6B51961C3D4A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311",
- "source": "security@liferay.com"
+ "source": "security@liferay.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44375.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44375.json
new file mode 100644
index 00000000000..524f66ea9cd
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44375.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-44375",
+ "sourceIdentifier": "help@fluidattacks.com",
+ "published": "2023-10-27T03:15:08.120",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'add1' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Online Art Gallery v1.0 es vulnerable a m\u00faltiples vulnerabilidades de inyecci\u00f3n SQL no autenticada. El par\u00e1metro 'add1' del recurso header.php no valida los caracteres recibidos y se env\u00edan sin filtrar a la base de datos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://fluidattacks.com/advisories/ono",
+ "source": "help@fluidattacks.com"
+ },
+ {
+ "url": "https://https://projectworlds.in/",
+ "source": "help@fluidattacks.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44376.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44376.json
new file mode 100644
index 00000000000..2d1c58599ef
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44376.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-44376",
+ "sourceIdentifier": "help@fluidattacks.com",
+ "published": "2023-10-27T13:15:08.207",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'add2' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://fluidattacks.com/advisories/ono",
+ "source": "help@fluidattacks.com"
+ },
+ {
+ "url": "https://https://projectworlds.in/",
+ "source": "help@fluidattacks.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44377.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44377.json
new file mode 100644
index 00000000000..f1098403020
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44377.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-44377",
+ "sourceIdentifier": "help@fluidattacks.com",
+ "published": "2023-10-27T13:15:08.300",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'add3' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://fluidattacks.com/advisories/ono",
+ "source": "help@fluidattacks.com"
+ },
+ {
+ "url": "https://https://projectworlds.in/",
+ "source": "help@fluidattacks.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44385.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44385.json
new file mode 100644
index 00000000000..69f5a30390f
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44385.json
@@ -0,0 +1,116 @@
+{
+ "id": "CVE-2023-44385",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T23:15:08.953",
+ "lastModified": "2023-10-26T15:52:54.817",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Home Assistant Companion for iOS and macOS app up to version 2023.4 are vulnerable to Client-Side Request Forgery. Attackers may send malicious links/QRs to victims that, when visited, will make the victim to call arbitrary services in their Home Assistant installation. Combined with this security advisory, may result in full compromise and remote code execution (RCE). Version 2023.7 addresses this issue and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2023-161."
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n Home Assistant Companion para iOS y macOS hasta la versi\u00f3n 2023.4 es vulnerable a Client-Side Request Forgery. Los atacantes pueden enviar links/QR maliciosos a las v\u00edctimas que, cuando los visitan, har\u00e1n que la v\u00edctima llame a servicios arbitrarios en su instalaci\u00f3n de Home Assistant. Combinado con este aviso de seguridad, puede resultar en un compromiso total y en la Remote Code Execution (RCE). La versi\u00f3n 2023.7 soluciona este problema y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad. Este problema tambi\u00e9n se rastrea como GitHub Security Lab (GHSL) Informe de vulnerabilidad: GHSL-2023-161."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.6,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:home-assistant:home_assistant_companion:*:*:*:*:*:iphone_os:*:*",
+ "versionEndExcluding": "2023.7",
+ "matchCriteriaId": "5BCFBE59-DDDE-4A03-847D-1AD606CF80A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:home-assistant:home_assistant_companion:*:*:*:*:*:macos:*:*",
+ "versionEndExcluding": "2023.7",
+ "matchCriteriaId": "E885DBBB-8BEC-4306-8D83-641B2BB6927B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44388.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44388.json
index ec61051ae54..0d195b0a758 100644
--- a/CVE-2023/CVE-2023-443xx/CVE-2023-44388.json
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44388.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44388",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T22:15:12.397",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T17:32:17.577",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -50,14 +70,43 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
+ "versionEndIncluding": "3.1.1",
+ "matchCriteriaId": "6AC25048-A9DA-4EB4-A05B-33B6348539CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*",
+ "matchCriteriaId": "1BFF647B-6CEF-43BF-BF5E-C82B557F78E2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://nginx.org/en/docs/http/ngx_http_core_module.html#client_max_body_size",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-89h3-g746-xmwq",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44391.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44391.json
index 26f59d35d7d..088ae5b2bc1 100644
--- a/CVE-2023/CVE-2023-443xx/CVE-2023-44391.json
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44391.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44391",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T22:15:12.477",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T17:50:08.850",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -40,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -50,10 +80,36 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
+ "versionEndIncluding": "3.1.1",
+ "matchCriteriaId": "6AC25048-A9DA-4EB4-A05B-33B6348539CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*",
+ "matchCriteriaId": "1BFF647B-6CEF-43BF-BF5E-C82B557F78E2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-7px5-fqcf-7mfr",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44394.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44394.json
index ccd1094a435..0de3a5af342 100644
--- a/CVE-2023/CVE-2023-443xx/CVE-2023-44394.json
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44394.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44394",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T22:15:12.560",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T13:40:07.230",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -40,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-668"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -50,18 +80,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.25.8",
+ "matchCriteriaId": "B2693D3D-D2B9-46EE-AB37-5D642D2F9600"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/mantisbt/mantisbt/commit/65c44883f9d24f3ccef066fb523c93d8fdd7afc1",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-v642-mh27-8j6m",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://mantisbt.org/bugs/view.php?id=32981",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44399.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44399.json
index 1420c5fea62..f4f1a7344f7 100644
--- a/CVE-2023/CVE-2023-443xx/CVE-2023-44399.json
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44399.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44399",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-10T17:15:13.107",
- "lastModified": "2023-10-10T17:52:09.820",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T19:22:17.393",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ZITADEL provides identity infrastructure. In versions 2.37.2 and prior, ZITADEL administrators can enable a setting called \"Ignoring unknown usernames\" which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL. This bug has been patched in versions 2.37.3 and 2.38.0. No known workarounds are available."
+ },
+ {
+ "lang": "es",
+ "value": "ZITADEL proporciona infraestructura de identidad. En las versiones 2.37.2 y anteriores, los administradores de ZITADEL pueden habilitar una configuraci\u00f3n llamada \"Ignoring unknown usernames\" que ayuda a mitigar los ataques que intentan adivinar/enumerar nombres de usuario. Si bien esta configuraci\u00f3n funcion\u00f3 correctamente durante el proceso de autenticaci\u00f3n, no funcion\u00f3 correctamente en el flujo de restablecimiento de contrase\u00f1a. Esto significaba que incluso si esta funci\u00f3n estuviera activa, un atacante podr\u00eda usar la funci\u00f3n de restablecimiento de contrase\u00f1a para verificar si existe una cuenta dentro de ZITADEL. Este error se ha corregido en las versiones 2.37.3 y 2.38.0. No hay workarounds conocidos disponibles."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.37.2",
+ "matchCriteriaId": "945BD332-6A49-4ACD-8E01-583EFD78B8BA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.37.3",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.38.0",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-v683-rcxx-vpff",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44480.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44480.json
new file mode 100644
index 00000000000..2abab0004bb
--- /dev/null
+++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44480.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-44480",
+ "sourceIdentifier": "help@fluidattacks.com",
+ "published": "2023-10-27T21:15:09.530",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities.\u00a0The 'setcasualleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "help@fluidattacks.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://fluidattacks.com/advisories/martin/",
+ "source": "help@fluidattacks.com"
+ },
+ {
+ "url": "https://projectworlds.in/",
+ "source": "help@fluidattacks.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44483.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44483.json
new file mode 100644
index 00000000000..287bfa2af0e
--- /dev/null
+++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44483.json
@@ -0,0 +1,103 @@
+{
+ "id": "CVE-2023-44483",
+ "sourceIdentifier": "security@apache.org",
+ "published": "2023-10-20T10:15:12.933",
+ "lastModified": "2023-10-27T18:49:49.600",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled.\u00a0Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Todas las versiones de Apache Santuario - XML Security para Java anteriores a 2.2.6, 2.3.4 y 3.0.3, cuando utilizan la API JSR 105, son vulnerables a un problema en el que se puede revelar una clave privada en los archivos de registro al generar un La firma XML y el registro con nivel de depuraci\u00f3n est\u00e1n habilitados. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.2.6, 2.3.4 o 3.0.3, que soluciona este problema."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@apache.org",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.2.6",
+ "matchCriteriaId": "072EA1B9-C0F1-41FC-97B6-6EDA8B7A4A73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.3.0",
+ "versionEndExcluding": "2.3.4",
+ "matchCriteriaId": "BD7B2204-670A-4C24-9A8C-C0445F97ADA1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.0.0",
+ "versionEndExcluding": "3.0.3",
+ "matchCriteriaId": "C09892DB-35BF-41E0-811C-810B8753325C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/20/5",
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55",
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json
index 1ce3cbd3397..f53bdf0458c 100644
--- a/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json
+++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44487",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T14:15:10.883",
- "lastModified": "2023-10-17T01:15:09.887",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-29T04:15:10.827",
+ "vulnStatus": "Undergoing Analysis",
"cisaExploitAdd": "2023-10-10",
"cisaActionDue": "2023-10-31",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@@ -69,6 +69,1836 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.57.0",
+ "matchCriteriaId": "C3BDC297-F023-4E87-8518-B84CCF9DD6A8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.1.100",
+ "matchCriteriaId": "D12D5257-7ED2-400F-9EF7-40E0D3650C2B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1B058776-B5B7-4079-B0AF-23F40926DCEC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D565975-EFD9-467C-B6E3-1866A4EF17A4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D487271-1B5E-4F16-B0CB-A7B8908935C6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BA6ED627-EFB3-4BDD-8ECC-C5947A1470B2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "9.4.53",
+ "matchCriteriaId": "A4A6F189-6C43-462D-85C9-B0EBDA8A4683"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0.0",
+ "versionEndExcluding": "10.0.17",
+ "matchCriteriaId": "C993C920-85C0-4181-A95E-5D965A670738"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.0.0",
+ "versionEndExcluding": "11.0.17",
+ "matchCriteriaId": "08E79A8E-E12C-498F-AF4F-1AAA7135661E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "12.0.0",
+ "versionEndExcluding": "12.0.2",
+ "matchCriteriaId": "F138D800-9A3B-4C76-8A3C-4793083A1517"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.7.5",
+ "matchCriteriaId": "6341DDDA-AD27-4087-9D59-0A212F0037B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.20.10",
+ "matchCriteriaId": "328120E4-C031-44B4-9BE5-03B0CDAA066F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.21.0",
+ "versionEndExcluding": "1.21.3",
+ "matchCriteriaId": "5FD9AB15-E5F6-4DBC-9EC7-D0ABA705802A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
+ "versionEndExcluding": "0.17.0",
+ "matchCriteriaId": "D7D2F801-6F65-4705-BCB9-D057EA54A707"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*",
+ "versionEndExcluding": "0.17.0",
+ "matchCriteriaId": "801F25DA-F38C-4452-8E90-235A3B1A5FF0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "3A7F605E-EB10-40FB-98D6-7E3A95E310BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "783E62F2-F867-48F1-B123-D1227C970674"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A8D90B7-A1AF-4EFB-B688-1563D81E5C6D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "6603ED6A-3366-4572-AFCD-B3D4B1EC7606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "88978E38-81D3-4EFE-8525-A300B101FA69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "0510296F-92D7-4388-AE3A-0D9799C2FC4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "D7698D6C-B1F7-43C1-BBA6-88E956356B3D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A1CC91B-6920-4AF0-9EDD-DD3189E78F4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "05E452AA-A520-4CBE-8767-147772B69194"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "596FC5D5-7329-4E39-841E-CAE937C02219"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "B3C7A168-F370-441E-8790-73014BCEC39F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "CF16FD01-7704-40AB-ACB2-80A883804D22"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1769D69A-CB59-46B1-89B3-FB97DC6DEB9B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "9167FEC1-2C37-4946-9657-B4E69301FB24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7B4B3442-E0C0-48CD-87AD-060E15C9801E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "8FA85EC1-D91A-49DD-949B-2AF7AC813CA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "20662BB0-4C3D-4CF0-B068-3555C65DD06C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "59203EBF-C52A-45A1-B8DF-00E17E3EFB51"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "C8F39403-C259-4D6F-9E9A-53671017EEDB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "220F2D38-FA82-45EF-B957-7678C9FEDBC1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5C698C1C-A3DD-46E2-B05A-12F2604E7F85"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "922AA845-530A-4B4B-9976-4CBC30C8A324"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F938EB43-8373-47EB-B269-C6DF058A9244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "1771493E-ACAA-477F-8AB4-25DB12F6AD6E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "5E86F3D5-65A4-48CE-A6A2-736BBB88E3F8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87670A74-34FE-45DF-A725-25B804C845B3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "C7E422F6-C4C2-43AC-B137-0997B5739030"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "CC3F710F-DBCB-4976-9719-CF063DA22377"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "4B9B76A1-7C5A-453F-A4ED-F1A81BCEBEB5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "88EDFCD9-775C-48FA-9CDA-2B04DA8D0612"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67DB21AE-DF53-442D-B492-C4ED9A20B105"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "4C9FCBCB-9CE0-49E7-85C8-69E71D211912"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "112DFA85-90AD-478D-BD70-8C7C0C074F1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "DB704A1C-D8B7-48BB-A15A-C14DB591FE4A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "21D51D9F-2840-4DEA-A007-D20111A1745C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BC1D037-74D2-4F92-89AD-C90F6CBF440B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "2FBCE2D1-9D93-415D-AB2C-2060307C305A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "8070B469-8CC4-4D2F-97D7-12D0ABB963C1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "A326597E-725D-45DE-BEF7-2ED92137B253"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B235A78-649B-46C5-B24B-AB485A884654"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "98D2CE1E-DED0-470A-AA78-C78EF769C38E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "C966FABA-7199-4F0D-AB8C-4590FE9D2FFF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "84D00768-E71B-4FF7-A7BF-F2C8CFBC900D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "BC36311E-BB00-4750-85C8-51F5A2604F07"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "A65D357E-4B40-42EC-9AAA-2B6CEF78C401"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "D7EF9865-FE65-4DFB-BF21-62FBCE65FF1C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ABBD10E8-6054-408F-9687-B9BF6375CA09"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E6018B01-048C-43BB-A78D-66910ED60CA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "5D2A121F-5BD2-4263-8ED3-1DDE25B5C306"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "0A4F7BAD-3EDD-4DE0-AAB7-DE5ACA34DD79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83794B04-87E2-4CA9-81F5-BB820D0F5395"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D9EC2237-117F-43BD-ADEC-516CF72E04EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "29563719-1AF2-4BB8-8CCA-A0869F87795D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "D24815DD-579A-46D1-B9F2-3BB2C56BC54D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A6E7035-3299-474F-8F67-945EA9A059D0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7A4607BF-41AC-4E84-A110-74E085FF0445"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "441CC945-7CA3-49C0-AE10-94725301E31D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "46BA8E8A-6ED5-4FB2-8BBC-586AA031085A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56FB92F7-FF1E-425D-A5AB-9D9FB0BB9450"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "969C4F14-F6D6-46D6-B348-FC1463877680"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.5.0",
+ "versionEndIncluding": "1.8.2",
+ "matchCriteriaId": "41AD5040-1250-45F5-AB63-63F333D49BCC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8257AA59-C14D-4EC1-B22C-DFBB92CBC297"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "FFF5007E-761C-4697-8D34-C064DF0ABE8D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "910441D3-90EF-4375-B007-D51120A60AB2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "667EB77B-DA13-4BA4-9371-EE3F3A109F38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8A6F9699-A485-4614-8F38-5A556D31617E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "5A90F547-97A2-41EC-9FDF-25F869F0FA38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "E76E1B82-F1DC-4366-B388-DBDF16C586A0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "660137F4-15A1-42D1-BBAC-99A1D5BB398B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C446827A-1F71-4FAD-9422-580642D26AD1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "D47B7691-A95B-45C0-BAB4-27E047F3C379"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "2CD1637D-0E42-4928-867A-BA0FDB6E8462"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "3A599F90-F66B-4DF0-AD7D-D234F328BD59"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3D1B2000-C3FE-4B4C-885A-A5076EB164E1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndIncluding": "15.1.10",
+ "matchCriteriaId": "ECCB8C30-861E-4E48-A5F5-30EE523C1FB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndIncluding": "16.1.4",
+ "matchCriteriaId": "F5FEAD2A-3A58-432E-BEBB-6E3FDE24395F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8AB23AE6-245E-43D6-B832-933F8259F937"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.9.5",
+ "versionEndIncluding": "1.25.2",
+ "matchCriteriaId": "1188B4A9-2684-413C-83D1-E91C75AE0FCF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndIncluding": "2.4.2",
+ "matchCriteriaId": "3337609D-5291-4A52-BC6A-6A8D4E60EB20"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.0.0",
+ "versionEndIncluding": "3.3.0",
+ "matchCriteriaId": "6CF0ABD9-EB28-4966-8C31-EED7AFBF1527"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "r25",
+ "versionEndExcluding": "r29",
+ "matchCriteriaId": "F291CB34-47A4-425A-A200-087CC295AEC8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
+ "matchCriteriaId": "5892B558-EC3A-43FF-A1D5-B2D9F70796F0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
+ "matchCriteriaId": "96BF2B19-52C7-4051-BA58-CAE6F912B72F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.5.0",
+ "versionEndIncluding": "8.5.93",
+ "matchCriteriaId": "ABD26B48-CC80-4FAE-BD3D-78DE4C80C92B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.0.0",
+ "versionEndIncluding": "9.0.80",
+ "matchCriteriaId": "F3EC20B6-B2AB-41F5-9BF9-D16C1FE67C34"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.1.0",
+ "versionEndIncluding": "10.1.13",
+ "matchCriteriaId": "0765CC3D-AB1A-4147-8900-EF4C105321F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*",
+ "matchCriteriaId": "D1AA7FF6-E8E7-4BF6-983E-0A99B0183008"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*",
+ "matchCriteriaId": "57088BDD-A136-45EF-A8A1-2EBF79CEC2CE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*",
+ "matchCriteriaId": "B32D1D7A-A04F-444E-8F45-BB9A9E4B0199"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*",
+ "matchCriteriaId": "2AAD52CE-94F5-4F98-A027-9A7E68818CB6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*",
+ "matchCriteriaId": "F1F981F5-035A-4EDD-8A9F-481EE8BC7FF7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*",
+ "matchCriteriaId": "03A171AF-2EC8-4422-912C-547CDB58CAAA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*",
+ "matchCriteriaId": "538E68C4-0BA4-495F-AEF8-4EF6EE7963CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*",
+ "matchCriteriaId": "49350A6E-5E1D-45B2-A874-3B8601B3ADCC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*",
+ "matchCriteriaId": "5F50942F-DF54-46C0-8371-9A476DD3EEA3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*",
+ "matchCriteriaId": "D12C2C95-B79F-4AA4-8CE3-99A3EE7991AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*",
+ "matchCriteriaId": "98792138-DD56-42DF-9612-3BDC65EEC117"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apple:swiftnio_http\\/2:*:*:*:*:*:swift:*:*",
+ "versionEndExcluding": "1.28.0",
+ "matchCriteriaId": "08190072-3880-4EF5-B642-BA053090D95B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
+ "versionEndExcluding": "1.56.3",
+ "matchCriteriaId": "5F4CDEA9-CB47-4881-B096-DA896E2364F3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
+ "versionStartIncluding": "1.58.0",
+ "versionEndExcluding": "1.58.3",
+ "matchCriteriaId": "DD868DDF-C889-4F36-B5E6-68B6D9EA48CC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*",
+ "matchCriteriaId": "FBD991E2-DB5A-4AAD-95BA-4B5ACB811C96"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0.0",
+ "versionEndExcluding": "6.0.23",
+ "matchCriteriaId": "4496821E-BD55-4F31-AD9C-A3D66CBBD6BD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.0.0",
+ "versionEndExcluding": "7.0.12",
+ "matchCriteriaId": "8DF7ECF6-178D-433C-AA21-BAE9EF248F37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0.0",
+ "versionEndExcluding": "6.0.23",
+ "matchCriteriaId": "1C3418F4-B8BF-4666-BB39-C188AB01F45C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "7.0.0",
+ "versionEndExcluding": "7.0.12",
+ "matchCriteriaId": "1278DD1C-EFA9-4316-AD32-24C1B1FB0CEA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023-10-08",
+ "matchCriteriaId": "3BDFB0FF-0F4A-4B7B-94E8-ED72A8106314"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0",
+ "versionEndExcluding": "17.2.20",
+ "matchCriteriaId": "16A8F269-E07E-402F-BFD5-60F3988A5EAF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.4",
+ "versionEndExcluding": "17.4.12",
+ "matchCriteriaId": "C4B2B972-69E2-4D21-9A7C-B2AFF1D89EB8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.6",
+ "versionEndExcluding": "17.6.8",
+ "matchCriteriaId": "DA5834D4-F52F-41C0-AA11-C974FFEEA063"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.7",
+ "versionEndExcluding": "17.7.5",
+ "matchCriteriaId": "2166106F-ACD6-4C7B-B0CC-977B83CC5F73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+ "versionEndExcluding": "10.0.14393.6351",
+ "matchCriteriaId": "4CD49C41-6D90-47D3-AB4F-4A74169D3A8F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+ "versionEndExcluding": "10.0.14393.6351",
+ "matchCriteriaId": "BAEFEE13-9CD7-46A2-8AF6-0A33C79C05F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.17763.4974",
+ "matchCriteriaId": "E500D59C-6597-45E9-A57B-BE26C0C231D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19044.3570",
+ "matchCriteriaId": "C9F9A643-90C6-489C-98A0-D2739CE72F86"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.19045.3570",
+ "matchCriteriaId": "1814619C-ED07-49E0-A50A-E28D824D43BC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22000.2538",
+ "matchCriteriaId": "100A27D3-87B0-4E72-83F6-7605E3F35E63"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.0.22621.2428",
+ "matchCriteriaId": "C6A36795-0238-45C9-ABE6-3DCCF751915B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
+ "versionStartIncluding": "18.0.0",
+ "versionEndExcluding": "18.18.2",
+ "matchCriteriaId": "C61F0294-5C7E-4DB2-8905-B85D0782F35F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "20.0.0",
+ "versionEndExcluding": "20.8.1",
+ "matchCriteriaId": "69843DE4-4721-4F0A-A9B7-0F6DF5AAA388"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023-10-11",
+ "matchCriteriaId": "B25279EF-C406-4133-99ED-0492703E0A4E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023-10-10",
+ "matchCriteriaId": "9FFFF84B-F35C-43DE-959A-A5D10C3AE9F5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023.10.16.00",
+ "matchCriteriaId": "9DCE8C89-7C22-48CA-AF22-B34C8AA2CB8C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "3.6.1",
+ "matchCriteriaId": "EDEB508E-0EBD-4450-9074-983DDF568AB4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.0.0",
+ "versionEndExcluding": "8.1.9",
+ "matchCriteriaId": "93A1A748-6C71-4191-8A16-A93E94E2CDE4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "9.0.0",
+ "versionEndExcluding": "9.2.3",
+ "matchCriteriaId": "4E4BCAF6-B246-41EC-9EE1-24296BFC4F5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.5.0",
+ "matchCriteriaId": "6F70360D-6214-46BA-AF82-6AB01E13E4E9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.2.2",
+ "matchCriteriaId": "E2DA759E-1AF8-49D3-A3FC-1B426C13CA82"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.17.6",
+ "matchCriteriaId": "28BE6F7B-AE66-4C8A-AAFA-F1262671E9BF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.18.0",
+ "versionEndExcluding": "1.18.3",
+ "matchCriteriaId": "F0C8E760-C8D2-483A-BBD4-6A6D292A3874"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.19.0",
+ "versionEndExcluding": "1.19.1",
+ "matchCriteriaId": "5D0F78BB-6A05-4C97-A8DB-E731B6CC8CC7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023-10-10",
+ "matchCriteriaId": "050AE218-3871-44D6-94DA-12D84C2093CB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.10.5",
+ "matchCriteriaId": "B36BFFB0-C0EC-4926-A1DB-0B711C846A68"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*",
+ "matchCriteriaId": "376EAF9B-E994-4268-9704-0A45EA30270F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*",
+ "matchCriteriaId": "F3D08335-C291-4623-B80C-3B14C4D1FA32"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*",
+ "matchCriteriaId": "21033CEE-CEF5-4B0D-A565-4A6FC764AA6D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*",
+ "versionEndExcluding": "2023-10-11",
+ "matchCriteriaId": "FC4C66B1-42C0-495D-AE63-2889DE0BED84"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:linkerd:linkerd:*:*:*:*:stable:kubernetes:*:*",
+ "versionStartIncluding": "2.12.0",
+ "versionEndIncluding": "2.12.5",
+ "matchCriteriaId": "8633E263-F066-4DD8-A734-90207207A873"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:stable:kubernetes:*:*",
+ "matchCriteriaId": "34A23BD9-A0F4-4D85-8011-EAC93C29B4E8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:stable:kubernetes:*:*",
+ "matchCriteriaId": "27ED3533-A795-422F-B923-68BE071DC00D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:stable:kubernetes:*:*",
+ "matchCriteriaId": "45F7E352-3208-4188-A5B1-906E00DF9896"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:stable:kubernetes:*:*",
+ "matchCriteriaId": "DF89A8AD-66FE-439A-B732-CAAB304D765B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.26.0",
+ "matchCriteriaId": "A400C637-AF18-4BEE-B57C-145261B65DEC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "653A5B08-0D02-4362-A8B1-D00B24C6C6F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B0E6B4B-BAA6-474E-A18C-72C9719CEC1F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0FD736A-8730-446A-BA3A-7B608DB62B0E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4C504B6-3902-46E2-82B7-48AEC9CDD48D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B4BE2D6-43C3-4065-A213-5DB1325DC78F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1D54F5AE-61EC-4434-9D5F-9394A3979894"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE29B9D6-63DC-4779-ACE8-4E51E6A0AF37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E37E1B3-6F68-4502-85D6-68333643BDFF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D5A7736-A403-4617-8790-18E46CB74DA6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "33F13B03-69BF-4A8B-A0A0-7F47FD857461"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9393119E-F018-463F-9548-60436F104195"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC45EE1E-2365-42D4-9D55-92FA24E5ED3A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E567CD9F-5A43-4D25-B911-B5D0440698F4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "68146098-58F8-417E-B165-5182527117C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB4D6790-63E5-4043-B8BE-B489D649061D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "78698F40-0777-4990-822D-02E1B5D0E2C0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B87C8AD3-8878-4546-86C2-BF411876648C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EF03BDE8-602D-4DEE-BA5B-5B20FDF47741"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A58966CB-36AF-4E64-AB39-BE3A0753E155"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "585BC540-073B-425B-B664-5EA4C00AFED6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9B453CF7-9AA6-4B94-A003-BF7AE0B82F53"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD354E32-A8B0-484C-B4C6-9FBCD3430D2D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72A54BDA-311C-413B-8E4D-388AD65A170A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A305F012-544E-4245-9D69-1C8CD37748B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B40CCE4F-EA2C-453D-BB76-6388767E5C6D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EF93A27E-AA2B-4C2E-9B8D-FE7267847326"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B12A3A8-6456-481A-A0C9-524543FCC149"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C2E7E3C-A507-4AB2-97E5-4944D8775CF7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4E22EBF9-AA0D-4712-9D69-DD97679CE835"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "941B114C-FBD7-42FF-B1D8-4EA30E99102C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "339CFB34-A795-49F9-BF6D-A00F3A1A4F63"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8D044DBE-6F5A-4C53-828E-7B1A570CACFF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E23FA47F-B967-44AD-AB76-1BB2CAD3CA5B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
+ "matchCriteriaId": "65203CA1-5225-4E55-A187-6454C091F532"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BF8EFFB-5686-4F28-A68F-1A8854E098CE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5DA9B2E2-958B-478D-87D6-E5CDDCD44315"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3F5FF1E-5DA3-4EC3-B41A-A362BDFC4C69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99B8A88B-0B31-4CFF-AFD7-C9D3DDD5790D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97321212-0E07-4CC2-A917-7B5F61AB9A5A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DF390236-3259-4C8F-891C-62ACC4386CD1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C0AAA300-691A-4957-8B69-F6888CC971B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "45937289-2D64-47CB-A750-5B4F0D4664A0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B129311C-EB4B-4041-B85C-44D5E53FCAA3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F1AB54DB-3FB4-41CB-88ED-1400FD22AB85"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "77675CB7-67D7-44E9-B7FF-D224B3341AA5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A76A2BCE-4AAE-46D7-93D6-2EDE0FC83145"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C877879-B84B-471C-80CF-0656521CA8AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DCC81071-B46D-4F5D-AC25-B4A4CCC20C73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B3000D2-35DF-4A93-9FC0-1AD3AB8349B8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E315FC5C-FF19-43C9-A58A-CF2A5FF13824"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20A6B40D-F991-4712-8E30-5FE008505CB7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B1987BDA-0113-4603-B9BE-76647EB043F2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D482A3D2-6E9B-42BA-9926-35E5BDD5F3BF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "848C92A9-0677-442B-8D52-A448F2019903"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F564701-EDC1-43CF-BB9F-287D6992C6CB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "12B0CF2B-D1E1-4E20-846E-6F0D873499A9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9EFEC7CA-8DDA-48A6-A7B6-1F1D14792890"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E8885C2C-7FB8-40CA-BCB9-B48C50BF2499"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D88B140-D2A1-4A0A-A2E9-1A3B50C295AD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A903C3AD-2D25-45B5-BF4A-A5BEB2286627"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EC5EBD2A-32A3-46D5-B155-B44DCB7F6902"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "10.5.3",
+ "matchCriteriaId": "C2792650-851F-4820-B003-06A4BEA092D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:*",
+ "versionEndExcluding": "3.4.2",
+ "matchCriteriaId": "9F6B63B9-F4C9-4A3F-9310-E0918E1070D1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
+ "versionEndIncluding": "2.414.2",
+ "matchCriteriaId": "E6FF5F80-A991-43D4-B49F-D843E2BC5798"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
+ "versionEndIncluding": "2.427",
+ "matchCriteriaId": "54D25DA9-12D0-4F14-83E6-C69D0293AAB9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "9.4.0",
+ "matchCriteriaId": "8E1AFFB9-C717-4727-B0C9-5A0C281710E2"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -82,7 +1912,42 @@
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/13/9",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/18/4",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/18/8",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/19/6",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/20/8",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://access.redhat.com/security/cve/cve-2023-44487",
@@ -93,7 +1958,11 @@
},
{
"url": "https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Press/Media Coverage",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-011/",
@@ -128,7 +1997,7 @@
"url": "https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Press/Media Coverage"
]
},
{
@@ -157,13 +2026,15 @@
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1216123",
"source": "cve@mitre.org",
"tags": [
- "Issue Tracking"
+ "Issue Tracking",
+ "Vendor Advisory"
]
},
{
"url": "https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9",
"source": "cve@mitre.org",
"tags": [
+ "Mailing List",
"Patch"
]
},
@@ -195,7 +2066,7 @@
"source": "cve@mitre.org",
"tags": [
"Technical Description",
- "Vendor Advisory"
+ "Third Party Advisory"
]
},
{
@@ -209,7 +2080,7 @@
"url": "https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Third Party Advisory"
]
},
{
@@ -232,7 +2103,6 @@
"url": "https://github.com/advisories/GHSA-qppj-fm5r-hxr3",
"source": "cve@mitre.org",
"tags": [
- "Issue Tracking",
"Vendor Advisory"
]
},
@@ -240,6 +2110,8 @@
"url": "https://github.com/advisories/GHSA-vx74-f528-fxqg",
"source": "cve@mitre.org",
"tags": [
+ "Mitigation",
+ "Patch",
"Vendor Advisory"
]
},
@@ -247,6 +2119,7 @@
"url": "https://github.com/advisories/GHSA-xpw8-rcwv-8f8p",
"source": "cve@mitre.org",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
@@ -262,6 +2135,7 @@
"url": "https://github.com/alibaba/tengine/issues/1872",
"source": "cve@mitre.org",
"tags": [
+ "Issue Tracking",
"Vendor Advisory"
]
},
@@ -285,20 +2159,21 @@
"url": "https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Product"
]
},
{
"url": "https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Product"
]
},
{
"url": "https://github.com/apache/trafficserver/pull/10564",
"source": "cve@mitre.org",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
@@ -306,7 +2181,6 @@
"url": "https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487",
"source": "cve@mitre.org",
"tags": [
- "Issue Tracking",
"Vendor Advisory"
]
},
@@ -314,28 +2188,29 @@
"url": "https://github.com/bcdannyboy/CVE-2023-44487",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Third Party Advisory"
]
},
{
"url": "https://github.com/caddyserver/caddy/issues/5877",
"source": "cve@mitre.org",
- "tags": [
- "Vendor Advisory"
- ]
- },
- {
- "url": "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
- "source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
+ {
+ "url": "https://github.com/caddyserver/caddy/releases/tag/v2.7.5",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
+ },
{
"url": "https://github.com/dotnet/announcements/issues/277",
"source": "cve@mitre.org",
"tags": [
+ "Mitigation",
"Vendor Advisory"
]
},
@@ -343,6 +2218,8 @@
"url": "https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73",
"source": "cve@mitre.org",
"tags": [
+ "Product",
+ "Release Notes",
"Vendor Advisory"
]
},
@@ -350,6 +2227,7 @@
"url": "https://github.com/eclipse/jetty.project/issues/10679",
"source": "cve@mitre.org",
"tags": [
+ "Issue Tracking",
"Vendor Advisory"
]
},
@@ -357,6 +2235,7 @@
"url": "https://github.com/envoyproxy/envoy/pull/30055",
"source": "cve@mitre.org",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
@@ -365,6 +2244,7 @@
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
+ "Patch",
"Vendor Advisory"
]
},
@@ -372,6 +2252,7 @@
"url": "https://github.com/facebook/proxygen/pull/466",
"source": "cve@mitre.org",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
@@ -379,6 +2260,7 @@
"url": "https://github.com/golang/go/issues/63417",
"source": "cve@mitre.org",
"tags": [
+ "Issue Tracking",
"Vendor Advisory"
]
},
@@ -386,6 +2268,7 @@
"url": "https://github.com/grpc/grpc-go/pull/6703",
"source": "cve@mitre.org",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
@@ -393,7 +2276,7 @@
"url": "https://github.com/h2o/h2o/pull/3291",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Patch"
]
},
{
@@ -407,6 +2290,7 @@
"url": "https://github.com/haproxy/haproxy/issues/2312",
"source": "cve@mitre.org",
"tags": [
+ "Issue Tracking",
"Vendor Advisory"
]
},
@@ -414,6 +2298,7 @@
"url": "https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244",
"source": "cve@mitre.org",
"tags": [
+ "Product",
"Vendor Advisory"
]
},
@@ -436,13 +2321,14 @@
"url": "https://github.com/kazu-yamamoto/http2/issues/93",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Issue Tracking"
]
},
{
"url": "https://github.com/kubernetes/kubernetes/pull/121120",
"source": "cve@mitre.org",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
@@ -451,6 +2337,7 @@
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
+ "Patch",
"Vendor Advisory"
]
},
@@ -465,13 +2352,15 @@
"url": "https://github.com/micrictor/http2-rst-stream",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Exploit",
+ "Third Party Advisory"
]
},
{
"url": "https://github.com/microsoft/CBL-Mariner/pull/6381",
"source": "cve@mitre.org",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
@@ -479,6 +2368,7 @@
"url": "https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61",
"source": "cve@mitre.org",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
@@ -486,6 +2376,7 @@
"url": "https://github.com/nghttp2/nghttp2/pull/1961",
"source": "cve@mitre.org",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
@@ -493,7 +2384,7 @@
"url": "https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Release Notes"
]
},
{
@@ -523,6 +2414,8 @@
"url": "https://github.com/opensearch-project/data-prepper/issues/3474",
"source": "cve@mitre.org",
"tags": [
+ "Issue Tracking",
+ "Patch",
"Vendor Advisory"
]
},
@@ -530,6 +2423,7 @@
"url": "https://github.com/oqtane/oqtane.framework/discussions/3367",
"source": "cve@mitre.org",
"tags": [
+ "Issue Tracking",
"Vendor Advisory"
]
},
@@ -538,6 +2432,7 @@
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
+ "Patch",
"Vendor Advisory"
]
},
@@ -573,12 +2468,16 @@
},
{
"url": "https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q",
"source": "cve@mitre.org",
"tags": [
+ "Mailing List",
"Vendor Advisory"
]
},
@@ -586,43 +2485,114 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Mailing List"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
"source": "cve@mitre.org"
},
{
- "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/",
"source": "cve@mitre.org"
},
{
- "url": "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
"source": "cve@mitre.org"
},
{
- "url": "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/",
"source": "cve@mitre.org",
"tags": [
"Mailing List"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
+ },
{
"url": "https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html",
"source": "cve@mitre.org",
"tags": [
- "Vendor Advisory"
+ "Third Party Advisory"
]
},
{
"url": "https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/",
"source": "cve@mitre.org",
"tags": [
+ "Patch",
"Vendor Advisory"
]
},
@@ -630,6 +2600,7 @@
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487",
"source": "cve@mitre.org",
"tags": [
+ "Mitigation",
"Patch",
"Vendor Advisory"
]
@@ -645,6 +2616,7 @@
"url": "https://netty.io/news/2023/10/10/4-1-100-Final.html",
"source": "cve@mitre.org",
"tags": [
+ "Release Notes",
"Vendor Advisory"
]
},
@@ -652,6 +2624,7 @@
"url": "https://news.ycombinator.com/item?id=37830987",
"source": "cve@mitre.org",
"tags": [
+ "Issue Tracking",
"Third Party Advisory"
]
},
@@ -659,6 +2632,7 @@
"url": "https://news.ycombinator.com/item?id=37830998",
"source": "cve@mitre.org",
"tags": [
+ "Issue Tracking",
"Press/Media Coverage"
]
},
@@ -666,6 +2640,7 @@
"url": "https://news.ycombinator.com/item?id=37831062",
"source": "cve@mitre.org",
"tags": [
+ "Issue Tracking",
"Third Party Advisory"
]
},
@@ -673,7 +2648,7 @@
"url": "https://news.ycombinator.com/item?id=37837043",
"source": "cve@mitre.org",
"tags": [
- "Third Party Advisory"
+ "Issue Tracking"
]
},
{
@@ -692,7 +2667,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231016-0001/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.paloaltonetworks.com/CVE-2023-44487",
@@ -705,6 +2683,7 @@
"url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14",
"source": "cve@mitre.org",
"tags": [
+ "Release Notes",
"Vendor Advisory"
]
},
@@ -769,6 +2748,7 @@
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"source": "cve@mitre.org",
"tags": [
+ "Mitigation",
"Vendor Advisory"
]
},
diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json
index f54cee31f77..7ae3ee71bf6 100644
--- a/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json
+++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44488",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-30T20:15:10.200",
- "lastModified": "2023-10-12T02:48:57.420",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-23T04:15:12.147",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -166,6 +166,10 @@
"Mailing List"
]
},
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://security.gentoo.org/glsa/202310-04",
"source": "cve@mitre.org",
diff --git a/CVE-2023/CVE-2023-446xx/CVE-2023-44689.json b/CVE-2023/CVE-2023-446xx/CVE-2023-44689.json
index 74f6d726e06..ef07d275c43 100644
--- a/CVE-2023/CVE-2023-446xx/CVE-2023-44689.json
+++ b/CVE-2023/CVE-2023-446xx/CVE-2023-44689.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44689",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-10-11T01:15:08.780",
- "lastModified": "2023-10-11T12:54:12.883",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T01:26:08.613",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,15 +14,80 @@
"value": "Las versiones de la aplicaci\u00f3n e-Gov Client (versi\u00f3n de Windows) anteriores a 2.1.1.0 y las versiones de la aplicaci\u00f3n e-Gov Client (versi\u00f3n de macOS) anteriores a 1.1.1.0 son vulnerables a una autorizaci\u00f3n inadecuada en el controlador del esquema de URL personalizado. Una URL manipulada puede dirigir el producto a acceder a un sitio web arbitrario. Como resultado, el usuario puede convertirse en v\u00edctima de un ataque de phishing."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:e-gov:e-gov:*:*:*:*:*:macos:*:*",
+ "versionEndExcluding": "1.1.1.0",
+ "matchCriteriaId": "4012C390-D23C-4B89-8291-3540FC17B971"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:e-gov:e-gov:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "2.1.1.0",
+ "matchCriteriaId": "A31BFDC2-3D8A-4535-897C-5F6FC78CB5C2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN15808274/",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://shinsei.e-gov.go.jp/contents/news/2023-03-12t1022040900_1318.html",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-446xx/CVE-2023-44690.json b/CVE-2023/CVE-2023-446xx/CVE-2023-44690.json
new file mode 100644
index 00000000000..48a01fc5cb2
--- /dev/null
+++ b/CVE-2023/CVE-2023-446xx/CVE-2023-44690.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-44690",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T22:15:09.830",
+ "lastModified": "2023-10-25T20:32:47.147",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Inadequate encryption strength in mycli 1.27.0 allows attackers to view sensitive information via /mycli/config.py"
+ },
+ {
+ "lang": "es",
+ "value": "La potencia de cifrado inadecuada en mycli 1.27.0 permite a los atacantes ver informaci\u00f3n confidencial a trav\u00e9s de /mycli/config.py"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-326"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dbcli:mycli:1.27.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5FCEBF9F-3FAA-4C7A-B35B-3AA6F62EC328"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/dbcli/mycli/issues/1131",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-446xx/CVE-2023-44693.json b/CVE-2023/CVE-2023-446xx/CVE-2023-44693.json
index a21dcaecca3..506497cb152 100644
--- a/CVE-2023/CVE-2023-446xx/CVE-2023-44693.json
+++ b/CVE-2023/CVE-2023-446xx/CVE-2023-44693.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44693",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T06:15:09.553",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:10:26.627",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,78 @@
"value": "La puerta de enlace de auditor\u00eda de comportamiento de D-Link Online DAR-7000 V31R02B1413C es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /importexport.php."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:dar-7000_firmware:v31r02b1413c:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60829700-F179-41B7-91AE-9CA9D3EA0A55"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:dar-7000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1500AB3C-D11B-4683-86AC-FEB6AF6AD69F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_sql_%20importexport.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-446xx/CVE-2023-44694.json b/CVE-2023/CVE-2023-446xx/CVE-2023-44694.json
index 0f2bafe41d9..31111ceab01 100644
--- a/CVE-2023/CVE-2023-446xx/CVE-2023-44694.json
+++ b/CVE-2023/CVE-2023-446xx/CVE-2023-44694.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44694",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T06:15:09.690",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:10:35.700",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,78 @@
"value": "La puerta de enlace de auditor\u00eda de comportamiento de D-Link Online DAR-7000 V31R02B1413C es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /log/mailrecvview.php."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:dar-7000_firmware:v31r02b1413c:*:*:*:*:*:*:*",
+ "matchCriteriaId": "60829700-F179-41B7-91AE-9CA9D3EA0A55"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:dar-7000:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1500AB3C-D11B-4683-86AC-FEB6AF6AD69F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_rce_%20mailrecvview.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44760.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44760.json
new file mode 100644
index 00000000000..ccd871c444f
--- /dev/null
+++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44760.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-44760",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T22:15:09.257",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS v.9.2.1 allow an attacker to execute arbitrary code via a crafted script to the Header and Footer Tracking Codes of the SEO & Statistics."
+ },
+ {
+ "lang": "es",
+ "value": "M\u00faltiples vulnerabilidades de Cross Site Scripting (XSS) en Concrete CMS v.9.2.1 permiten a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para los c\u00f3digos de seguimiento de encabezado y pie de p\u00e1gina de SEO y estad\u00edsticas."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/ConcreteCMS-Stored-XSS---TrackingCodes",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44763.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44763.json
index 0478854dcf6..844caeebaad 100644
--- a/CVE-2023/CVE-2023-447xx/CVE-2023-44763.json
+++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44763.json
@@ -2,16 +2,16 @@
"id": "CVE-2023-44763",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T12:15:09.870",
- "lastModified": "2023-10-13T16:15:09.727",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T04:15:16.163",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Concrete CMS v9.2.1 is affected by Arbitrary File Upload vulnerability via the Thumbnail\" file upload, which allows Cross-Site Scripting (XSS)."
+ "value": "** DISPUTED ** Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that \"pdf\" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration."
},
{
"lang": "es",
- "value": "Concrete CMS v9.2.1 se ve afectado por una vulnerabilidad de carga arbitraria de archivos a trav\u00e9s de la carga de archivos en Thumbnail\", que permite Cross-Site Scripting (XSS)."
+ "value": "** EN DISPUTA ** Concrete CMS v9.2.1 se ve afectado por una vulnerabilidad de carga arbitraria de archivos mediante la carga de un archivo en miniatura, que permite Cross-Site Scripting (XSS). NOTA: la posici\u00f3n del proveedor es que se supone que el cliente debe saber que \"pdf\" debe excluirse de los tipos de archivos permitidos, aunque pdf sea uno de los tipos de archivos permitidos en la configuraci\u00f3n predeterminada."
}
],
"metrics": {
@@ -75,6 +75,14 @@
"Exploit",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://web.archive.org/web/20231026034159/https://documentation.concretecms.org/user-guide/editors-reference/dashboard/system-and-maintenance/files/allowed-file-types",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.concretecms.org/about/project-news/security/security-advisory-2023-10-25-concrete-cms-rejects-cve-2023-44763",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44767.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44767.json
new file mode 100644
index 00000000000..7fc9a884f17
--- /dev/null
+++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44767.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-44767",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:32.767",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A File upload vulnerability in RiteCMS 3.0 allows a local attacker to upload a SVG file with XSS content."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de carga de archivos en RiteCMS 3.0 permite a un atacante local cargar un archivo SVG con contenido XSS."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/RiteCMS-File-Upload--XSS---Filemanager/blob/main/README.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44769.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44769.json
new file mode 100644
index 00000000000..e7cf069593b
--- /dev/null
+++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44769.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-44769",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:32.813",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Spare aliases from Alias."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en Zenario CMS v.9.4.59197 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para los alias de repuesto de Alias."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sromanhu/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias/tree/main",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Alias/tree/main",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44794.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44794.json
new file mode 100644
index 00000000000..fa027451ec0
--- /dev/null
+++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44794.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-44794",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:32.863",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in Dromara SaToken version 1.36.0 and before allows a remote attacker to escalate privileges via a crafted payload to the URL."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en Dromara SaToken versi\u00f3n 1.36.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de un payload manipulado a la URL."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/dromara/Sa-Token/issues/515",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44808.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44808.json
index d7b5a2b23de..23a8c76211b 100644
--- a/CVE-2023/CVE-2023-448xx/CVE-2023-44808.json
+++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44808.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-44808",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T06:15:11.503",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:11:35.753",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_4507CC function."
+ },
+ {
+ "lang": "es",
+ "value": "D-Link DIR-820L 1.05B03 tiene una vulnerabilidad de desbordamiento de pila en la funci\u00f3n sub_4507CC."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:dir-820l_firmware:1.05b03:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5195E86A-22A4-412B-B22C-614A68942FB5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:dir-820l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88CE60CD-DCDA-43E0-80A9-257557EDBC29"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug3.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44809.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44809.json
index 1bc136e0ebe..d43e7d12ddd 100644
--- a/CVE-2023/CVE-2023-448xx/CVE-2023-44809.json
+++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44809.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-44809",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T06:15:11.783",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:11:43.627",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "D-Link device DIR-820L 1.05B03 is vulnerable to Insecure Permissions."
+ },
+ {
+ "lang": "es",
+ "value": "El dispositivo D-Link DIR-820L 1.05B03 es vulnerable a permisos inseguros."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:dir-820l_firmware:1.05b03:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5195E86A-22A4-412B-B22C-614A68942FB5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:dir-820l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "88CE60CD-DCDA-43E0-80A9-257557EDBC29"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug1.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44821.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44821.json
index d2976bdbb5b..256d89f8118 100644
--- a/CVE-2023/CVE-2023-448xx/CVE-2023-44821.json
+++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44821.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44821",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-09T20:15:10.583",
- "lastModified": "2023-10-10T15:15:10.547",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T16:06:23.780",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -11,18 +11,80 @@
},
{
"lang": "es",
- "value": "La vulnerabilidad de desbordamiento de b\u00fafer en gifsicle v.1.92 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s del par\u00e1metro --crop en los par\u00e1metros de la l\u00ednea de comando."
+ "value": "** EN DISPUTA ** Gifsicle hasta 1.94, si se implementa de una manera que permita que entradas no confiables afecten las llamadas de Gif_Realloc, podr\u00eda permitir una denegaci\u00f3n de servicio (consumo de memoria). NOTA: esto ha sido cuestionado por varias partes porque el c\u00f3digo Gifsicle no se usa com\u00fanmente para operaciones desatendidas en las que llegan nuevas entradas para un proceso de larga duraci\u00f3n, no incluye funcionalidad para vincularlo a otra aplicaci\u00f3n como una librer\u00eda y no tener casos de uso realistas en los que un adversario controla toda la l\u00ednea de comando."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-401"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lcdf:gifsicle:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "1.94",
+ "matchCriteriaId": "47014BE5-591F-41C7-ACC4-E77C24495169"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/kohler/gifsicle/issues/195",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/kohler/gifsicle/issues/65",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44824.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44824.json
index f70cf5e1bba..ca3ee5724d5 100644
--- a/CVE-2023/CVE-2023-448xx/CVE-2023-44824.json
+++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44824.json
@@ -2,23 +2,86 @@
"id": "CVE-2023-44824",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T13:15:11.907",
- "lastModified": "2023-10-17T13:15:11.907",
- "vulnStatus": "Received",
+ "lastModified": "2023-10-23T18:28:46.677",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue in Expense Management System v.1.0 allows a local attacker to execute arbitrary code via a crafted file uploaded to the sign-up.php component."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en Expense Management System v.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado subido al componente sign-up.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:expense_management_system_project:expense_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D530FA0D-288E-4949-8939-E5D363A4C1E9"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://abstracted-howler-727.notion.site/CVE-2023-44824-ab76909b4a0e477b87aa8d0ca4aa4ca7",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://abstracted-howler-727.notion.site/Vulnerability-Description-ccc2e6489a0d43859c61a7982e649da1",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json
index 3d02f3042ca..601734aa4be 100644
--- a/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json
+++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json
@@ -2,15 +2,42 @@
"id": "CVE-2023-44981",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-11T12:15:11.760",
- "lastModified": "2023-10-11T15:15:09.733",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-21T14:15:09.577",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like 'eve@EXAMPLE.COM', the authorization check will be skipped.\u00a0As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it complete read-write access to the data tree.\u00a0Quorum Peer authentication is not enabled by default.\n\nUsers are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes the issue.\n\nAlternately ensure the ensemble election/quorum communication is protected by a firewall as this will mitigate the issue.\n\nSee the documentation for more details on correct cluster administration.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Omisi\u00f3n de Autorizaci\u00f3n a trav\u00e9s de Clave Controlada por el Usuario en Apache ZooKeeper. Si la autenticaci\u00f3n SASL Quorum Peer est\u00e1 habilitada en ZooKeeper (quorum.auth.enableSasl=true), la autorizaci\u00f3n se realiza verificando que la parte de la instancia en el ID de autenticaci\u00f3n SASL aparece en la lista de servidores zoo.cfg. La parte de la instancia en el ID de autenticaci\u00f3n de SASL es opcional y si falta, como 'eve@EXAMPLE.COM', se omitir\u00e1 la verificaci\u00f3n de autorizaci\u00f3n. Como resultado, un endpoint arbitrario podr\u00eda unirse al cl\u00faster y comenzar a propagar cambios falsos al l\u00edder, d\u00e1ndole esencialmente acceso completo de lectura y escritura al \u00e1rbol de datos. La autenticaci\u00f3n de pares de qu\u00f3rum no est\u00e1 habilitada de forma predeterminada. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.9.1, 3.8.3, 3.7.2, que soluciona el problema. Como alternativa, aseg\u00farese de que la comunicaci\u00f3n conjunta entre election y qu\u00f3rum est\u00e9 protegida por un firewall, ya que esto mitigar\u00e1 el problema. Consulte la documentaci\u00f3n para obtener m\u00e1s detalles sobre la correcta administraci\u00f3n del cl\u00faster."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ }
+ ]
+ },
"weaknesses": [
{
"source": "security@apache.org",
@@ -23,13 +50,55 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "3.7.2",
+ "matchCriteriaId": "EBEA9984-BE82-43F4-9FD9-08B3F28E0CAA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.8.0",
+ "versionEndExcluding": "3.8.3",
+ "matchCriteriaId": "58E6D5FE-5D28-44D2-9B6D-5CF5E79A7132"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:zookeeper:3.9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99DE0202-11A5-44F7-99FA-58A71CB896AF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/4",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b",
+ "source": "security@apache.org",
+ "tags": [
+ "Issue Tracking",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00029.html",
"source": "security@apache.org"
}
]
diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44984.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44984.json
index 7afee81538d..bbfcb96b4d1 100644
--- a/CVE-2023/CVE-2023-449xx/CVE-2023-44984.json
+++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44984.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44984",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:44.580",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:48:45.327",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Robin Wilson bbp style pack plugin <=\u00a05.6.7 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenadas en el complemento Robin Wilson bbp style pack en versiones <= 5.6.7."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -36,7 +60,7 @@
},
"weaknesses": [
{
- "source": "audit@patchstack.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,12 +68,43 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:rewweb:bbp_style_pack:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "5.6.8",
+ "matchCriteriaId": "E4E0CF0C-9233-401B-8A73-111489232402"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bbp-style-pack/wordpress-bbp-style-pack-plugin-5-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44985.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44985.json
index 0640ce598c5..5a8f271a95d 100644
--- a/CVE-2023/CVE-2023-449xx/CVE-2023-44985.json
+++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44985.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44985",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:44.653",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:48:52.637",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributo+) Stored Cross-Site Scripting (XSS) vulnerability in Cytech BuddyMeet plugin <=\u00a02.2.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento Cytech BuddyMeet en versiones <= 2.2.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:cytechmobile:buddymeet:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.3.0",
+ "matchCriteriaId": "7618A26C-FFFA-4642-AC44-451058B1E9A2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/buddymeet/wordpress-buddymeet-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44986.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44986.json
index f7cb6ee18d4..60347fa7ceb 100644
--- a/CVE-2023/CVE-2023-449xx/CVE-2023-44986.json
+++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44986.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44986",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:44.727",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:49:39.247",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tyche Softwares Abandoned Cart Lite for WooCommerce plugin <=\u00a05.15.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento Tyche Softwares Abandoned Cart Lite para WooCommerce en versiones <= 5.15.2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -36,7 +60,7 @@
},
"weaknesses": [
{
- "source": "audit@patchstack.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,12 +68,43 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tychesoftwares:abandoned_cart_lite_for_woocommerce:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "5.16.0",
+ "matchCriteriaId": "ACFA3EB8-5A21-496A-92ED-BABB22060743"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-abandoned-cart/wordpress-abandoned-cart-lite-for-woocommerce-plugin-5-15-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44987.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44987.json
index 6045062c82d..d9d0bf59a72 100644
--- a/CVE-2023/CVE-2023-449xx/CVE-2023-44987.json
+++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44987.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44987",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T12:15:10.200",
- "lastModified": "2023-10-16T14:01:11.953",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:54:21.393",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Timely - Appointment software Timely Booking Button plugin <=\u00a02.0.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Timely - Appointment software Timely Booking Button en versiones <= 2.0.2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gettimely:timely_booking_button:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.0.2",
+ "matchCriteriaId": "7DA47202-30A9-4A21-90C4-D14673F61E8D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/timely-booking-button/wordpress-timely-booking-button-plugin-2-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44990.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44990.json
index a68f397ff10..23f55f0c1cd 100644
--- a/CVE-2023/CVE-2023-449xx/CVE-2023-44990.json
+++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44990.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-44990",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-17T10:15:10.017",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T17:56:46.373",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -40,7 +60,7 @@
},
"weaknesses": [
{
- "source": "audit@patchstack.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -48,12 +68,43 @@
"value": "CWE-79"
}
]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:wolf_-_wordpress_posts_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.0.7.2",
+ "matchCriteriaId": "23D2C5C6-BD39-49F3-8246-296BB1955B02"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-plugin-1-0-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44998.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44998.json
index 89186cbe9ea..2291508900f 100644
--- a/CVE-2023/CVE-2023-449xx/CVE-2023-44998.json
+++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44998.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-44998",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-12T13:15:10.163",
- "lastModified": "2023-10-12T16:08:32.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T18:19:41.770",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in josecoelho, Randy Hoyt, steveclarkcouk, Vitaliy Kukin, Eric Le Bail, Tom Ransom Category Meta plugin plugin <=\u00a01.2.8 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento josecoelho, Randy Hoyt, steveclarkcouk, Vitaliy Kukin, Eric Le Bail, Tom Ransom Category Meta en versiones <= 1.2.8."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:randyhoyt:category_meta:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.2.8",
+ "matchCriteriaId": "B780609D-04CF-4279-907B-830551D98961"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-category-meta/wordpress-category-meta-plugin-1-2-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4402.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4402.json
new file mode 100644
index 00000000000..ec074d27b42
--- /dev/null
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4402.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-4402",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:15.637",
+ "lastModified": "2023-10-27T17:37:04.887",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.2.0 via deserialization of untrusted input in the get_products function. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Essential Blocks para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en versiones hasta la 4.2.0 incluida a trav\u00e9s de la deserializaci\u00f3n de entradas que no son de confianza en la funci\u00f3n get_products. Esto permite a atacantes no autenticados inyectar un objeto PHP. No hay ninguna cadena POP presente en el complemento vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.2.1",
+ "matchCriteriaId": "A6D5B2DC-127A-4740-90B9-D64BBB3B7B0D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpdeveloper:essential_blocks_pro:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.1.1",
+ "matchCriteriaId": "020189CD-A546-41F6-9A94-0A487F364ED4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/essential-blocks/trunk/includes/API/Product.php?rev=2950425#L49",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1ede7a25-9bb2-408e-b7fb-e5bd4f594351?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4457.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4457.json
index e69546c264c..27e81a1cfce 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4457.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4457.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-4457",
"sourceIdentifier": "security@grafana.com",
"published": "2023-10-16T10:15:12.057",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T15:17:32.870",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Grafana is an open-source platform for monitoring and observability.\n\nThe Google Sheets data source plugin for Grafana, versions 0.9.0 to 1.2.2 are vulnerable to an information disclosure vulnerability.\n\nThe plugin did not properly sanitize error messages, making it potentially expose the Google Sheet API-key that is configured for the data source.\n\nThis vulnerability was fixed in version 1.2.2.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Grafana es una plataforma de c\u00f3digo abierto para monitorizaci\u00f3n y observabilidad. El complemento de fuente de datos de Google Sheets para Grafana, versiones 0.9.0 a 1.2.2, son afectados por a una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n. El complemento no sanitizo adecuadamente los mensajes de error, lo que potencialmente expuso la clave API de Google Sheet que est\u00e1 configurada para la fuente de datos. Esta vulnerabilidad se solucion\u00f3 en la versi\u00f3n 1.2.2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security@grafana.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-209"
+ }
+ ]
+ },
{
"source": "security@grafana.com",
"type": "Secondary",
@@ -46,10 +80,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grafana:google_sheets:*:*:*:*:*:grafana:*:*",
+ "versionStartIncluding": "0.9.0",
+ "versionEndIncluding": "1.2.2",
+ "matchCriteriaId": "DBCDCF04-9E82-4FF7-BB1B-65011FBC43FC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://grafana.com/security/security-advisories/cve-2023-4457/",
- "source": "security@grafana.com"
+ "source": "security@grafana.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4482.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4482.json
new file mode 100644
index 00000000000..408c1bf702e
--- /dev/null
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4482.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-4482",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:15.747",
+ "lastModified": "2023-10-27T17:39:57.883",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Auto Amazon Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the style parameter in versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Auto Amazon Links para WordPress es vulnerable a Cross- Site Scripting (XSS) Almacenado a trav\u00e9s del par\u00e1metro de estilo en versiones hasta la 5.3.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados con acceso de colaborador inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:michaeluno:auto_amazon_links:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "5.3.2",
+ "matchCriteriaId": "8E7BC3DD-7594-4B11-B7B0-BF6E3DE87FCA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2961861%40amazon-auto-links%2Ftrunk&old=2896127%40amazon-auto-links%2Ftrunk&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11ffb8a1-55d2-44c5-bcd2-ba866b94e8bc?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4488.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4488.json
new file mode 100644
index 00000000000..13d437f1133
--- /dev/null
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4488.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-4488",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:15.850",
+ "lastModified": "2023-10-27T17:11:40.553",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Dropbox Folder Share for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 1.9.7 via the editor-view.php file. This allows unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
+ },
+ {
+ "lang": "es",
+ "value": "Dropbox Folder Share para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en versiones hasta la 1.9.7 incluida a trav\u00e9s del archivo editor-view.php. Esto permite a atacantes no autenticados incluir y ejecutar archivos arbitrarios en el servidor, permitiendo la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en los casos en que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-829"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-98"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hynotech:dropbox_folder_share:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.9.7",
+ "matchCriteriaId": "6E579DB2-9551-4253-889A-60B2BCF77075"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/dropbox-folder-share/trunk/HynoTech/UsosGenerales/js/editor-view.php?rev=2904670",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/647a2f27-092a-4db1-932d-87ae8c2efcca?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4490.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4490.json
index 1e5d40ca606..f37c40acedf 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4490.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4490.json
@@ -2,16 +2,16 @@
"id": "CVE-2023-4490",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-09-25T16:15:15.137",
- "lastModified": "2023-09-26T14:42:40.110",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-18T10:15:08.827",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "The WP Job Portal WordPress plugin through 2.0.3 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users"
+ "value": "The WP Job Portal WordPress plugin before 2.0.6 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users"
},
{
"lang": "es",
- "value": "El complemento de WordPress WP Job Portal hasta la versi\u00f3n 2.0.3 no sanitiza y escapa un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que genera una inyecci\u00f3n de SQL explotable por usuarios no autenticados."
+ "value": "El complemento WP Job Portal de WordPress anterior a 2.0.6 no sanitiza ni escapa un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que genera una inyecci\u00f3n de SQL explotable por usuarios no autenticados."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4499.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4499.json
index 43544898e97..4464568e598 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4499.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4499.json
@@ -2,19 +2,182 @@
"id": "CVE-2023-4499",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-10-13T17:15:09.653",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:18:31.937",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A potential security vulnerability has been identified in the HP ThinUpdate utility (also known as HP Recovery Image and Software Download Tool) which may lead to information disclosure. HP is releasing mitigation for the potential vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha identificado una posible vulnerabilidad de seguridad en la utilidad HP ThinUpdate (tambi\u00e9n conocida como herramienta de descarga de software e im\u00e1genes de recuperaci\u00f3n de HP) que puede provocar la divulgaci\u00f3n de informaci\u00f3n. HP est\u00e1 lanzando medidas de mitigaci\u00f3n para la posible vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-295"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hp:thinupdate:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.7.15",
+ "matchCriteriaId": "81562855-687E-455C-8B1E-80DA06D50DDB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:elite_mt645:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6383BB5-0A11-4CAB-BCAF-AE7313224F0E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:mt21:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E6E137D9-11DA-4D32-8D47-33437C4B9B78"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:mt22:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6770B1E2-599A-42B6-A8B9-B6BAE0392AFA"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:mt31:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37419335-DB36-47F4-8D76-7383265ABBBF"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:mt32:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FE7D0BF7-E4FD-45DB-8434-E1E1D14C8D9F"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:mt43:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A807E9A-FF72-4FDF-91CB-B95A3BA444E8"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:mt44:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D5C09F1C-7BE6-4EEA-9E4C-54E638AB288A"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:mt45:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AD51E634-1DC3-468D-BA97-2390C37C1244"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:mt46:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E424F17B-06C0-4630-8797-14FEC810AD08"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:pro_mt440_g3:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CD2DA81-481B-4A5A-835F-EE3A37FEE9EB"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:t430:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA282389-B256-4E59-966A-F45533AB0D0E"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:t530:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F2EEE389-8B47-4988-9C13-7D78302BF4D9"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:t540:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BFDD3D12-908A-4165-8099-D2E81C938CD6"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:t628:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E211855B-CC97-4465-BB6B-6A21BE49EB8B"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:t630:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0EFFE956-921E-43DE-B4A5-97DDCC12B69C"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:t638:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D2328866-4483-4586-91A2-CEBABDA87426"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:t640:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6912F54-14EE-462B-B288-5E764BCB67DC"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:t730:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7755FA5A-34A1-43B4-ABE3-34166A706B02"
+ },
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:hp:t740:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD4CF900-3C60-4D6E-8AFC-1B857572B3DF"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_9440593-9440618-16",
- "source": "hp-security-alert@hp.com"
+ "source": "hp-security-alert@hp.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45003.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45003.json
index 14afa9bf3a9..7b186cbb62f 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45003.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45003.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45003",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-17T11:15:10.637",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:08:51.807",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Arrow Plugins Social Feed | Custom Feed for Social Media Networks plugin <=\u00a02.2.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en Arrow Plugins Social Feed | Custom Feed para el componente Social Media Networks en versiones <= 2.2.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:arrowplugins:social_feed:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.2.0",
+ "matchCriteriaId": "404C7780-412E-4B26-8B02-C2D79A035E32"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-social-feed/wordpress-social-feed-plugin-2-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45004.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45004.json
index 5ca973fdcfe..9fbcc6b0ce7 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45004.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45004.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45004",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-17T12:15:10.113",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T17:13:10.327",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in wp3sixty Woo Custom Emails plugin <=\u00a02.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento wp3sixty Woo Custom Emails en versiones <= 2.2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wp3sixty:woo_custom_emails:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.2",
+ "matchCriteriaId": "A31EB092-4D15-45E9-B61E-C538EBC7CB44"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woo-custom-emails/wordpress-woo-custom-emails-plugin-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45005.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45005.json
index 3363074c124..41d153c3df6 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45005.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45005.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45005",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-17T10:15:10.093",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:11:32.280",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -50,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:castos:seriously_simple_stats:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.5.1",
+ "matchCriteriaId": "B6B55485-1710-4ADE-AEF1-EAD8B3120C98"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/seriously-simple-stats/wordpress-seriously-simple-stats-plugin-1-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45006.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45006.json
index 0ed5e364643..a68f1613574 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45006.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45006.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45006",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-17T12:15:10.190",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T17:30:12.720",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ByConsole WooODT Lite \u2013 WooCommerce Order Delivery or Pickup with Date Time Location plugin <=\u00a02.4.6 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en ByConsole WooODT Lite \u2013 WooCommerce Order Delivery or Pickup con Date Time Location en versiones <= 2.4.6."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:byconsole:wooodt_lite:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.4.6",
+ "matchCriteriaId": "E7B6CC2C-EC45-41D9-BF00-A55DF5FC0796"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/byconsole-woo-order-delivery-time/wordpress-wooodt-lite-plugin-2-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45007.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45007.json
index 63db19d2356..3b8d145cef8 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45007.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45007.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45007",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-17T12:15:10.267",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T18:29:57.143",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fotomoto plugin <=\u00a01.2.8 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Fotomoto en versiones <= 1.2.8."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:fotomoto:fotomoto:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.2.8",
+ "matchCriteriaId": "752ED275-9359-4217-9ED2-FDC017081997"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/fotomoto/wordpress-fotomoto-plugin-1-2-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45008.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45008.json
new file mode 100644
index 00000000000..fc7e9f15df8
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45008.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45008",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T08:15:07.947",
+ "lastModified": "2023-10-18T12:46:22.630",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPJohnny Comment Reply Email plugin <=\u00a01.0.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento WPJohnny Comment Reply Email en versiones <= 1.0.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/comment-reply-email/wordpress-comment-reply-email-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45010.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45010.json
index 8b25db9bbf1..5ea310f6787 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45010.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45010.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45010",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-17T11:15:10.730",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T18:33:32.733",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alex MacArthur Complete Open Graph plugin <=\u00a03.4.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Alex MacArthur Complete Open Graph en versiones <= 3.4.5."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:alexmacarthur:complete_open_graph:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.4.5",
+ "matchCriteriaId": "AC2F8F7B-DB89-42CB-B541-83B270260D01"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/complete-open-graph/wordpress-complete-open-graph-plugin-3-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45011.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45011.json
index db7a4a4aa3a..ba65b441c7e 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45011.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45011.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45011",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-12T13:15:10.353",
- "lastModified": "2023-10-12T16:08:32.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T18:30:32.640",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Igor Buyanov WP Power Stats plugin <=\u00a02.2.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Igor Buyanov WP Power Stats en versiones <= 2.2.3."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:websivu:wp_power_stats:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.2.3",
+ "matchCriteriaId": "3A00DDB4-AD4D-4F81-8A3B-4DA95001ABD1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-power-stats/wordpress-wp-power-stats-plugin-2-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45048.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45048.json
index 470d1a66a4b..db8f6b38c50 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45048.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45048.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45048",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-12T13:15:10.440",
- "lastModified": "2023-10-12T16:08:32.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T18:40:47.370",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Repuso Social proof testimonials and reviews by Repuso plugin <=\u00a05.00 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Repuso Social proof testimonials and reviews de Repuso en versiones <= 5.00."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:repuso:repuso:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "5.00",
+ "matchCriteriaId": "EF0CFCB5-03B5-488B-B9CC-171FA3A41E86"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/social-testimonials-and-reviews-widget/wordpress-social-proof-testimonials-and-reviews-by-repuso-plugin-4-97-cross-site-request-forgery-csrf?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45049.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45049.json
new file mode 100644
index 00000000000..b8ce217c555
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45049.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45049",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T08:15:08.030",
+ "lastModified": "2023-10-25T17:38:26.757",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Ciprian Popescu YouTube Playlist Player plugin <=\u00a04.6.7 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento Ciprian Popescu YouTube Playlist Player en versiones <= 4.6.7."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:getbutterfly:youtube_playlist_player:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.6.8",
+ "matchCriteriaId": "A0668F69-D903-467A-9A7C-6278CFD37D64"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/youtube-playlist-player/wordpress-youtube-playlist-player-plugin-4-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45051.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45051.json
new file mode 100644
index 00000000000..b5d2adae308
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45051.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45051",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T09:15:08.837",
+ "lastModified": "2023-10-25T17:38:21.743",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Image vertical reel scroll slideshow plugin <=\u00a09.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Gopi Ramasamy Image vertical reel scroll slideshow en versiones <= 9.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gopiplus:image_vertical_reel_scroll_slideshow:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "9.0",
+ "matchCriteriaId": "EF8BADC6-2A84-45CB-A733-DAF8C28EE40D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/image-vertical-reel-scroll-slideshow/wordpress-image-vertical-reel-scroll-slideshow-plugin-9-0-cross-site-scripting-xss?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45052.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45052.json
index 767978d9a8e..c32453bc0ef 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45052.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45052.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45052",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-12T13:15:10.543",
- "lastModified": "2023-10-12T16:08:32.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T18:46:40.420",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in dan009 WP Bing Map Pro plugin <\u00a05.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento dan009 WP Bing Map Pro en versiones < 5.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dan009:wp_bing_map_pro:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "5.0",
+ "matchCriteriaId": "52F8C521-26A9-4A6E-8881-A4FC4A9C9868"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/api-bing-map-2018/wordpress-wp-bing-map-pro-plugin-5-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45054.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45054.json
new file mode 100644
index 00000000000..641050a0cf0
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45054.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45054",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T09:15:08.977",
+ "lastModified": "2023-10-25T17:38:17.183",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in AWESOME TOGI Product Category Tree plugin <=\u00a02.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento AWESOME TOGI Product Category Tree en versiones <= 2.5."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:awesometogi:product-category-tree:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.5",
+ "matchCriteriaId": "E1A521C1-ECEC-403A-9D3B-EB9C6D175946"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/product-category-tree/wordpress-product-category-tree-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45056.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45056.json
new file mode 100644
index 00000000000..26b04c83e85
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45056.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-45056",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T09:15:09.160",
+ "lastModified": "2023-10-25T17:38:11.073",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in 100plugins Open User Map plugin <=\u00a01.3.26 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Open User Map de 100plugins en versiones <= 1.3.26."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:100plugins:open_user_map:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.3.27",
+ "matchCriteriaId": "73646E01-9B66-439B-A4FD-09149FE70227"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/open-user-map/wordpress-open-user-map-plugin-1-3-24-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45057.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45057.json
new file mode 100644
index 00000000000..6a95c9f9625
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45057.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45057",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T09:15:09.247",
+ "lastModified": "2023-10-25T17:38:03.887",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Hitsteps Web Analytics plugin <=\u00a05.86 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Hitsteps Web Analytics en versiones <= 5.86."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hitsteps:web_analytics:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "5.86",
+ "matchCriteriaId": "C2E2E094-13C2-4E58-8DD0-644B7248AEE0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/hitsteps-visitor-manager/wordpress-hitsteps-web-analytics-plugin-5-85-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45058.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45058.json
index 65fdf3fd059..0be73cf1149 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45058.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45058.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45058",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-12T13:15:10.713",
- "lastModified": "2023-10-12T16:08:32.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T18:58:04.030",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in KaizenCoders Short URL plugin <=\u00a01.6.8 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento KaizenCoders Short URL en versiones <= 1.6.8."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:kaizencoders:short_url:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.6.8",
+ "matchCriteriaId": "2F3D4928-A152-4031-B6D4-ACA8CBA1DA44"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/shorten-url/wordpress-short-url-plugin-1-6-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45059.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45059.json
new file mode 100644
index 00000000000..233beb97248
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45059.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45059",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T09:15:09.327",
+ "lastModified": "2023-10-25T17:37:52.970",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Gumroad plugin <=\u00a03.1.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento Gumroad en versiones <= 3.1.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gumroad:gumroad:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.1.0",
+ "matchCriteriaId": "985F2DEF-2356-4BFD-A61E-9B35C4A8DA54"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/gumroad/wordpress-gumroad-plugin-3-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45060.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45060.json
index 068353a336e..def45995df4 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45060.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45060.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45060",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-12T13:15:10.800",
- "lastModified": "2023-10-12T16:08:32.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T19:13:36.640",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com Interactive World Map plugin <=\u00a03.2.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Fla-shop.Com Interactive World Map en versiones <= 3.2.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:fla-shop:interactive_world_map:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.2.0",
+ "matchCriteriaId": "D97398AD-7E99-4335-B0AF-F4A98E620EC0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/interactive-world-map/wordpress-interactive-world-map-plugin-3-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45062.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45062.json
new file mode 100644
index 00000000000..2bc65edf85b
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45062.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45062",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T09:15:09.397",
+ "lastModified": "2023-10-25T17:37:45.560",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Thomas Scholl canvasio3D Light plugin <=\u00a02.4.6 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Thomas Scholl canvasio3D Light en versiones <= 2.4.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:virtuellwerk:canvasio3d_light:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.4.6",
+ "matchCriteriaId": "9A020DDF-B7E8-4116-B6AD-F2324C216D70"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/canvasio3d-light/wordpress-canvasio3d-light-plugin-2-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45063.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45063.json
index ad5bfd2bbf1..4e06a2fe58d 100644
--- a/CVE-2023/CVE-2023-450xx/CVE-2023-45063.json
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45063.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45063",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-12T13:15:10.897",
- "lastModified": "2023-10-12T16:08:32.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T19:36:56.687",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in ReCorp AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One plugin <=\u00a01.1.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento ReCorp AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One en versiones <= 1.1.5."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:rayhan1:ai_content_writing_assistant:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.5",
+ "matchCriteriaId": "011672BA-1A2C-497C-87E2-A45C3E4429DE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ai-content-writing-assistant/wordpress-ai-content-writing-assistant-content-writer-chatgpt-image-generator-all-in-one-plugin-1-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45064.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45064.json
new file mode 100644
index 00000000000..24a1d12de43
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45064.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45064",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T09:15:09.567",
+ "lastModified": "2023-10-25T17:32:21.407",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Daisuke Takahashi(Extend Wings) OPcache Dashboard plugin <=\u00a00.3.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento OPcache Dashboard de Daisuke Takahashi (Extend Wings) en versiones <= 0.3.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:extendwings:opcache_dashboard:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "0.3.1",
+ "matchCriteriaId": "E1D900BD-96BD-4270-BD51-633EF6F56EA6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/opcache/wordpress-opcache-dashboard-plugin-0-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45065.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45065.json
new file mode 100644
index 00000000000..a63c85dff9b
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45065.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45065",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T13:15:08.987",
+ "lastModified": "2023-10-25T17:23:09.210",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Mad Fish Digital Bulk NoIndex & NoFollow Toolkit plugin <=\u00a01.42 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Mad Fish Digital Bulk NoIndex & NoFollow Toolkit en versiones <= 1.42."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:madfishdigital:bulk_noindex_\\&_nofollow_toolkit:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.5",
+ "matchCriteriaId": "04E83935-4259-4FEF-9F58-C2FADCD7ECCA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/bulk-noindex-nofollow-toolkit-by-mad-fish/wordpress-bulk-noindex-nofollow-toolkit-plugin-1-42-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45067.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45067.json
new file mode 100644
index 00000000000..f5f8ebd60a4
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45067.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-45067",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T13:15:09.060",
+ "lastModified": "2023-10-25T17:22:34.010",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Ashish Ajani WordPress Simple HTML Sitemap plugin <=\u00a02.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento Ashish Ajani WordPress Simple HTML Sitemap en versiones <= 2.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:freelancer-coder:wordpress_simple_html_sitemap:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.1",
+ "matchCriteriaId": "93CD202D-4EAE-47E1-AA06-105B9CE2D231"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wp-simple-html-sitemap/wordpress-wordpress-simple-html-sitemap-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45070.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45070.json
new file mode 100644
index 00000000000..ad9ed1bd523
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45070.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45070",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T13:15:09.143",
+ "lastModified": "2023-10-25T13:41:05.087",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in 10Web Form Builder Team Form Maker by 10Web \u2013 Mobile-Friendly Drag & Drop Contact Form Builder plugin <=\u00a01.15.18 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento 0Web Form Builder Team Form Maker by 10Web \u2013 Mobile-Friendly Drag & Drop Contact Form Builder en versiones <= 1.15.18."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.15.19",
+ "matchCriteriaId": "6F8DB2EE-210C-424F-BDA7-D35F46FF7069"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-by-10web-mobile-friendly-drag-drop-contact-form-builder-plugin-1-15-18-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45071.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45071.json
new file mode 100644
index 00000000000..365fe3834cf
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45071.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45071",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T13:15:09.220",
+ "lastModified": "2023-10-25T13:42:31.590",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Stored Cross-Site Scripting (XSS) vulnerability in 10Web Form Builder Team Form Maker by 10Web \u2013 Mobile-Friendly Drag & Drop Contact Form Builder plugin <=\u00a01.15.18 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenada No Autenticada en el complemento 10Web Form Builder Team Form Maker by 10Web \u2013 Mobile-Friendly Drag & Drop Contact Form Builder en versiones <= 1.15.18."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.15.19",
+ "matchCriteriaId": "6F8DB2EE-210C-424F-BDA7-D35F46FF7069"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-by-10web-mobile-friendly-drag-drop-contact-form-builder-plugin-1-15-18-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45072.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45072.json
new file mode 100644
index 00000000000..a73f98c42a2
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45072.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45072",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T13:15:09.323",
+ "lastModified": "2023-10-25T01:23:28.640",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kardi Order auto complete for WooCommerce plugin <=\u00a01.2.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en Kardi Order auto complete para WooCommerce en versiones <= 1.2.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:order_auto_complete_for_woocommerce_project:order_auto_complete_for_woocommerce:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.2.0",
+ "matchCriteriaId": "291DA663-306F-4392-A057-FF8F588C2507"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/order-auto-complete-for-woocommerce/wordpress-order-auto-complete-for-woocommerce-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45073.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45073.json
new file mode 100644
index 00000000000..a1fb94a7cb0
--- /dev/null
+++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45073.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45073",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T13:15:09.407",
+ "lastModified": "2023-10-25T01:23:36.603",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Michael Koch Mendeley Plugin plugin <=\u00a01.3.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Michael Koch Mendeley Plugin en versiones <= 1.3.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:kochm:mendeley_plugin:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.3.2",
+ "matchCriteriaId": "F34CAD6A-498B-4A06-96D8-9B54BCEB4742"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/mendeleyplugin/wordpress-mendeley-plugin-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45107.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45107.json
index f6477c93555..47b172463eb 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45107.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45107.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45107",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T13:15:11.663",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T16:09:15.537",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in GoodBarber plugin <=\u00a01.0.22 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento GoodBarber en versiones <= 1.0.22."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:goodbarber:goodbarber:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.0.22",
+ "matchCriteriaId": "29AAFCB7-2D0E-4279-9F84-1FF00E5A1B71"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/goodbarber/wordpress-goodbarber-plugin-1-0-22-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45108.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45108.json
index 64b10e188b6..8064b5493af 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45108.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45108.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45108",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T13:15:11.750",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T16:09:24.633",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Mailrelay plugin <=\u00a02.1.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Mailrelay en versiones <= 2.1.1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mailrelay:mailrelay:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.1.1",
+ "matchCriteriaId": "2DC698CC-8A32-4CEB-A5D6-A496646AB70D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mailrelay/wordpress-mailrelay-plugin-2-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45109.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45109.json
index 76912703139..aa4f09ebbae 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45109.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45109.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45109",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T14:15:10.193",
- "lastModified": "2023-10-13T14:44:03.987",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T16:05:00.017",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in ZAKSTAN WhitePage plugin <=\u00a01.1.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento ZAKSTAN WhitePage en versiones <= 1.1.5."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:myback.link:whitepage:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.5",
+ "matchCriteriaId": "DFF5644D-0359-48E0-9E97-98EAFE8543BF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/white-page-publication/wordpress-whitepage-plugin-1-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45128.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45128.json
index 16aa6552e8f..2388d65b5c9 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45128.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45128.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45128",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T21:15:11.137",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T15:26:25.743",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -62,14 +82,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gofiber:fiber:*:*:*:*:*:go:*:*",
+ "versionEndExcluding": "2.50.0",
+ "matchCriteriaId": "D4CF7CB2-A259-42A1-A42F-26170DCC266D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-94w9-97p3-p368",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mitigation",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45129.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45129.json
index 4b3bb9d418a..4c596277608 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45129.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45129.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45129",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-10T18:15:19.093",
- "lastModified": "2023-10-10T18:20:50.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-26T19:46:43.890",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Prior to version 1.94.0, a malicious server ACL event can impact performance temporarily or permanently leading to a persistent denial of service. Homeservers running on a closed federation (which presumably do not need to use server ACLs) are not affected. Server administrators are advised to upgrade to Synapse 1.94.0 or later. As a workaround, rooms with malicious server ACL events can be purged and blocked using the admin API."
+ },
+ {
+ "lang": "es",
+ "value": "Synapse es un servidor dom\u00e9stico Matrix de c\u00f3digo abierto escrito y mantenido por la Fundaci\u00f3n Matrix.org. Antes de la versi\u00f3n 1.94.0, un evento de ACL de servidor malicioso pod\u00eda afectar el rendimiento de forma temporal o permanente y provocar una denegaci\u00f3n de servicio persistente. Los servidores dom\u00e9sticos que se ejecutan en una federaci\u00f3n cerrada (que presumiblemente no necesitan usar ACL de servidor) no se ven afectados. Se recomienda a los administradores del servidor que actualicen a Synapse 1.94.0 o posterior. Como workaround, las salas con eventos de ACL de servidor maliciosos se pueden eliminar y bloquear mediante la API de administraci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -36,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,20 +68,92 @@
"value": "CWE-770"
}
]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-770"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.94.0",
+ "matchCriteriaId": "3493E32E-7CAA-4B40-9763-DA34F4209328"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://github.com/matrix-org/synapse/pull/16360",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/matrix-org/synapse/security/advisories/GHSA-5chr-wjw5-3gq4",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEVRB4MG5UXQ5RLZHSUJXM5GWEBYYS5B/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WRO4MPQ6HOXIUZM6RJP6VTCTMV7RD2T3/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://matrix-org.github.io/synapse/latest/admin_api/rooms.html#version-2-new-version",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45130.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45130.json
index 7152ac4cf48..d0c6cd67118 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45130.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45130.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45130",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-13T13:15:11.827",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T13:56:46.973",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Frontier is Substrate's Ethereum compatibility layer. Prior to commit aea528198b3b226e0d20cce878551fd4c0e3d5d0, at the end of a contract execution, when opcode SUICIDE marks a contract to be deleted, the software uses `storage::remove_prefix` (now renamed to `storage::clear_prefix`) to remove all storages associated with it. This is a single IO primitive call passing the WebAssembly boundary. For large contracts, the call (without providing a `limit` parameter) can be slow. In addition, for parachains, all storages to be deleted will be part of the PoV, which easily exceed relay chain PoV size limit. On the other hand, Frontier's maintainers only charge a fixed cost for opcode SUICIDE. The maintainers consider the severity of this issue high, because an attacker can craft a contract with a lot of storage values on a parachain, and then call opcode SUICIDE on the contract. If the transaction makes into a parachain block, the parachain will then stall because the PoV size will exceed relay chain's limit. This is especially an issue for XCM transactions, because they can't be skipped. Commit aea528198b3b226e0d20cce878551fd4c0e3d5d0 contains a patch for this issue. For parachains, it's recommended to issue an emergency runtime upgrade as soon as possible. For standalone chains, the impact is less severe because the issue mainly affects PoV sizes. It's recommended to issue a normal runtime upgrade as soon as possible. There are no known workarounds."
+ },
+ {
+ "lang": "es",
+ "value": "Frontier es la capa de compatibilidad con Ethereum de Substrate. Antes del commit aea528198b3b226e0d20cce878551fd4c0e3d5d0, al final de la ejecuci\u00f3n de un contrato, cuando el c\u00f3digo de operaci\u00f3n SUICIDE marca un contrato para ser eliminado, el software utiliza `storage::remove_prefix` (ahora renombrado a `storage::clear_prefix`) para eliminar todos los almacenamientos asociados con \u00e9l. Esta es una \u00fanica llamada primitiva de IO que pasa el l\u00edmite de WebAssembly. Para contratos grandes, la llamada (sin proporcionar un par\u00e1metro de \"limit\") puede ser lenta. Adem\u00e1s, para las parachains, todos los almacenamientos que se eliminar\u00e1n formar\u00e1n parte del PoV, que excede f\u00e1cilmente el l\u00edmite de tama\u00f1o de PoV de la cadena de retransmisi\u00f3n. Por otro lado, los mantenedores de Frontier solo cobran un costo fijo por el c\u00f3digo de operaci\u00f3n SUICIDE. Los mantenedores consideran que la gravedad de este problema es alta, porque un atacante puede crear un contrato con muchos valores de almacenamiento en una parachain y luego llamar al c\u00f3digo de operaci\u00f3n SUICIDE en el contrato. Si la transacci\u00f3n se convierte en un bloque de parachain, la parachain se detendr\u00e1 porque el tama\u00f1o del PoV exceder\u00e1 el l\u00edmite de la cadena de retransmisi\u00f3n. Esto es especialmente un problema para las transacciones XCM, porque no se pueden omitir. El commit aea528198b3b226e0d20cce878551fd4c0e3d5d0 contiene un parche para este problema. Para las parachains, se recomienda publicar una actualizaci\u00f3n de emergencia del tiempo de ejecuci\u00f3n lo antes posible. Para las cadenas independientes, el impacto es menos grave porque el problema afecta principalmente a los tama\u00f1os de PoV. Se recomienda publicar una actualizaci\u00f3n del tiempo de ejecuci\u00f3n normal lo antes posible. No se conocen workarounds."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -36,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,20 +68,59 @@
"value": "CWE-770"
}
]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-770"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:parity:frontier:*:*:*:*:*:rust:*:*",
+ "versionEndIncluding": "0.1.0",
+ "matchCriteriaId": "20043267-E766-4C8E-B0BD-3F91289C2F4C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://github.com/paritytech/frontier/commit/aea528198b3b226e0d20cce878551fd4c0e3d5d0",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/paritytech/frontier/pull/1212",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/paritytech/frontier/security/advisories/GHSA-gc88-2gvv-gp3v",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45131.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45131.json
index 21a31d23339..b975c86d285 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45131.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45131.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45131",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T22:15:12.650",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:55:24.940",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -40,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -50,10 +80,36 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
+ "versionEndIncluding": "3.1.1",
+ "matchCriteriaId": "6AC25048-A9DA-4EB4-A05B-33B6348539CA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:discourse:discourse:3.2.0:beta1:*:*:beta:*:*:*",
+ "matchCriteriaId": "1BFF647B-6CEF-43BF-BF5E-C82B557F78E2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/discourse/discourse/security/advisories/GHSA-84gf-hhrc-9pw6",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45132.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45132.json
index 7d8d27e5b46..5467d5fd654 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45132.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45132.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45132",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-11T21:15:10.207",
- "lastModified": "2023-10-11T22:13:59.567",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T02:38:01.093",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "NAXSI is an open-source maintenance web application firewall (WAF) for NGINX. An issue present starting in version 1.3 and prior to version 1.6 allows someone to bypass the WAF when a malicious `X-Forwarded-For` IP matches `IgnoreIP` `IgnoreCIDR` rules. This old code was arranged to allow older NGINX versions to also support `IgnoreIP` `IgnoreCIDR` when multiple reverse proxies were present. The issue is patched in version 1.6. As a workaround, do not set any `IgnoreIP` `IgnoreCIDR` for older versions.\n"
+ },
+ {
+ "lang": "es",
+ "value": "NAXSI es un firewall de aplicaciones web (WAF) de mantenimiento de c\u00f3digo abierto para NGINX. Un problema est\u00e1 presente a partir de la versi\u00f3n 1.3 y anteriores a la versi\u00f3n 1.6 permite que alguien omita el WAF cuando una IP maliciosa `X-Forwarded-For` coincide con las reglas `IgnoreIP` `IgnoreCIDR`. Este c\u00f3digo antiguo se organiz\u00f3 para permitir que las versiones anteriores de NGINX tambi\u00e9n admitieran `IgnoreIP` `IgnoreCIDR` cuando hab\u00eda varios servidores proxy inversos presentes. El problema se solucion\u00f3 en la versi\u00f3n 1.6. Como workaround, no configure ning\u00fan `IgnoreIP` `IgnoreCIDR` para versiones anteriores."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -36,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -46,18 +80,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wargio:naxsi:*:*:*:*:*:nginx:*:*",
+ "versionStartIncluding": "1.3",
+ "versionEndExcluding": "1.6",
+ "matchCriteriaId": "8409BA98-A088-4290-86DF-9654A90D7FAF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/wargio/naxsi/commit/1b712526ed3314dd6be7e8b0259eabda63c19537",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/wargio/naxsi/pull/103",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/wargio/naxsi/security/advisories/GHSA-7qjc-q4j9-pc8x",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45133.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45133.json
index f2e225f2d3b..d62a87aafef 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45133.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45133.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45133",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-12T17:15:09.797",
- "lastModified": "2023-10-17T03:15:09.703",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T16:52:20.437",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 6.0
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -40,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-697"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -50,30 +80,171 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel:*:*:*:*:*:nodejs:*:*",
+ "versionEndExcluding": "7.23.2",
+ "matchCriteriaId": "C20217DD-2967-42B5-A20D-3B7978DEC2D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel:8.0.0:alpha.0:*:*:*:nodejs:*:*",
+ "matchCriteriaId": "3359A5D4-32F2-4128-8E6D-58C556FE5D4E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel:8.0.0:alpha.1:*:*:*:nodejs:*:*",
+ "matchCriteriaId": "B7A7E551-6CA9-4D22-A8BC-BDA8F3FE4CD2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel:8.0.0:alpha.2:*:*:*:nodejs:*:*",
+ "matchCriteriaId": "0214C42F-5EB9-410E-AB7E-206A5243FEB9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel:8.0.0:alpha.3:*:*:*:nodejs:*:*",
+ "matchCriteriaId": "9E8907AD-4095-4579-BF92-AED3416ADA1E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel-helper-define-polyfill-provider:*:*:*:*:*:nodejs:*:*",
+ "versionEndExcluding": "0.4.3",
+ "matchCriteriaId": "EA4E050F-1B8B-44F6-AA89-6457C7CC074F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel-plugin-polyfill-corejs2:*:*:*:*:*:nodejs:*:*",
+ "versionEndExcluding": "0.4.6",
+ "matchCriteriaId": "AE6CEB01-B369-401F-9103-4BBB2FDA267A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel-plugin-polyfill-corejs3:*:*:*:*:*:nodejs:*:*",
+ "versionEndExcluding": "0.8.5",
+ "matchCriteriaId": "3E9E5F4A-2CF4-483A-81F9-055E06913969"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel-plugin-polyfill-es-shims:*:*:*:*:*:nodejs:*:*",
+ "versionEndExcluding": "0.10.0",
+ "matchCriteriaId": "B9101BDF-A1D8-4CE4-94F3-B7D986548C7E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel-plugin-polyfill-regenerator:*:*:*:*:*:nodejs:*:*",
+ "versionEndExcluding": "0.5.3",
+ "matchCriteriaId": "9350BCA6-00A4-4581-BC2B-A5077923E354"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel-plugin-transform-runtime:*:*:*:*:*:nodejs:*:*",
+ "versionEndExcluding": "7.23.2",
+ "matchCriteriaId": "F42788D8-5501-4FC1-828E-D487A4895986"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:babeljs:babel-preset-env:*:*:*:*:*:nodejs:*:*",
+ "versionEndExcluding": "7.23.2",
+ "matchCriteriaId": "90EF976D-050D-4478-9A6E-D694E7451BAA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/babel/babel/commit/b13376b346946e3f62fc0848c1d2a23223314c82",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/babel/babel/pull/16033",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://github.com/babel/babel/releases/tag/v7.23.2",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/babel/babel/releases/tag/v8.0.0-alpha.4",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/babel/babel/security/advisories/GHSA-67hx-6x53-jw92",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00026.html",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5528",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45134.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45134.json
new file mode 100644
index 00000000000..f878a76aad3
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45134.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-45134",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T20:15:11.860",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. `org.xwiki.platform:xwiki-platform-web` starting in version 3.1-milestone-1 and prior to 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.2 and 15.5-rc-1, and `org.xwiki.platform:xwiki-web-standard` starting in version 2.4-milestone-2 and prior to version 3.1-milestone-1 are vulnerable to cross-site scripting. An attacker can create a template provider on any document that is part of the wiki (could be the attacker's user profile) that contains malicious code. This code is executed when this template provider is selected during document creation which can be triggered by sending the user to a URL. For the attacker, the only requirement is to have an account as by default the own user profile is editable. This allows an attacker to execute arbitrary actions with the rights of the user opening the malicious link. Depending on the rights of the user, this may allow remote code execution and full read and write access to the whole XWiki installation. This has been patched in `org.xwiki.platform:xwiki-platform-web` 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` 14.10.2 and 15.5-rc-1, and `org.xwiki.platform:xwiki-web-standard` 3.1-milestone-1 by adding the appropriate escaping. The vulnerable template file createinline.vm is part of XWiki's WAR and can be patched by manually applying the changes from the fix."
+ },
+ {
+ "lang": "es",
+ "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. `org.xwiki.platform:xwiki-platform-web` a partir de la versi\u00f3n 3.1-milestone-1 y anteriores a 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` anteriores a las versiones 14.10. 2 y 15.5-rc-1, y `org.xwiki.platform:xwiki-web-standard` a partir de la versi\u00f3n 2.4-milestone-2 y anteriores a la versi\u00f3n 3.1-milestone-1 son vulnerables a Cross-Site Scripting (XSS). Un atacante puede crear un proveedor de plantilla en cualquier documento que forme parte de la wiki (podr\u00eda ser el perfil de usuario del atacante) que contenga c\u00f3digo malicioso. Este c\u00f3digo se ejecuta cuando se selecciona este proveedor de plantilla durante la creaci\u00f3n del documento, lo que se puede activar enviando al usuario a una URL. Para el atacante, el \u00fanico requisito es tener una cuenta ya que, de forma predeterminada, el perfil de usuario es editable. Esto permite a un atacante ejecutar acciones arbitrarias con los derechos del usuario que abre el enlace malicioso. Dependiendo de los derechos del usuario, esto puede permitir la ejecuci\u00f3n remota de c\u00f3digo y acceso completo de lectura y escritura a toda la instalaci\u00f3n de XWiki. Esto se ha parcheado en `org.xwiki.platform:xwiki-platform-web` 13.4-rc-1, `org.xwiki.platform:xwiki-platform-web-templates` 14.10.2 y 15.5-rc-1, y `org.xwiki.platform:xwiki-web-standard` 3.1-milestone-1 agregando el escape apropiado. El archivo de plantilla vulnerable createinline.vm es parte de WAR de XWiki y se puede parchear aplicando manualmente los cambios de la soluci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/commit/ba56fda175156dd35035f2b8c86cbd8ef1f90c2e",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gr82-8fj2-ggc3",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XWIKI-20962",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45135.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45135.json
new file mode 100644
index 00000000000..53aa68ec50d
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45135.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-45135",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T20:15:11.933",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In `org.xwiki.platform:xwiki-platform-web` versions 7.2-milestone-2 until 14.10.12 and `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.12 and 15.5-rc-1, it is possible to pass a title to the page creation action that isn't displayed at first but then executed in the second step. This can be used by an attacker to trick a victim to execute code, allowing script execution if the victim has script right or remote code execution including full access to the XWiki instance if the victim has programming right.\n\nFor the attack to work, the attacker needs to convince the victim to visit a link like `/xwiki/bin/create/NonExistingSpace/WebHome?title=$services.logging.getLogger(%22foo%22).error(%22Script%20executed!%22)` where `` is the URL of the Wiki installation and to then click on the \"Create\" button on that page. The page looks like a regular XWiki page that the victim would also see when clicking the button to create a page that doesn't exist yet, the malicious code is not displayed anywhere on that page. After clicking the \"Create\" button, the malicious title would be displayed but at this point, the code has already been executed and the attacker could use this code also to hide the attack, e.g., by redirecting the victim again to the same page with an innocent title. It thus seems plausible that this attack could work if the attacker can place a fake \"create page\" button on a page which is possible with edit right.\n\nThis has been patched in `org.xwiki.platform:xwiki-platform-web` version 14.10.12 and `org.xwiki.platform:xwiki-platform-web-templates` versions 14.10.12 and 15.5-rc-1 by displaying the title already in the first step such that the victim can notice the attack before continuing. It is possible to manually patch the modified files from the patch in an existing installation. For the JavaScript change, the minified JavaScript file would need to be obtained from a build of XWiki and replaced accordingly."
+ },
+ {
+ "lang": "es",
+ "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. En `org.xwiki.platform:xwiki-platform-web` versiones 7.2-milestone-2 hasta 14.10.12 y `org.xwiki.platform:xwiki-platform-web-templates` anteriores a las versiones 14.10.12 y 15.5-rc -1, es posible pasar un t\u00edtulo a la acci\u00f3n de creaci\u00f3n de p\u00e1gina que no se muestra al principio pero que luego se ejecuta en el segundo paso. Un atacante puede utilizar esto para enga\u00f1ar a una v\u00edctima para que ejecute c\u00f3digo, permitiendo la ejecuci\u00f3n de scripts si la v\u00edctima tiene derechos de ejecuci\u00f3n de scripts o de c\u00f3digo remoto, incluido el acceso completo a la instancia de XWiki si la v\u00edctima tiene derechos de programaci\u00f3n. Para que el ataque funcione, el atacante debe convencer a la v\u00edctima de que visite un enlace como `/xwiki/bin/create/NonExistingSpace/WebHome?title=$services.logging.getLogger(%22foo%22).error(%22Script%20executed!%22)` donde `` es la URL de la instalaci\u00f3n Wiki y luego haga clic en el bot\u00f3n \"Crear\" en esa p\u00e1gina. La p\u00e1gina parece una p\u00e1gina XWiki normal que la v\u00edctima tambi\u00e9n ver\u00eda al hacer clic en el bot\u00f3n para crear una p\u00e1gina que a\u00fan no existe; el c\u00f3digo malicioso no se muestra en ninguna parte de esa p\u00e1gina. Despu\u00e9s de hacer clic en el bot\u00f3n \"Crear\", se mostrar\u00e1 el t\u00edtulo malicioso, pero en este punto el c\u00f3digo ya se ha ejecutado y el atacante podr\u00eda utilizar este c\u00f3digo tambi\u00e9n para ocultar el ataque, por ejemplo, redirigiendo a la v\u00edctima nuevamente a la misma p\u00e1gina con Un t\u00edtulo inocente. Por lo tanto, parece plausible que este ataque pueda funcionar si el atacante puede colocar un bot\u00f3n falso de \"crear p\u00e1gina\" en una p\u00e1gina que sea posible con derecho de edici\u00f3n. Esto se ha parcheado en `org.xwiki.platform:xwiki-platform-web` versi\u00f3n 14.10.12 y `org.xwiki.platform:xwiki-platform-web-templates` versiones 14.10.12 y 15.5-rc-1 mostrando el t\u00edtulo ya en el primer paso para que la v\u00edctima pueda notar el ataque antes de continuar. Es posible parchear manualmente los archivos modificados desde el parche en una instalaci\u00f3n existente. Para el cambio de JavaScript, el archivo JavaScript minimizado deber\u00e1 obtenerse de una compilaci\u00f3n de XWiki y reemplazarse en consecuencia."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-116"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/commit/199e27ce7016757e66fa7cea99e718044a1b639b",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghf6-2f42-mjh9",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XWIKI-20869",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45136.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45136.json
new file mode 100644
index 00000000000..d69b4807cc7
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45136.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-45136",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T20:15:12.007",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When document names are validated according to a name strategy (disabled by default), XWiki starting in version 12.0-rc-1 and prior to versions 12.10.12 and 15.5-rc-1 is vulnerable to a reflected cross-site scripting attack in the page creation form. This allows an attacker to execute arbitrary actions with the rights of the user opening the malicious link. Depending on the rights of the user, this may allow remote code execution and full read and write access to the whole XWiki installation. This has been patched in XWiki 14.10.12 and 15.5-rc-1 by adding appropriate escaping. The vulnerable template file `createinline.vm` is part of XWiki's WAR and can be patched by manually applying the changes from the fix."
+ },
+ {
+ "lang": "es",
+ "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. Cuando los nombres de los documentos se validan seg\u00fan una estrategia de nombres (deshabilitada de forma predeterminada), XWiki a partir de la versi\u00f3n 12.0-rc-1 y anteriores a las versiones 12.10.12 y 15.5-rc-1 es vulnerable a un ataque de Cross-Site Scripting (XSS) Reflejado en el formulario de creaci\u00f3n de p\u00e1gina. Esto permite a un atacante ejecutar acciones arbitrarias con los derechos del usuario que abre el enlace malicioso. Dependiendo de los derechos del usuario, esto puede permitir la ejecuci\u00f3n remota de c\u00f3digo y acceso completo de lectura y escritura a toda la instalaci\u00f3n de XWiki. Esto se ha parcheado en XWiki 14.10.12 y 15.5-rc-1 agregando el escape apropiado. El archivo de plantilla vulnerable `createinline.vm` es parte de WAR de XWiki y se puede parchear aplicando manualmente los cambios de la soluci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/commit/ba56fda175156dd35035f2b8c86cbd8ef1f90c2e",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qcj9-gcpg-4w2w",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XWIKI-20854",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45137.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45137.json
new file mode 100644
index 00000000000..c90a1f35097
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45137.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-45137",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T21:15:10.017",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. `org.xwiki.platform:xwiki-platform-web` starting in version 3.1-milestone-2 and prior to version 13.4-rc-1, as well as `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.12 and 15.5-rc-1, are vulnerable to cross-site scripting. When trying to create a document that already exists, XWiki displays an error message in the form for creating it. Due to missing escaping, this error message is vulnerable to raw HTML injection and thus XSS. The injected code is the document reference of the existing document so this requires that the attacker first creates a non-empty document whose name contains the attack code. This has been patched in `org.xwiki.platform:xwiki-platform-web` version 13.4-rc-1 and `org.xwiki.platform:xwiki-platform-web-templates` versions 14.10.12 and 15.5-rc-1 by adding the appropriate escaping. The vulnerable template file `createinline.vm` is part of XWiki's WAR and can be patched by manually applying the changes from the fix."
+ },
+ {
+ "lang": "es",
+ "value": "XWiki Platform es una plataforma wiki gen\u00e9rica que ofrece servicios de ejecuci\u00f3n para aplicaciones creadas sobre ella. `org.xwiki.platform:xwiki-platform-web` a partir de la versi\u00f3n 3.1-milestone-2 y anteriores a la versi\u00f3n 13.4-rc-1, as\u00ed como `org.xwiki.platform:xwiki-platform-web-templates` anteriores a las versiones 14.10.12 y 15.5-rc-1, son vulnerables a Cross-Site Scripting (XSS). Al intentar crear un documento que ya existe, XWiki muestra un mensaje de error en el formulario para crearlo. Debido a la falta de escape, este mensaje de error es vulnerable a la inyecci\u00f3n de HTML sin formato y, por lo tanto, de XSS. El c\u00f3digo inyectado es la referencia del documento existente, por lo que esto requiere que el atacante primero cree un documento no vac\u00edo cuyo nombre contenga el c\u00f3digo de ataque. Esto se ha parcheado en `org.xwiki.platform:xwiki-platform-web` versi\u00f3n 13.4-rc-1 y `org.xwiki.platform:xwiki-platform-web-templates` versiones 14.10.12 y 15.5-rc-1. agregando el escape apropiado. El archivo de plantilla vulnerable `createinline.vm` es parte de WAR de XWiki y se puede parchear aplicando manualmente los cambios de la soluci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/commit/ed8ec747967f8a16434806e727a57214a8843581",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-93gh-jgjj-r929",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://jira.xwiki.org/browse/XWIKI-20961",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45138.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45138.json
index 09e131f3051..c5b4176ff8e 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45138.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45138.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45138",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-12T17:15:09.900",
- "lastModified": "2023-10-12T19:42:47.127",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:51:35.237",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Change Request is an pplication allowing users to request changes on a wiki without publishing the changes directly. Starting in version 0.11 and prior to version 1.9.2, it's possible for a user without any specific right to perform script injection and remote code execution just by inserting an appropriate title when creating a new Change Request. This vulnerability is particularly critical as Change Request aims at being created by user without any particular rights. The vulnerability has been fixed in Change Request 1.9.2. It's possible to workaround the issue without upgrading by editing the document `ChangeRequest.Code.ChangeRequestSheet` and by performing the same change as in the fix commit."
+ },
+ {
+ "lang": "es",
+ "value": "Change Request es una aplicaci\u00f3n que permite a los usuarios solicitar cambios en una wiki sin publicar los cambios directamente. A partir de la versi\u00f3n 0.11 y antes de la versi\u00f3n 1.9.2, es posible que un usuario sin ning\u00fan derecho espec\u00edfico realice inyecci\u00f3n de script y ejecuci\u00f3n remota de c\u00f3digo simplemente insertando un t\u00edtulo apropiado al crear una nueva Change Request. Esta vulnerabilidad es particularmente cr\u00edtica ya que Change Request pretende ser creada por un usuario sin ning\u00fan derecho particular. La vulnerabilidad se ha solucionado en Change Request 1.9.2. Es posible workaround en el problema sin actualizar editando el documento `ChangeRequest.Code.ChangeRequestSheet` y realizando el mismo cambio que en el commit de correcci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 6.0
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,47 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:xwiki:change_request:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "0.11",
+ "versionEndExcluding": "1.9.2",
+ "matchCriteriaId": "14ADED81-A7CA-41B2-A0A4-8A382D7377AC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/xwiki-contrib/application-changerequest/commit/7565e720117f73102f5a276239eabfe85e15cff4",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/xwiki-contrib/application-changerequest/security/advisories/GHSA-f776-w9v2-7vfj",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://jira.xwiki.org/browse/CRAPP-298",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45141.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45141.json
index f36df8c1c11..52ff4dda457 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45141.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45141.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45141",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T21:15:11.237",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T15:05:38.370",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -54,10 +74,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gofiber:fiber:*:*:*:*:*:go:*:*",
+ "versionEndExcluding": "2.50.0",
+ "matchCriteriaId": "D4CF7CB2-A259-42A1-A42F-26170DCC266D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mitigation",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45142.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45142.json
index 3167e576316..1570628e437 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45142.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45142.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45142",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-12T17:15:09.990",
- "lastModified": "2023-10-12T19:42:47.127",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:27:50.437",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent to it. HTTP header User-Agent or HTTP method for requests can be easily set by an attacker to be random and long. The library internally uses `httpconv.ServerRequest` that records every value for HTTP `method` and `User-Agent`. In order to be affected, a program has to use the `otelhttp.NewHandler` wrapper and not filter any unknown HTTP methods or User agents on the level of CDN, LB, previous middleware, etc. Version 0.44.0 fixed this issue when the values collected for attribute `http.request.method` were changed to be restricted to a set of well-known values and other high cardinality attributes were removed. As a workaround to stop being affected, `otelhttp.WithFilter()` can be used, but it requires manual careful configuration to not log certain requests entirely. For convenience and safe usage of this library, it should by default mark with the label `unknown` non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it."
+ },
+ {
+ "lang": "es",
+ "value": "OpenTelemetry-Go Contrib es una colecci\u00f3n de paquetes de terceros para OpenTelemetry-Go. Un contenedor de controlador listo para usar agrega etiquetas `http.user_agent` y `http.method` que tienen cardinalidad independiente. Conduce al posible agotamiento de la memoria del servidor cuando se le env\u00edan muchas solicitudes maliciosas. Un atacante puede configurar f\u00e1cilmente el encabezado HTTP User-Agent o el m\u00e9todo HTTP para solicitudes para que sea aleatorio y largo. La librer\u00eda utiliza internamente `httpconv.ServerRequest` que registra cada valor para el `method` HTTP y el `User-Agent`. Para verse afectado, un programa debe utilizar el contenedor `otelhttp.NewHandler` y no filtrar ning\u00fan m\u00e9todo HTTP desconocido o agentes de usuario en el nivel de CDN, LB, middleware anterior, etc. La versi\u00f3n 0.44.0 solucion\u00f3 este problema cuando el Los valores recopilados para el atributo `http.request.method` se cambiaron para restringirlos a un conjunto de valores conocidos y se eliminaron otros atributos de alta cardinalidad. Como workaround para dejar de verse afectado, se puede utilizar `otelhttp.WithFilter()`, pero requiere una configuraci\u00f3n manual cuidadosa para no registrar ciertas solicitudes por completo. Para mayor comodidad y uso seguro de esta librer\u00eda, deber\u00eda marcar de forma predeterminada con la etiqueta \"unknown\" los m\u00e9todos HTTP no est\u00e1ndar y los agentes de usuario para mostrar que dichas solicitudes se realizaron pero no aumentan la cardinalidad. En caso de que alguien quiera seguir con el comportamiento actual, la API de la librer\u00eda deber\u00eda permitir habilitarlo."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,38 +70,80 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:opentelemetry:opentelemetry:*:*:*:*:*:go:*:*",
+ "versionEndExcluding": "0.44.0",
+ "matchCriteriaId": "2E7726FA-0421-40C6-B36B-3B6618D81880"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/advisories/GHSA-cg3q-j54f-5p7p",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/open-telemetry/opentelemetry-go-contrib/blob/5f7e6ad5a49b45df45f61a1deb29d7f1158032df/instrumentation/net/http/otelhttp/handler.go#L63-L65",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/open-telemetry/opentelemetry-go-contrib/pull/4277",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://github.com/open-telemetry/opentelemetry-go-contrib/releases/tag/v1.19.0",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-5r5m-65gx-7vrh",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/open-telemetry/opentelemetry-go/blob/38e1b499c3da3107694ad2660b3888eee9c8b896/semconv/internal/v2/http.go#L223",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/open-telemetry/opentelemetry-go/blob/v1.12.0/semconv/internal/v2/http.go#L159",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45143.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45143.json
index ef13c22647a..ae21a986075 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45143.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45143.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45143",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-12T17:15:10.087",
- "lastModified": "2023-10-12T19:42:47.127",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-26T05:15:25.930",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds."
+ },
+ {
+ "lang": "es",
+ "value": "Undici es un cliente HTTP/1.1 escrito desde cero para Node.js. Antes de la versi\u00f3n 5.26.2, Undici ya borraba los encabezados de Autorizaci\u00f3n en redireccionamientos entre or\u00edgenes, pero no borraba los encabezados de \"Cookie\". Por dise\u00f1o, los encabezados de \"cookie\" son encabezados de solicitud prohibidos, lo que no permite que se establezcan en RequestInit.headers en entornos de navegador. Dado que undici maneja los encabezados de manera m\u00e1s liberal que la especificaci\u00f3n, hubo una desconexi\u00f3n con las suposiciones que hizo la especificaci\u00f3n y la implementaci\u00f3n de fetch por parte de undici. Como tal, esto puede provocar una fuga accidental de cookies a un sitio de terceros o que un atacante malicioso que pueda controlar el objetivo de la redirecci\u00f3n (es decir, un redirector abierto) filtre la cookie al sitio de terceros. Esto fue parcheado en la versi\u00f3n 5.26.2. No se conocen workarounds."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.5,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -36,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -46,25 +80,74 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*",
+ "versionEndExcluding": "5.26.2",
+ "matchCriteriaId": "6264C00F-837E-4B54-86E0-855BA2AFC80B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/nodejs/undici/releases/tag/v5.26.2",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Not Applicable"
+ ]
},
{
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://hackerone.com/reports/2166948",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Permissions Required"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
"source": "security-advisories@github.com"
}
]
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45144.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45144.json
index df0ba9bb26c..f986c81f12b 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45144.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45144.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45144",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T21:15:11.333",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T20:00:09.403",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 6.0
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -40,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -54,26 +84,60 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:xwiki:oauth_identity:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.0",
+ "versionEndExcluding": "1.6",
+ "matchCriteriaId": "B145876F-17CC-44FA-B95A-9C591255D17C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/xwikisas/identity-oauth/blob/master/ui/src/main/resources/IdentityOAuth/LoginUIExtension.vm#L58",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Broken Link"
+ ]
},
{
"url": "https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/xwikisas/identity-oauth/commit/d805d3154b17c6bf455ddf5deb0a3461a3833bc6#diff-2ab2e0716443d790d7d798320e4a45151661f4eca5440331f4a227b29c87c188",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/xwikisas/identity-oauth/security/advisories/GHSA-h2rm-29ch-wfmh",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://jira.xwiki.org/browse/XWIKI-20719",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Permissions Required"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45145.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45145.json
new file mode 100644
index 00000000000..c45d2889e90
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45145.json
@@ -0,0 +1,75 @@
+{
+ "id": "CVE-2023-45145",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-18T21:15:09.560",
+ "lastModified": "2023-10-27T03:15:08.193",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory."
+ },
+ {
+ "lang": "es",
+ "value": "Redis es una base de datos en memoria que persiste en el disco. Al iniciarse, Redis comienza a escuchar en un socket Unix antes de ajustar sus permisos a la configuraci\u00f3n proporcionada por el usuario. Si se utiliza una umask(2) permisiva, esto crea una condici\u00f3n de ejecuci\u00f3n que permite, durante un corto per\u00edodo de tiempo, que otro proceso establezca una conexi\u00f3n que de otro modo no estar\u00eda autorizada. Este problema existe desde Redis 2.6.0-RC1. Este problema se solucion\u00f3 en las versiones 7.2.2, 7.0.14 y 6.2.14 de Redis. Se recomienda a los usuarios que actualicen. Para los usuarios que no pueden actualizar, es posible workaround el problema deshabilitando los sockets Unix, iniciando Redis con una m\u00e1scara de usuario restrictiva o almacenando el archivo del socket Unix en un directorio protegido."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.6,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-668"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00032.html",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/464JPNBWE433ZGYXO3KN72VR3KJPWHAW/",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNEK2K4IE7MPKRD6H36JXZMJKYS6I5GQ/",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45146.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45146.json
new file mode 100644
index 00000000000..09c787e772f
--- /dev/null
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45146.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45146",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-18T22:15:09.323",
+ "lastModified": "2023-10-19T12:59:35.787",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XXL-RPC is a high performance, distributed RPC framework. With it, a TCP server can be set up using the Netty framework and the Hessian serialization mechanism. When such a configuration is used, attackers may be able to connect to the server and provide malicious serialized objects that, once deserialized, force it to execute arbitrary code. This can be abused to take control of the machine the server is running by way of remote code execution. This issue has not been fixed."
+ },
+ {
+ "lang": "es",
+ "value": "XXL-RPC es un framework RPC distribuido de alto rendimiento. Con \u00e9l, se puede configurar un servidor TCP utilizando el marco Netty y el mecanismo de serializaci\u00f3n de Hesse. Cuando se utiliza dicha configuraci\u00f3n, los atacantes pueden conectarse al servidor y proporcionar objetos serializados maliciosos que, una vez deseriaizados, lo obligan a ejecutar c\u00f3digo arbitrario. Se puede abusar de esto para tomar el control de la m\u00e1quina que ejecuta el servidor mediante la ejecuci\u00f3n remota de c\u00f3digo. Este problema no se ha solucionado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-052_XXL-RPC/",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45148.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45148.json
index e559d5444db..01a8ab03b82 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45148.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45148.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45148",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T19:15:10.860",
- "lastModified": "2023-10-16T19:24:26.033",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:19:02.097",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\\OC\\Memcache\\Redis` and install Redis instead of Memcached."
+ },
+ {
+ "lang": "es",
+ "value": "Nextcloud es un servidor en la nube dom\u00e9stico de c\u00f3digo abierto. Cuando Memcached se utiliza como `memcache.distributed`, el l\u00edmite de velocidad en Nextcloud Server podr\u00eda restablecerse inesperadamente restableciendo el recuento del ratio antes de lo previsto. Se recomienda a los usuarios que actualicen a las versiones 25.0.11, 26.0.6 o 27.1.0. Los usuarios que no puedan actualizar deben cambiar su configuraci\u00f3n `memcache.distributed` a `\\OC\\Memcache\\Redis` e instalar Redis en lugar de Memcached."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,99 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "22.0.0",
+ "versionEndExcluding": "22.2.10.16",
+ "matchCriteriaId": "429A249E-7FF9-495A-9158-95B888ABD8D2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "23.0.0",
+ "versionEndExcluding": "23.0.12.11",
+ "matchCriteriaId": "465AAFF0-9D24-451A-AAAE-9340A8BE1EC5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "24.0.0",
+ "versionEndExcluding": "24.0.12.7",
+ "matchCriteriaId": "040721D3-7E8A-4DC2-978D-9AE6D5A606F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
+ "versionStartIncluding": "25.0.0",
+ "versionEndExcluding": "25.0.11",
+ "matchCriteriaId": "CFCB9CDB-F661-496E-86B7-25B228A3C90E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "25.0.0",
+ "versionEndExcluding": "25.0.11",
+ "matchCriteriaId": "37949CD5-0B2D-40BE-83C8-E6A03CD0F7C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
+ "versionStartIncluding": "26.0.0",
+ "versionEndExcluding": "26.0.6",
+ "matchCriteriaId": "9E2008E1-AFAE-40F5-8D64-A019F2222AA2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "26.0.0",
+ "versionEndExcluding": "26.0.6",
+ "matchCriteriaId": "4C98058B-06EF-446E-A39D-F436627469C1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:-:*:*:*",
+ "matchCriteriaId": "13650329-BCD1-4FDB-9446-5133C0EDC905"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:enterprise:*:*:*",
+ "matchCriteriaId": "DB1974B0-31C5-4E22-9E8C-BD40C6B54D0C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/nextcloud/server/pull/40293",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
},
{
"url": "https://hackerone.com/reports/2110945",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Permissions Required"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45149.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45149.json
index 10911640771..b69cb3f7da0 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45149.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45149.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45149",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T20:15:15.287",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:12:47.093",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -50,18 +70,61 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:talk:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.0.0",
+ "versionEndExcluding": "15.0.8",
+ "matchCriteriaId": "D8F3F3ED-1738-4C2B-9DE7-754D2FC9762E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:talk:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.0.0",
+ "versionEndExcluding": "16.0.6",
+ "matchCriteriaId": "2BAADB89-AADA-4F5D-B4DB-051FF789E4EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:talk:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "17.0.0",
+ "versionEndExcluding": "17.1.1",
+ "matchCriteriaId": "C2CA92F4-45BF-4290-8926-D4D193461D0A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/nextcloud/spreed/pull/10545",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
},
{
"url": "https://hackerone.com/reports/2094473",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Permissions Required"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45150.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45150.json
index acde5fc361b..d2b21d0b0ee 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45150.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45150.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45150",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T20:15:15.393",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:11:24.833",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -40,8 +60,18 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-354"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -50,18 +80,47 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:calendar:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.0",
+ "versionEndExcluding": "4.4.4",
+ "matchCriteriaId": "AC6A69AB-4972-431A-8734-0234D2734BAF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/nextcloud/calendar/pull/5358",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8gwm-w452",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://hackerone.com/reports/2058337",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Issue Tracking"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45151.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45151.json
index 2964ce1cfbb..57acd4aecb6 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45151.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45151.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45151",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T19:15:10.957",
- "lastModified": "2023-10-16T19:24:26.033",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:18:25.917",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "El servidor Nextcloud es una plataforma de nube dom\u00e9stica de c\u00f3digo abierto. Las versiones afectadas de Nextcloud almacenaron tokens OAuth2 en texto plano, lo que permite a un atacante que haya obtenido acceso al servidor elevar potencialmente sus privilegios. Este problema se solucion\u00f3 y se recomienda a los usuarios actualizar su servidor Nextcloud a la versi\u00f3n 25.0.8, 26.0.3 o 27.0.1. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -36,7 +60,7 @@
},
"weaknesses": [
{
- "source": "security-advisories@github.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,20 +68,90 @@
"value": "CWE-312"
}
]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-312"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
+ "versionStartIncluding": "25.0.0",
+ "versionEndExcluding": "25.0.8",
+ "matchCriteriaId": "A2EE7242-A7BB-4FE3-8617-9C355C68EB2A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "25.0.0",
+ "versionEndExcluding": "25.0.8",
+ "matchCriteriaId": "05C7C20F-A320-425C-BECF-E895E5ACF1CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
+ "versionStartIncluding": "26.0.0",
+ "versionEndExcluding": "26.0.3",
+ "matchCriteriaId": "636E2B84-2F89-4F35-9ADF-BCB1761B2E2D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "26.0.0",
+ "versionEndExcluding": "26.0.3",
+ "matchCriteriaId": "54FD90F4-2243-4A99-954B-FCC44EE180AB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:-:*:*:*",
+ "matchCriteriaId": "13650329-BCD1-4FDB-9446-5133C0EDC905"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:enterprise:*:*:*",
+ "matchCriteriaId": "DB1974B0-31C5-4E22-9E8C-BD40C6B54D0C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://github.com/nextcloud/server/pull/38398",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
},
{
"url": "https://hackerone.com/reports/1994324",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Permissions Required"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45158.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45158.json
index fbcffdd63a8..0868deda0a5 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45158.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45158.json
@@ -2,31 +2,100 @@
"id": "CVE-2023-45158",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-10-16T08:15:09.990",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:58:13.557",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in web2py 2.24.1 and earlier. When the product is configured to use notifySendHandler for logging (not the default configuration), a crafted web request may execute an arbitrary OS command on the web server using the product."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del Sistema Operativo en web2py 2.24.1 y versiones anteriores. Cuando el producto est\u00e1 configurado para utilizar notifySendHandler para el registro (no la configuraci\u00f3n predeterminada), una solicitud web manipulada puede ejecutar un comando arbitrario del sistema operativo en el servidor web que utiliza el producto."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:web2py:web2py:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.24.1",
+ "matchCriteriaId": "804767C1-58E1-4770-88B5-08E840011736"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "http://web2py.com/",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "http://web2py.com/init/default/download",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/web2py/web2py/commit/936e2260b0c34c44e2f3674a893e96d2a7fad0a3",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://jvn.jp/en/jp/JVN80476432/",
- "source": "vultures@jpcert.or.jp"
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45159.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45159.json
index 5126426f339..9e3cde3d267 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45159.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45159.json
@@ -2,16 +2,16 @@
"id": "CVE-2023-45159",
"sourceIdentifier": "security@1e.com",
"published": "2023-10-05T11:15:14.063",
- "lastModified": "2023-10-11T17:18:28.327",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-19T13:15:10.080",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "1E Client installer can perform arbitrary file deletion on protected files.\u00a0\u00a0\n\nA non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. A hotfix is available Q23092 that forces\u00a0the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.\n\n"
+ "value": "1E Client installer can perform arbitrary file deletion on protected files.\u00a0\u00a0\n\nA non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. \n\nA hotfix is available from the 1E support portal that forces\u00a0the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.\n\nfor v8.1 use hotfix Q23097\nfor v8.4 use hotfix Q23105\nfor v9.0 use hotfix Q23115\n\nfor SaaS customers, use 1EClient v23.7 plus hotfix Q23121"
},
{
"lang": "es",
- "value": "El instalador de 1E Client puede realizar la eliminaci\u00f3n arbitraria de archivos protegidos. Un usuario sin privilegios podr\u00eda proporcionar un enlace simb\u00f3lico o una uni\u00f3n de Windows para apuntar a un directorio protegido en el instalador que el Cliente 1E borrar\u00eda al iniciar el servicio. Hay una revisi\u00f3n disponible Q23092 que obliga al cliente 1E a buscar un enlace o cruce simb\u00f3lico y, si encuentra uno, se niega a usar esa ruta y en su lugar crea una ruta que involucra un GUID aleatorio."
+ "value": "El instalador de 1E Client puede realizar la eliminaci\u00f3n arbitraria de archivos protegidos. Un usuario sin privilegios podr\u00eda proporcionar un enlace simb\u00f3lico o una uni\u00f3n de Windows para apuntar a un directorio protegido en el instalador que el Cliente 1E borrar\u00eda al iniciar el servicio. Hay una revisi\u00f3n disponible en el portal de soporte 1E que obliga al Cliente 1E a buscar un enlace o cruce simb\u00f3lico y, si encuentra uno, se niega a usar esa ruta y en su lugar crea una ruta que involucra un GUID aleatorio para v8.1 use hotfix Q23097 para v8.4 use hotfix Q23105 para v9.0 use hotfix Q23115 para clientes de SaaS, use 1EClient v23.7 plus hotfix Q23121"
}
],
"metrics": {
@@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
- "attackVector": "PHYSICAL",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
- "userInteraction": "REQUIRED",
- "scope": "CHANGED",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
- "baseScore": 7.3,
+ "baseScore": 8.4,
"baseSeverity": "HIGH"
},
- "exploitabilityScore": 0.7,
- "impactScore": 6.0
+ "exploitabilityScore": 2.5,
+ "impactScore": 5.9
}
]
},
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json
index 8229dffc0d8..3ff3777b145 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45160.json
@@ -2,16 +2,16 @@
"id": "CVE-2023-45160",
"sourceIdentifier": "security@1e.com",
"published": "2023-10-05T16:15:12.167",
- "lastModified": "2023-10-12T14:07:03.700",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-19T13:15:10.200",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. This has been fixed in patch Q23094 as the 1E Client's temporary directory is now locked down\n\n"
+ "value": "\nIn the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. The 1E Client's temporary directory is now locked down in the released patch.\n\n\n\nResolution: This has been fixed in patch Q23094\u00a0"
},
{
"lang": "es",
- "value": "En la versi\u00f3n afectada del 1E Client, un usuario normal podr\u00eda subvertir los archivos de recursos de instrucciones descargados, por ejemplo, para sustituirlos por un script da\u00f1ino o reemplazando un archivo de script de recursos creado por una instrucci\u00f3n en tiempo de ejecuci\u00f3n con un script malicioso. Esto se solucion\u00f3 en el parche Q23094 ya que el directorio temporal del 1E Client ahora est\u00e1 bloqueado"
+ "value": "En la versi\u00f3n afectada de 1E Client, un usuario normal podr\u00eda subvertir archivos de recursos de instrucciones descargados, por ejemplo, para sustituirlos por un script da\u00f1ino, reemplazando un archivo de script de recursos creado por una instrucci\u00f3n en tiempo de ejecuci\u00f3n con un script malicioso. El directorio temporal de 1E Client ahora est\u00e1 bloqueado en el parche publicado. Resoluci\u00f3n: Esto se ha solucionado en el parche Q23094."
}
],
"metrics": {
@@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
- "privilegesRequired": "NONE",
+ "privilegesRequired": "LOW",
"userInteraction": "NONE",
- "scope": "CHANGED",
+ "scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
- "baseScore": 10.0,
- "baseSeverity": "CRITICAL"
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
},
- "exploitabilityScore": 3.9,
- "impactScore": 6.0
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
}
]
},
@@ -113,12 +113,20 @@
}
],
"references": [
+ {
+ "url": "https://1e.my.site.com/s/",
+ "source": "security@1e.com"
+ },
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
"source": "security@1e.com",
"tags": [
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://www.1e.com/vulnerability-disclosure-policy/",
+ "source": "security@1e.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45162.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45162.json
index c7f0931bb4d..5dcd285b4b9 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45162.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45162.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45162",
"sourceIdentifier": "security@1e.com",
"published": "2023-10-13T13:15:11.910",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T20:12:37.577",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "Affected 1E Platform versions have a Blind SQL Injection vulnerability that can lead to arbitrary code execution.\u00a0\n\nApplication of the relevant hotfix remediates this issue.\n\nfor v8.1.2 apply hotfix Q23166\nfor v8.4.1 apply hotfix Q23164\nfor v9.0.1 apply hotfix Q23173\n\nSaaS implementations on v23.7.1 will automatically have hotfix Q23173 applied. Customers with SaaS versions below this are urged to upgrade urgently - please contact 1E to arrange this"
+ "value": "Affected 1E Platform versions have a Blind SQL Injection vulnerability that can lead to arbitrary code execution.\u00a0\n\nApplication of the relevant hotfix remediates this issue.\n\nfor v8.1.2 apply hotfix Q23166\nfor v8.4.1 apply hotfix Q23164\nfor v9.0.1 apply hotfix Q23169\n\nSaaS implementations on v23.7.1 will automatically have hotfix Q23173 applied. Customers with SaaS versions below this are urged to upgrade urgently - please contact 1E to arrange this"
+ },
+ {
+ "lang": "es",
+ "value": "Las versiones afectadas de 1E Platform tienen una vulnerabilidad de inyecci\u00f3n Blind SQL que puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario. La aplicaci\u00f3n del hotfix correspondiente soluciona este problema. para v8.1.2 aplique hotfix Q23166 para v8.4.1 aplique hotfix Q23164 para v9.0.1 aplique hotfix Q23169 Las implementaciones de SaaS en v23.7.1 tendr\u00e1n autom\u00e1ticamente aplicado el hotfix Q23173. Se insta a los clientes con versiones de SaaS inferiores a esta a actualizar urgentemente; comun\u00edquese con 1E para organizar esto."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
{
"source": "security@1e.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
{
"source": "security@1e.com",
"type": "Secondary",
@@ -46,10 +80,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:1e:platform:8.1.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A123674D-27C6-4374-B626-C208F0394789"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:1e:platform:8.4.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C4D3240B-F056-4BA4-974C-7D6B5D8B36DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:1e:platform:9.0.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5BB2EBF4-B0DD-4ACF-85D6-C2D780A4AC4E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:1e:platform:23.7.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "68D28A90-56C3-429A-B94D-FA0A82D40359"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.1e.com/trust-security-compliance/cve-info/",
- "source": "security@1e.com"
+ "source": "security@1e.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45176.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45176.json
index 17367fdd7da..93812aa7836 100644
--- a/CVE-2023/CVE-2023-451xx/CVE-2023-45176.json
+++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45176.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45176",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-10-14T16:15:10.747",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T01:13:38.547",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IBM App Connect Enterprise 11.0.0.1 through 11.0.0.23, 12.0.1.0 through 12.0.10.0 and IBM Integration Bus 10.1 through 10.1.0.1 are vulnerable to a denial of service for integration nodes on Windows. IBM X-Force ID: 247998."
+ },
+ {
+ "lang": "es",
+ "value": "IBM App Connect Enterprise 11.0.0.1 a 11.0.0.23, 12.0.1.0 a 12.0.10.0 e IBM Integration Bus 10.1 a 10.1.0.1 son vulnerables a una Denegaci\u00f3n de Servicio (DoS) para los nodos de integraci\u00f3n en Windows. ID de IBM X-Force: 247998."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@@ -46,14 +80,53 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "11.0.0.1",
+ "versionEndIncluding": "11.0.0.23",
+ "matchCriteriaId": "892723CB-F16A-4789-80A6-65E316DC107E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "12.0.1.0",
+ "versionEndIncluding": "12.0.10.0",
+ "matchCriteriaId": "D5D7206C-3319-4A04-A7E5-A87ACD8FF533"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ibm:integration_bus:10.1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3CDFCF4-AED1-46BE-A5E4-65712F632A0A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267998",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "VDB Entry",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.ibm.com/support/pages/node/7051448",
- "source": "psirt@us.ibm.com"
+ "source": "psirt@us.ibm.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45219.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45219.json
index a3384c9d216..a97deebd08e 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45219.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45219.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-45219",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:22.297",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T01:32:45.897",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nExposure of Sensitive Information vulnerability exist in an undisclosed BIG-IP TMOS shell (tmsh) command which may allow an authenticated attacker with resource administrator role privileges to view sensitive information.\u00a0\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de exposici\u00f3n a informaci\u00f3n confidencial existe en un comando de BIG-IP TMOS shell (tmsh) no divulgado que puede permitir que un atacante autenticado con privilegios de administrador de recursos vea informaci\u00f3n confidencial. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan."
}
],
"metrics": {
@@ -36,8 +40,18 @@
},
"weaknesses": [
{
- "source": "f5sirt@f5.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "f5sirt@f5.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -46,10 +60,557 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D93F04AD-DF14-48AB-9F13-8B2E491CF42E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7522C760-7E07-406F-BF50-5656D5723C4F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F11226F6-9080-4126-ACBD-7211A2746214"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A8F16422-A642-4614-96F2-E5B4877E8206"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "6603ED6A-3366-4572-AFCD-B3D4B1EC7606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "88978E38-81D3-4EFE-8525-A300B101FA69"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "6DD4CF11-44E9-4596-9397-AF7DBD81277B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "DE979976-11C7-4AFF-8BE4-A094CC9C39CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "05E452AA-A520-4CBE-8767-147772B69194"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "596FC5D5-7329-4E39-841E-CAE937C02219"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F7280AA3-6EB0-4D9B-895B-B6883071740E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "95617B72-E7D8-44D2-AFF2-976595A72AFA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "9167FEC1-2C37-4946-9657-B4E69301FB24"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7B4B3442-E0C0-48CD-87AD-060E15C9801E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "16795277-E8E2-4713-BD65-207655546649"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "0835E39B-F21E-4231-A4B9-5D511FF1B87A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "7EC2324D-EC8B-41DF-88A7-819E53AAD0FC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "9B88F9D1-B54B-40C7-A18A-26C4A071D7EC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "F005EFFD-3A40-4762-B0D6-8760C406130F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "8705476E-A246-4B57-A0E1-FD626C1B0DE5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "922AA845-530A-4B4B-9976-4CBC30C8A324"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F938EB43-8373-47EB-B269-C6DF058A9244"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "8D82BCD8-136A-476C-AC86-710CA8B32EB7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "377DE308-CF91-488A-B296-30A3B09451D3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "C7E422F6-C4C2-43AC-B137-0997B5739030"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "CC3F710F-DBCB-4976-9719-CF063DA22377"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "18CD2C82-0080-495E-8A11-957E0C182A48"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "3C508A36-C041-406C-9C8A-A396C6EDC750"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "4C9FCBCB-9CE0-49E7-85C8-69E71D211912"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "112DFA85-90AD-478D-BD70-8C7C0C074F1B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E912382D-131E-40F2-A337-72D6F2A3AD23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "91ED3C5E-92E8-44CF-AA99-A38C60AE677E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "CAEF3EA4-7D5A-4B44-9CE3-258AEC745866"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "2FBCE2D1-9D93-415D-AB2C-2060307C305A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "47962DDC-899F-4A98-ABF7-CC8A1AE7FF1C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "46A7F81E-84A2-4304-B18F-53E5CDBCEA43"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "08B25AAB-A98C-4F89-9131-29E3A8C0ED23"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "ED9B976A-D3AD-4445-BF8A-067C3EBDFBB0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "C0FE692A-CD63-4354-B599-2F47EEEFDD37"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "B2F02EC0-E6C2-4E00-9804-043982D88BCE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "BC2A757B-4521-4DB7-89B0-7CAE1E4155E4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "0A1D4B18-DB59-41C4-B769-5DF93B8EBBAD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "D819F58A-826E-49E0-A06F-4D85E04D3D9F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1E86895C-EC5A-4303-978E-8807FE7A5E9A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E3D2ABA3-D4A9-4267-B0DF-7C3BBEEAEB66"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "BC36311E-BB00-4750-85C8-51F5A2604F07"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "E4958167-AB1F-4458-A06B-1B2DA313EEBD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "D982C3E6-43DE-4AA8-889F-044E70C7FCB2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "E6018B01-048C-43BB-A78D-66910ED60CA9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "3A6A5686-5A8B-45D5-9165-BC99D2CCAC47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "944B8F9C-E5C6-4DA8-BF2B-1C0B6A388BC4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "7DB6C626-BA78-4C06-8582-BFFCDF957429"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "D9EC2237-117F-43BD-ADEC-516CF72E04EF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "F70D4B6F-65CF-48F4-9A07-072DFBCE53D9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "DCFAFFAC-000C-414D-83CF-B8B2C529D9CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "E68BFC75-6977-4644-A169-48263B896849"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "0360F76D-E75E-4B05-A294-B47012323ED9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "7A4607BF-41AC-4E84-A110-74E085FF0445"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "672067B7-C838-4F0B-B3D0-E85F71715B0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "A4C17D18-1172-4396-9099-F1F5EAEACE5A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8257AA59-C14D-4EC1-B22C-DFBB92CBC297"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "37DB32BB-F4BA-4FB5-94B1-55C3F06749CF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "1871634A-7609-4D01-8469-3D86F36DC19D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "603324D6-FE7A-4209-B92B-94EF09AB5FF2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "8A6F9699-A485-4614-8F38-5A556D31617E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "5A90F547-97A2-41EC-9FDF-25F869F0FA38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "220FD008-8919-48D4-84CF-8C4D99C3C474"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "1935A1CF-50B2-4572-AA06-3504DB25B954"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "1932D32D-0E4B-4BBD-816F-6D47AB2E2F04"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "D47B7691-A95B-45C0-BAB4-27E047F3C379"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "077EBF51-B843-48B7-B31C-4BE1C99CE6F7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "5EAC82FA-41CC-425A-89A0-CC9E2BF678EE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1.0",
+ "versionEndIncluding": "13.1.5",
+ "matchCriteriaId": "5326759A-AFB0-4A15-B4E9-3C9A2E5DB32A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1.0",
+ "versionEndIncluding": "14.1.5",
+ "matchCriteriaId": "57D92D05-C67D-437E-88F3-DCC3F6B0ED2F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "15.1.0",
+ "versionEndExcluding": "15.1.9",
+ "matchCriteriaId": "338010BF-EFC6-42B9-9F12-865C48D421EB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "16.1.0",
+ "versionEndExcluding": "16.1.4",
+ "matchCriteriaId": "14776B4F-DDEC-4B22-82A5-EA231B3895F0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K20307245",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45220.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45220.json
new file mode 100644
index 00000000000..170cb12bce6
--- /dev/null
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45220.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45220",
+ "sourceIdentifier": "psirt@bosch.com",
+ "published": "2023-10-25T18:17:33.107",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Android Client application, when enrolled with the define method 1(the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user."
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n Cliente de Android, cuando se inscribe con el m\u00e9todo de definici\u00f3n 1 (el usuario inserta manualmente la direcci\u00f3n IP del servidor), usa el protocolo HTTP para recuperar informaci\u00f3n confidencial (direcci\u00f3n IP y credenciales para conectarse a una entidad de intermediario MQTT remota) en lugar de HTTPS y esta caracter\u00edstica. No es configurable por el usuario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html",
+ "source": "psirt@bosch.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45226.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45226.json
index e6e0b288c59..a3c7bf6880c 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45226.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45226.json
@@ -2,18 +2,22 @@
"id": "CVE-2023-45226",
"sourceIdentifier": "f5sirt@f5.com",
"published": "2023-10-10T13:15:22.383",
- "lastModified": "2023-10-10T13:41:53.337",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T01:27:45.367",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "\nThe BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. This is only exposed when ssh debug is enabled.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
+ },
+ {
+ "lang": "es",
+ "value": "Los contenedores BIG-IP SPK TMM (M\u00f3dulo de gesti\u00f3n de tr\u00e1fico) f5-debug-sidecar y f5-debug-sshd contienen credenciales codificadas que pueden permitir que un atacante con la capacidad de interceptar el tr\u00e1fico, se haga pasar por el servidor SPK Secure Shell (SSH) en esos contenedores. Esto s\u00f3lo se expone cuando la depuraci\u00f3n ssh est\u00e1 habilitada. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan"
}
],
"metrics": {
"cvssMetricV31": [
{
- "source": "f5sirt@f5.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@@ -31,6 +35,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
+ },
+ {
+ "source": "f5sirt@f5.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.2
}
]
},
@@ -46,10 +70,30 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:1.5.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7120EAB7-4BAE-4ECB-9613-91132FB1EEAD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://my.f5.com/manage/s/article/K000135874",
- "source": "f5sirt@f5.com"
+ "source": "f5sirt@f5.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45228.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45228.json
new file mode 100644
index 00000000000..2b5a31ce59a
--- /dev/null
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45228.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-45228",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T17:15:09.087",
+ "lastModified": "2023-10-26T17:33:34.980",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\nThe application suffers from improper access control when editing users.\n A user with read permissions can manipulate users, passwords, and \npermissions by sending a single HTTP POST request with modified \nparameters.\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n adolece de un control de acceso inadecuado a la hora de editar usuarios. Un usuario con permisos de lectura puede manipular usuarios, contrase\u00f1as y permisos enviando una \u00fanica solicitud HTTP POST con par\u00e1metros modificados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08",
+ "source": "ics-cert@hq.dhs.gov"
+ },
+ {
+ "url": "https://www.sielco.org/en/contacts",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45267.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45267.json
index b703508f3a2..445f6b51cab 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45267.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45267.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45267",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T15:15:44.310",
- "lastModified": "2023-10-13T15:20:17.967",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:36:45.957",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Zizou1988 IRivYou plugin <=\u00a02.2.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Zizou1988 IRivYou en versiones <= 2.2.1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:sharkdropship:irivyou:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.2.1",
+ "matchCriteriaId": "40C84B3B-0449-4476-9E26-43FA91772E6A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wooreviews-importer/wordpress-irivyou-add-reviews-from-aliexpress-and-amazon-to-woocommerce-plugin-2-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45268.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45268.json
index 32921c742f2..b1d8c514af0 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45268.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45268.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45268",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T15:15:44.383",
- "lastModified": "2023-10-13T15:20:17.967",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:09:14.263",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Hitsteps Hitsteps Web Analytics plugin <=\u00a05.86 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Hitsteps Hitsteps Web Analytics en versiones <= 5.86."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hitsteps:hitsteps_web_analytics:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "5.86",
+ "matchCriteriaId": "1977C48D-01FF-463E-ACCF-7F7D5241E9C0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/hitsteps-visitor-manager/wordpress-hitsteps-web-analytics-plugin-5-85-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45269.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45269.json
index 333d1f83258..0e49a0afdad 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45269.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45269.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45269",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T16:15:12.853",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:10:23.203",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in David Cole Simple SEO plugin <=\u00a02.0.23 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento David Cole Simple SEO en versiones <= 2.0.23."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -36,7 +60,7 @@
},
"weaknesses": [
{
- "source": "audit@patchstack.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,12 +68,43 @@
"value": "CWE-352"
}
]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:coleds:simple_seo:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.0.23",
+ "matchCriteriaId": "C92E0C08-77BE-43FA-AF92-C8931442A1E9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cds-simple-seo/wordpress-simple-seo-plugin-2-0-23-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45270.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45270.json
index 3799d7ba9db..43ebd8575fe 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45270.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45270.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45270",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T16:15:12.997",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:40:53.753",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in PINPOINT.WORLD Pinpoint Booking System plugin <=\u00a02.9.9.4.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento PINPOINT.WORLD Pinpoint Booking System en versiones <= 2.9.9.4.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pinpoint:pinpoint_booking_system:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.9.9.4.0",
+ "matchCriteriaId": "9503C752-D54F-4CD3-A3D1-B6285361CF8B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booking-system/wordpress-pinpoint-booking-system-plugin-2-9-9-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45273.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45273.json
index d57ec21be8f..1548267c9ab 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45273.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45273.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45273",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:10.637",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T22:45:44.830",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Matt McKenny Stout Google Calendar plugin <=\u00a01.2.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Matt McKenny Stout Google Calendar en versiones <= 1.2.3."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mattmckenny:stout_google_calendar:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.2.3",
+ "matchCriteriaId": "9F723864-30BA-43D5-94B5-FE49AB27AD2E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/stout-google-calendar/wordpress-stout-google-calendar-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45274.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45274.json
index 4ee7cf72069..00cf7b1737c 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45274.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45274.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45274",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:10.723",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T22:50:01.177",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in SendPulse SendPulse Free Web Push plugin <=\u00a01.3.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgeryios (CSRF) en el complemento SendPulse SendPulse Free Web Push en versiones <= 1.3.1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:sendpulse:free_web_push:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.3.1",
+ "matchCriteriaId": "549785E2-6664-439D-9FCA-2E2D2DBDC9B6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sendpulse-web-push/wordpress-sendpulse-free-web-push-plugin-1-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45276.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45276.json
index 1536f64a79a..576872c5fec 100644
--- a/CVE-2023/CVE-2023-452xx/CVE-2023-45276.json
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45276.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45276",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-13T16:15:13.123",
- "lastModified": "2023-10-13T21:31:49.997",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T19:42:44.870",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in automatededitor.Com Automated Editor plugin <=\u00a01.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento automatededitor.Com Automated Editor en versiones <= 1.3."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:automatededitor:automated_editor:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.3",
+ "matchCriteriaId": "BE3DE221-52E6-4A2A-8A95-3323558B5298"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/automated-editor/wordpress-automated-editor-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45277.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45277.json
new file mode 100644
index 00000000000..0364597a8b4
--- /dev/null
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45277.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-45277",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T17:15:10.150",
+ "lastModified": "2023-10-25T14:48:18.060",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files."
+ },
+ {
+ "lang": "es",
+ "value": "Yamcs 5.8.6 es vulnerable a directory traversal (problema 1 de 2). La vulnerabilidad est\u00e1 en la funcionalidad de almacenamiento de la API y permite escapar del directorio base de los dep\u00f3sitos, navegar libremente por los directorios de system y leer archivos arbitrarios."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CCD705E-7C97-486F-8FB1-158DE969C5F2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45278.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45278.json
new file mode 100644
index 00000000000..dc84c893232
--- /dev/null
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45278.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-45278",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T17:15:10.200",
+ "lastModified": "2023-10-25T14:48:08.543",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Directory Traversal en la funcionalidad de almacenamiento de la API en Yamcs 5.8.6 permite a los atacantes eliminar archivos arbitrarios mediante una solicitud HTTP DELETE manipulada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CCD705E-7C97-486F-8FB1-158DE969C5F2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45279.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45279.json
new file mode 100644
index 00000000000..14bce95637b
--- /dev/null
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45279.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-45279",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T22:15:09.893",
+ "lastModified": "2023-10-25T19:08:53.723",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display."
+ },
+ {
+ "lang": "es",
+ "value": "Yamcs 5.8.6 permite XSS (problema 1 de 2). Viene con un cubo como mecanismo de almacenamiento principal. Los dep\u00f3sitos permiten la carga de cualquier archivo. Hay una manera de cargar una visualizaci\u00f3n que haga referencia a un archivo JavaScript malicioso en el dep\u00f3sito. Luego, el usuario puede abrir la pantalla cargada seleccionando Telemetr\u00eda en el men\u00fa y navegando hasta la pantalla."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CCD705E-7C97-486F-8FB1-158DE969C5F2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45280.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45280.json
new file mode 100644
index 00000000000..2609d6a0969
--- /dev/null
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45280.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-45280",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T22:15:09.953",
+ "lastModified": "2023-10-25T19:05:48.603",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript."
+ },
+ {
+ "lang": "es",
+ "value": "Yamcs 5.8.6 permite XSS (problema 2 de 2). Viene con un cubo como mecanismo de almacenamiento principal. Los dep\u00f3sitos permiten la carga de cualquier archivo. Hay una manera de cargar un archivo HTML que contenga JavaScript arbitrario y luego navegar hasta \u00e9l. Una vez que el usuario abre el archivo, el navegador ejecutar\u00e1 el JavaScript arbitrario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CCD705E-7C97-486F-8FB1-158DE969C5F2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45281.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45281.json
new file mode 100644
index 00000000000..082bd2e8f85
--- /dev/null
+++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45281.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-45281",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T17:15:10.247",
+ "lastModified": "2023-10-25T14:47:01.093",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en Yamcs 5.8.6 permite a los atacantes obtener la cookie de sesi\u00f3n mediante la carga de un archivo HTML manipulado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:spaceapplications:yamcs:5.8.6:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9CCD705E-7C97-486F-8FB1-158DE969C5F2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45312.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45312.json
index 94fb6784d57..15140877a93 100644
--- a/CVE-2023/CVE-2023-453xx/CVE-2023-45312.json
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45312.json
@@ -2,19 +2,81 @@
"id": "CVE-2023-45312",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T21:15:09.680",
- "lastModified": "2023-10-10T23:25:33.373",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T14:13:16.893",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability."
+ },
+ {
+ "lang": "es",
+ "value": "En el componente mtproto_proxy (tambi\u00e9n conocido como proxy MTProto) hasta la versi\u00f3n 0.7.2 para Erlang, un atacante remoto con pocos privilegios puede acceder a una instalaci\u00f3n predeterminada, asegurada incorrectamente, sin autenticarse y lograr la capacidad de ejecuci\u00f3n remota de comandos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1188"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mtproto:mt_proto_proxy:*:*:*:*:*:erlang:*:*",
+ "versionEndIncluding": "0.7.2",
+ "matchCriteriaId": "35F3B9AC-CCF8-4D61-AB4A-488FCF4552D2"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://medium.com/@_sadshade/almost-2000-telegram-proxy-servers-are-potentially-vulnerable-to-rce-since-2018-742a455be16b",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Technical Description",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45317.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45317.json
new file mode 100644
index 00000000000..4feea65b8b7
--- /dev/null
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45317.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-45317",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T17:15:09.177",
+ "lastModified": "2023-10-26T17:33:34.980",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nThe application interface allows users to perform certain actions via \nHTTP requests without performing any validity checks to verify the \nrequests. This can be exploited to perform certain actions with \nadministrative privileges if a logged-in user visits a malicious web \nsite.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La interfaz de la aplicaci\u00f3n permite a los usuarios realizar ciertas acciones a trav\u00e9s de solicitudes HTTP sin realizar ninguna verificaci\u00f3n de validez para verificar las solicitudes. Esto se puede aprovechar para realizar determinadas acciones con privilegios administrativos si un usuario que ha iniciado sesi\u00f3n visita un sitio web malicioso."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08",
+ "source": "ics-cert@hq.dhs.gov"
+ },
+ {
+ "url": "https://www.sielco.org/en/contacts",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45321.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45321.json
new file mode 100644
index 00000000000..57cb25be4a1
--- /dev/null
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45321.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45321",
+ "sourceIdentifier": "psirt@bosch.com",
+ "published": "2023-10-25T18:17:33.183",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Android Client application, when enrolled with the define method 1 (the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user. Due to the lack of encryption of HTTP,this issue allows an attacker placed in the same subnet network of the HMI device to intercept username and password necessary to authenticate to the MQTT server responsible to implement the remote management protocol."
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n Cliente de Android, cuando se inscribe con el m\u00e9todo de definici\u00f3n 1 (el usuario inserta manualmente la direcci\u00f3n IP del servidor), usa el protocolo HTTP para recuperar informaci\u00f3n confidencial (direcci\u00f3n IP y credenciales para conectarse a una entidad de intermediario MQTT remota) en lugar de HTTPS y esta caracter\u00edstica. No es configurable por el usuario. Debido a la falta de cifrado de HTTP, este problema permite que un atacante ubicado en la misma red de subred del dispositivo HMI intercepte el nombre de usuario y la contrase\u00f1a necesarios para autenticarse en el servidor MQTT responsable de implementar el protocolo de administraci\u00f3n remota."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "LOW",
+ "baseScore": 8.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-319"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html",
+ "source": "psirt@bosch.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45348.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45348.json
index f07debd0211..6158497b5af 100644
--- a/CVE-2023/CVE-2023-453xx/CVE-2023-45348.json
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45348.json
@@ -2,15 +2,42 @@
"id": "CVE-2023-45348",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-14T10:15:10.473",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T18:15:10.200",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "\nApache Airflow, versions 2.7.0 and 2.7.1, is affected by a vulnerability that allows an authenticated user to retrieve sensitive configuration information when the \"expose_config\" option is set to \"non-sensitive-only\". The `expose_config` option is False by default.\nIt is recommended to upgrade to a version that is not affected."
+ },
+ {
+ "lang": "es",
+ "value": "Apache Airflow, versiones 2.7.0 y 2.7.1, se ve afectada por una vulnerabilidad que permite a un usuario autenticado recuperar informaci\u00f3n de configuraci\u00f3n confidencial cuando la opci\u00f3n \"expose_config\" est\u00e1 configurada en \"non-sensitive-only\". La opci\u00f3n `expose_config` es \"Falso\" de forma predeterminada. Se recomienda actualizar a una versi\u00f3n que no se vea afectada."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
"weaknesses": [
{
"source": "security@apache.org",
@@ -23,14 +50,44 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.7.0",
+ "versionEndExcluding": "2.7.2",
+ "matchCriteriaId": "4A172F92-ABFA-4488-9EBD-694F915720B2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
- "url": "https://github.com/apache/airflow/pull/34712",
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/23/2",
"source": "security@apache.org"
},
+ {
+ "url": "https://github.com/apache/airflow/pull/34712",
+ "source": "security@apache.org",
+ "tags": [
+ "Patch"
+ ]
+ },
{
"url": "https://lists.apache.org/thread/sy4l5d6tn58hr8r61r2fkt1f0qock9z9",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45357.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45357.json
index f82125f791d..0cdef36383d 100644
--- a/CVE-2023/CVE-2023-453xx/CVE-2023-45357.json
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45357.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45357",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T05:15:50.583",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T19:56:37.377",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
{
"source": "cve@mitre.org",
"type": "Secondary",
@@ -38,10 +58,44 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-668"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0",
+ "versionEndExcluding": "6.13.0.2.2",
+ "matchCriteriaId": "C3902561-6BC2-41B6-8FF0-3D159DE51CDC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45358.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45358.json
index b0156081263..9b948c30e3b 100644
--- a/CVE-2023/CVE-2023-453xx/CVE-2023-45358.json
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45358.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45358",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T05:15:50.657",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T19:19:29.867",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "cve@mitre.org",
"type": "Secondary",
@@ -38,10 +58,44 @@
}
]
},
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0",
+ "versionEndExcluding": "6.13.0.2.2",
+ "matchCriteriaId": "C3902561-6BC2-41B6-8FF0-3D159DE51CDC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45375.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45375.json
index 315078fefe4..4bf9075ed4a 100644
--- a/CVE-2023/CVE-2023-453xx/CVE-2023-45375.json
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45375.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45375",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T05:15:50.733",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T13:53:31.007",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,69 @@
"value": "En el m\u00f3dulo \"PireosPay\" (pireospay) anterior a la versi\u00f3n 1.7.10 de 01generator.com para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL a trav\u00e9s de `PireosPayValidationModuleFrontController::postProcess().`"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:01generator:pireospay:*:*:*:*:*:prestashop:*:*",
+ "versionEndExcluding": "1.7.10",
+ "matchCriteriaId": "FA4C1C8B-A9E0-432A-A3B3-3524066CB4A3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45376.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45376.json
new file mode 100644
index 00000000000..231d67a4492
--- /dev/null
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45376.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-45376",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T20:15:09.313",
+ "lastModified": "2023-10-20T11:27:35.620",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In the module \"Carousels Pack - Instagram, Products, Brands, Supplier\" (hicarouselspack) for PrestaShop up to version 1.5.0 from HiPresta for PrestaShop, a guest can perform SQL injection via HiCpProductGetter::getViewedProduct().`"
+ },
+ {
+ "lang": "es",
+ "value": "En el m\u00f3dulo \"Carousels Pack - Instagram, Products, Brands, Supplier\" (hicarouselspack) para PrestaShop hasta la versi\u00f3n 1.5.0 de HiPresta para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL a trav\u00e9s de HiCpProductGetter::getViewedProduct().`"
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://addons.prestashop.com/en/sliders-galleries/20410-carousels-pack-instagram-products-brands-supplier.html",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://security.friendsofpresta.org/modules/2023/10/19/hicarouselspack.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45379.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45379.json
new file mode 100644
index 00000000000..b4f9c8f68cb
--- /dev/null
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45379.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-45379",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T13:15:10.323",
+ "lastModified": "2023-10-25T15:30:26.320",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In the module \"Rotator Img\" (posrotatorimg) in versions at least up to 1.1 from PosThemes for PrestaShop, a guest can perform SQL injection."
+ },
+ {
+ "lang": "es",
+ "value": "En el m\u00f3dulo \"Rotator Img\" (posrotatorimg) en versiones al menos hasta 1.1 de PosThemes para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:posthemes:posrotatorimg:*:*:*:*:*:prestashop:*:*",
+ "versionEndIncluding": "1.1",
+ "matchCriteriaId": "AC523A14-8792-48D2-A0C4-0B6D8F31ACC8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://posrotatorimg.com",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
+ },
+ {
+ "url": "https://security.friendsofpresta.org/modules/2023/10/17/posrotatorimg.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45381.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45381.json
new file mode 100644
index 00000000000..016f7c36b44
--- /dev/null
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45381.json
@@ -0,0 +1,87 @@
+{
+ "id": "CVE-2023-45381",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T19:15:15.817",
+ "lastModified": "2023-10-25T20:04:27.023",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In the module \"Creative Popup\" (creativepopup) up to version 1.6.9 from WebshopWorks for PrestaShop, a guest can perform SQL injection via `cp_download_popup().`"
+ },
+ {
+ "lang": "es",
+ "value": "En el m\u00f3dulo \"Creative Popup\" (creativepopup) hasta la versi\u00f3n 1.6.9 de WebshopWorks para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL a trav\u00e9s de `cp_download_popup().`"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:webshopworks:creativepopup:*:*:*:*:*:prestashop:*:*",
+ "versionEndExcluding": "1.6.10",
+ "matchCriteriaId": "31E7F000-F676-47DE-A104-10B7825BF044"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://addons.prestashop.com/fr/pop-up/39348-creative-popup.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://security.friendsofpresta.org/modules/2023/10/19/creativepopup.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45383.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45383.json
new file mode 100644
index 00000000000..6a8620afae5
--- /dev/null
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45383.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-45383",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T16:15:08.853",
+ "lastModified": "2023-10-25T01:24:51.267",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In the module \"SoNice etiquetage\" (sonice_etiquetage) up to version 2.5.9 from Common-Services for PrestaShop, a guest can download personal information without restriction by performing a path traversal attack. Due to a lack of permissions control and a lack of control in the path name construction, a guest can perform a path traversal to view all files on the information system."
+ },
+ {
+ "lang": "es",
+ "value": "En el m\u00f3dulo \"SoNice etiquetage\" (sonice_etiquetage) hasta la versi\u00f3n 2.5.9 de Common-Services para PrestaShop, un invitado puede descargar informaci\u00f3n personal sin restricciones realizando un ataque de path traversal. Debido a la falta de control de permisos y a la falta de control en la construcci\u00f3n del nombre de la ruta, un invitado puede realizar un path traversal para ver todos los archivos en el sistema de informaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:common-services:sonice_etiquetage:*:*:*:*:*:prestashop:*:*",
+ "versionEndIncluding": "2.5.9",
+ "matchCriteriaId": "A4383B07-F5F9-4D03-8FEC-1998581163F7"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://common-services.com/fr/home-fr/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://security.friendsofpresta.org/modules/2023/10/17/sonice_etiquetage.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45384.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45384.json
new file mode 100644
index 00000000000..721fe9aa557
--- /dev/null
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45384.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-45384",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T13:15:10.387",
+ "lastModified": "2023-10-25T15:26:34.353",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "KnowBand supercheckout > 5.0.7 and < 6.0.7 is vulnerable to Unrestricted Upload of File with Dangerous Type. In the module \"Module One Page Checkout, Social Login & Mailchimp\" (supercheckout), a guest can upload files with extensions .php"
+ },
+ {
+ "lang": "es",
+ "value": "KnowBand supercheckout > 5.0.7 y < 6.0.7 es vulnerable a la carga sin restricciones de archivos con tipos peligrosos. En el m\u00f3dulo \"Module One Page Checkout, Social Login & Mailchimp\" (supercheckout), un invitado puede cargar archivos con extensiones .php"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:knowband:supercheckout:*:*:*:*:*:prestashop:*:*",
+ "versionStartIncluding": "5.0.7",
+ "versionEndExcluding": "6.0.7",
+ "matchCriteriaId": "95F6F1F2-4D6C-46A2-8AC6-03DD6D49F30A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://addons.prestashop.com/fr/processus-rapide-commande/18016-one-page-checkout-social-login-mailchimp.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://security.friendsofpresta.org/modules/2023/10/17/supercheckout.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45386.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45386.json
index cd7d23e5378..2a0dea81d3c 100644
--- a/CVE-2023/CVE-2023-453xx/CVE-2023-45386.json
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45386.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45386",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-17T05:15:50.787",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T14:15:43.003",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,69 @@
"value": "En el m\u00f3dulo extratabspro anterior a la versi\u00f3n 2.2.8 de MyPresta.eu para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL a trav\u00e9s de `extratabspro::searchcategory()`, `extratabspro::searchproduct()` y `extratabspro::searchmanufacturer().'"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mypresta:product_extra_tabs_pro:*:*:*:*:*:prestashop:*:*",
+ "versionEndExcluding": "2.2.8",
+ "matchCriteriaId": "6650928D-595D-4DD1-B61E-AD026812AA6A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45391.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45391.json
index acd44ed22de..0faf89273bf 100644
--- a/CVE-2023/CVE-2023-453xx/CVE-2023-45391.json
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45391.json
@@ -2,19 +2,79 @@
"id": "CVE-2023-45391",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T14:15:10.587",
- "lastModified": "2023-10-13T14:44:03.987",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T15:06:56.997",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Create A New Employee function of Granding UTime Master v9.0.7-Build:Apr 4,2023 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the First Name parameter."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) Almacenada en la funci\u00f3n Create A New Employee de Granding UTime Master v9.0.7-Build:Apr 4,2023 permite a atacantes autenticados ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro First Name."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grandingteco:utime_master:9.0.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A0A22621-1A83-4F7F-BDDF-6E29F9C73DA9"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://the-it-wonders.blogspot.com/2023/10/granding-utime-master-stored-xss.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45393.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45393.json
index 64ded7942df..d59e39ee26c 100644
--- a/CVE-2023/CVE-2023-453xx/CVE-2023-45393.json
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45393.json
@@ -2,19 +2,79 @@
"id": "CVE-2023-45393",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T14:15:10.847",
- "lastModified": "2023-10-13T14:44:03.987",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T17:09:10.553",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An indirect object reference (IDOR) in GRANDING UTime Master v9.0.7-Build:Apr 4,2023 allows authenticated attackers to access sensitive information via a crafted cookie."
+ },
+ {
+ "lang": "es",
+ "value": "Una Indirect Object Reference (IDOR) en GRANDING UTime Master v9.0.7-Build:4 de abril de 2023 permite a atacantes autenticados acceder a informaci\u00f3n confidencial a trav\u00e9s de una cookie manipulada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-639"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grandingteco:utime_master:9.0.7:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A0A22621-1A83-4F7F-BDDF-6E29F9C73DA9"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://the-it-wonders.blogspot.com/2023/10/granding-utime-master-idor.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45394.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45394.json
new file mode 100644
index 00000000000..1314d19014c
--- /dev/null
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45394.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-45394",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T04:15:10.237",
+ "lastModified": "2023-10-20T11:27:23.627",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Stored Cross-Site Scripting (XSS) vulnerability in the Company field in the \"Request a Quote\" Section of Small CRM v3.0 allows an attacker to store and execute malicious javascript code in the Admin panel which leads to Admin account takeover."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en el campo Company en la secci\u00f3n \"Solicitar una cotizaci\u00f3n\" de Small CRM v3.0 permite a un atacante almacenar y ejecutar c\u00f3digo javascript malicioso en el panel de administraci\u00f3n, lo que conduce a la apropiaci\u00f3n de la cuenta de Administrador."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/kartik753/CVE/blob/main/CVE-2023-45394",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45396.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45396.json
index e92478704f5..d1c4afce88b 100644
--- a/CVE-2023/CVE-2023-453xx/CVE-2023-45396.json
+++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45396.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-45396",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-11T14:15:09.993",
- "lastModified": "2023-10-11T14:23:06.207",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T16:48:56.953",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An Insecure Direct Object Reference (IDOR) vulnerability leads to events profiles access in Elenos ETG150 FM transmitter running on version 3.12."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Insecure Direct Object Reference (IDOR) conduce al acceso a perfiles de eventos en el transmisor FM Elenos ETG150 que se ejecuta en la versi\u00f3n 3.12."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-639"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:elenos:etg150_firmware:3.12:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0BC76559-2E3D-4749-A709-F8735AFCA18B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:elenos:etg150:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "202EBB13-21FD-4F02-A3F7-A9980EB6EDDB"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/strik3r0x1/Vulns/blob/main/(IDOR)%20leads%20to%20events%20profiles%20access%20-%20Elenos.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-454xx/CVE-2023-45464.json b/CVE-2023/CVE-2023-454xx/CVE-2023-45464.json
index c0f6a176c54..bab15476c55 100644
--- a/CVE-2023/CVE-2023-454xx/CVE-2023-45464.json
+++ b/CVE-2023/CVE-2023-454xx/CVE-2023-45464.json
@@ -2,19 +2,92 @@
"id": "CVE-2023-45464",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T13:15:12.043",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:27:25.730",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the servDomain parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Netis N3Mv2-V1.0.1.865 conten\u00eda un desbordamiento del b\u00fafer a trav\u00e9s del par\u00e1metro servDomain. Esta vulnerabilidad permite a los atacantes provocar una Denegaci\u00f3n de Servicio (DoS) mediante una entrada manipulada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netis-systems:n3m_firmware:1.0.1.865:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C183597B-AF8E-4019-BA83-D47FC1AA71E7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netis-systems:n3m:v2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C6E4234-6312-4E6B-910A-E0795AA11491"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20servDomain%20parameter%20leads%20to%20DOS.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Product",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-454xx/CVE-2023-45465.json b/CVE-2023/CVE-2023-454xx/CVE-2023-45465.json
index 6d07a19d2ee..1f2647ee3b3 100644
--- a/CVE-2023/CVE-2023-454xx/CVE-2023-45465.json
+++ b/CVE-2023/CVE-2023-454xx/CVE-2023-45465.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-45465",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T13:15:12.093",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:18:38.903",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the ddnsDomainName parameter in the Dynamic DNS settings."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Netis N3Mv2-V1.0.1.865 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro ddnsDomainName en la configuraci\u00f3n de Dynamic DNS."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-77"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netis-systems:n3m_firmware:1.0.1.865:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C183597B-AF8E-4019-BA83-D47FC1AA71E7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netis-systems:n3m:v2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C6E4234-6312-4E6B-910A-E0795AA11491"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ddnsDomainName%20parameter%20in%20Dynamic%20DNS%20setting.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-454xx/CVE-2023-45467.json b/CVE-2023/CVE-2023-454xx/CVE-2023-45467.json
index 286d52d238e..a762e3a5962 100644
--- a/CVE-2023/CVE-2023-454xx/CVE-2023-45467.json
+++ b/CVE-2023/CVE-2023-454xx/CVE-2023-45467.json
@@ -2,19 +2,91 @@
"id": "CVE-2023-45467",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-13T13:15:12.203",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T16:10:18.270",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the ntpServIP parameter in the Time Settings."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Netis N3Mv2-V1.0.1.865 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro ntpServIP en la configuraci\u00f3n Time."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:netis-systems:n3m_firmware:1.0.1.865:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C183597B-AF8E-4019-BA83-D47FC1AA71E7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:netis-systems:n3m:v2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C6E4234-6312-4E6B-910A-E0795AA11491"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ntpServIP%20parameter%20in%20Time%20Settings%20.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-454xx/CVE-2023-45471.json b/CVE-2023/CVE-2023-454xx/CVE-2023-45471.json
new file mode 100644
index 00000000000..f848cbc113e
--- /dev/null
+++ b/CVE-2023/CVE-2023-454xx/CVE-2023-45471.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-45471",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T04:15:10.720",
+ "lastModified": "2023-10-20T11:27:23.627",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page."
+ },
+ {
+ "lang": "es",
+ "value": "El QAD Search Server es vulnerable a Cross-Site Scripting (XSS) Almacenado en versiones hasta la 1.0.0.315 incluida debido a comprobaciones insuficientes de los \u00edndices. Esto hace posible que atacantes no autenticados creen un nuevo \u00edndice e inyecten un script web malicioso en su nombre, que se ejecutar\u00e1 cada vez que un usuario acceda a la p\u00e1gina de b\u00fasqueda."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/itsAptx/CVE-2023-45471",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-454xx/CVE-2023-45498.json b/CVE-2023/CVE-2023-454xx/CVE-2023-45498.json
new file mode 100644
index 00000000000..38c5be95121
--- /dev/null
+++ b/CVE-2023/CVE-2023-454xx/CVE-2023-45498.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-45498",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T04:15:10.487",
+ "lastModified": "2023-10-27T19:15:41.303",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "VinChin Backup & Recovery v5.0.*, v6.0.*, v6.7.*, and v7.0.* was discovered to contain a command injection vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que VinChin Backup & Recovery v5.0.*, v6.0.*, v6.7.* y v7.0.* contiene una vulnerabilidad de inyecci\u00f3n de comandos."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/31",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-454xx/CVE-2023-45499.json b/CVE-2023/CVE-2023-454xx/CVE-2023-45499.json
new file mode 100644
index 00000000000..965cac732e4
--- /dev/null
+++ b/CVE-2023/CVE-2023-454xx/CVE-2023-45499.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-45499",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T04:15:10.617",
+ "lastModified": "2023-10-27T19:15:41.360",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "VinChin Backup & Recovery v5.0.*, v6.0.*, v6.7.*, and v7.0.* was discovered to contain hardcoded credentials."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que VinChin Backup & Recovery v5.0.*, v6.0.*, v6.7.* y v7.0.* conten\u00eda credenciales codificadas."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/31",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45510.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45510.json
index 7fea9810ba3..c66888bf78d 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45510.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45510.json
@@ -2,23 +2,86 @@
"id": "CVE-2023-45510",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T21:15:11.373",
- "lastModified": "2023-10-13T12:47:48.873",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T13:00:07.247",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "tsMuxer version git-2539d07 was discovered to contain an alloc-dealloc-mismatch (operator new [] vs operator delete) error."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que la versi\u00f3n git-2539d07 de tsMuxer conten\u00eda un error alloc-dealloc-mismatch (operador nuevo [] versus operador eliminado)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justdan96:tsmuxer:nightly-2023-10-05-01-55-56:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06EE3DA3-2DA0-46A5-84DB-D82906A5B27A"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/justdan96/tsMuxer",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/justdan96/tsMuxer/issues/778",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45511.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45511.json
index d98d7ee5d98..8bc900412ab 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45511.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45511.json
@@ -2,23 +2,87 @@
"id": "CVE-2023-45511",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-12T21:15:11.437",
- "lastModified": "2023-10-13T12:47:48.873",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T12:59:41.747",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A memory leak in tsMuxer version git-2539d07 allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file."
+ },
+ {
+ "lang": "es",
+ "value": "La p\u00e9rdida de memoria en la versi\u00f3n git-2539d07 de tsMuxer permite a los atacantes provocar una Denegaci\u00f3n de Servicio (DoS) a trav\u00e9s de un archivo MP4 manipulado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-401"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:justdan96:tsmuxer:nightly-2023-10-05-01-55-56:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06EE3DA3-2DA0-46A5-84DB-D82906A5B27A"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/justdan96/tsMuxer",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://github.com/justdan96/tsMuxer/issues/780",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45540.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45540.json
index a9d0535d3aa..bc9bb9d24a6 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45540.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45540.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45540",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T22:15:12.733",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T16:39:15.033",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,67 @@
"value": "Un problema en Jorani Leave Management System 1.0.3 permite a un atacante remoto ejecutar c\u00f3digo HTML arbitrario a trav\u00e9s de un script manipulado en el campo de comentarios de la p\u00e1gina solicitudes List of Leave."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-74"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:jorani:leave_management_system:1.0.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "00938F19-AED2-4697-BB0A-192C64490BDC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/soundarkutty/HTML-Injection/blob/main/POC.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45542.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45542.json
index ff23f72d84f..71e85f634b4 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45542.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45542.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45542",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T21:15:11.517",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:56:38.130",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,66 @@
"value": "Una vulnerabilidad de Cross Site Scripting en mooSocial 3.1.8 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un script manipulado para el par\u00e1metro q en la funci\u00f3n de Search."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:moosocial:moosocial:3.1.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4DFC6658-3CF4-4FDA-B119-2A0687F3F5A2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/ahrixia/CVE-2023-45542",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45554.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45554.json
new file mode 100644
index 00000000000..3af41bcf8d0
--- /dev/null
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45554.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-45554",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:33.257",
+ "lastModified": "2023-10-27T21:55:06.353",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "File Upload vulnerability in zzzCMS v.2.1.9 allows a remote attacker to execute arbitrary code via modification of the imageext parameter from jpg, jpeg,gif, and png to jpg, jpeg,gif, png, pphphp."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de carga de archivos en zzzCMS v.2.1.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario mediante la modificaci\u00f3n del par\u00e1metro imageext de jpg, jpeg,gif, y png a jpg, jpeg,gif, png, pphphp. "
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zzzcms:zzzcms:2.1.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49DECA76-6E45-442A-A136-8F1B8E53ADF4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45555.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45555.json
new file mode 100644
index 00000000000..a32c031328c
--- /dev/null
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45555.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-45555",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:33.307",
+ "lastModified": "2023-10-27T21:56:30.477",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "File Upload vulnerability in zzzCMS v.2.1.9 allows a remote attacker to execute arbitrary code via a crafted file to the down_url function in zzz.php file."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de carga de archivos en zzzCMS v.2.1.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado en la funci\u00f3n down_url en el archivo zzz.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zzzcms:zzzcms:2.1.9:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49DECA76-6E45-442A-A136-8F1B8E53ADF4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45572.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45572.json
index 7eff2d7eb73..82a2bcee328 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45572.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45572.json
@@ -2,19 +2,260 @@
"id": "CVE-2023-45572",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T06:15:12.070",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:18:44.563",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Buffer Overflow vulnerability in DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the fn parameter of the tgfile.htm function."
+ "value": "Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the fn parameter of the tgfile.htm function."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el dispositivo D-Link DI-7003GV2.D1 v.23.08.25D1 y anteriores, DI-7100G+V2.D1 v.23.08.23D1 y anteriores, DI-7100GV2.D1 v.23.08.23D1, DI-7200G +V2.D1 v.23.08.23D1 y anteriores, DI-7200GV2.E1 v.23.08.23E1 y anteriores, DI-7300G+V2.D1 v.23.08.23D1 y DI-7400G+V2.D1 v.23.08. 23D1 y anteriores permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro fn de la funci\u00f3n tgfile.htm."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.25d1",
+ "matchCriteriaId": "DF075223-7784-4FB7-928A-CE097AD98324"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31604D70-5B52-47AC-93A2-71166176253E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BF92551F-76EE-48D4-AB93-40F427847907"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F87354E1-7EFE-4935-ADDD-4614469C9E90"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "713594B3-8B47-4756-9B7A-EC4F4CD2BD58"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE715DF0-1341-4E7B-95BF-B1031BCFA185"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BBE0C94D-A68E-4CAF-B6E1-124EAC124BF5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29E72D4B-FAA5-4C3E-942B-DB7C5CC55691"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23e1",
+ "matchCriteriaId": "2B6055DC-C51D-4C52-B34D-0AEC6601CB99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDF945B6-549E-4F6A-9432-8D6B2A7E350C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "2A4E73CD-4883-4C19-9345-22281342B600"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "916E75E5-010A-4A8F-B3AD-21FCC76C890A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "46460C55-22D0-4D9C-B4D7-3F108F636469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1495874C-DEF5-4200-B272-C7779EB3E265"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug1.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45573.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45573.json
index 60237457e94..000a45266a9 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45573.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45573.json
@@ -2,19 +2,260 @@
"id": "CVE-2023-45573",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T06:15:12.357",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T22:15:10.000",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Buffer Overflow vulnerability in DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wild/mx parameter of the ddns.asp function."
+ "value": "Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the n parameter of the mrclfile_del.asp function."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el dispositivo D-Link DI-7003GV2.D1 v.23.08.25D1 y anteriores, DI-7100G+V2.D1 v.23.08.23D1 y anteriores, DI-7100GV2.D1 v.23.08.23D1, DI-7200G +V2.D1 v.23.08.23D1 y anteriores, DI-7200GV2.E1 v.23.08.23E1 y anteriores, DI-7300G+V2.D1 v.23.08.23D1 y DI-7400G+V2.D1 v.23.08. 23D1 y anteriores permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro n de la funci\u00f3n mrclfile_del.asp."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.25d1",
+ "matchCriteriaId": "DF075223-7784-4FB7-928A-CE097AD98324"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31604D70-5B52-47AC-93A2-71166176253E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BF92551F-76EE-48D4-AB93-40F427847907"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F87354E1-7EFE-4935-ADDD-4614469C9E90"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "713594B3-8B47-4756-9B7A-EC4F4CD2BD58"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE715DF0-1341-4E7B-95BF-B1031BCFA185"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BBE0C94D-A68E-4CAF-B6E1-124EAC124BF5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29E72D4B-FAA5-4C3E-942B-DB7C5CC55691"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23e1",
+ "matchCriteriaId": "2B6055DC-C51D-4C52-B34D-0AEC6601CB99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDF945B6-549E-4F6A-9432-8D6B2A7E350C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "2A4E73CD-4883-4C19-9345-22281342B600"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "916E75E5-010A-4A8F-B3AD-21FCC76C890A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "46460C55-22D0-4D9C-B4D7-3F108F636469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1495874C-DEF5-4200-B272-C7779EB3E265"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug7.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45574.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45574.json
index d7c96cb5541..e9fd060f036 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45574.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45574.json
@@ -2,23 +2,267 @@
"id": "CVE-2023-45574",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T06:15:12.607",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:02:08.663",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "Buffer Overflow vulnerability in DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the fn parameter of the file.data function."
+ "value": "Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the fn parameter of the file.data function."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el dispositivo D-Link DI-7003GV2.D1 v.23.08.25D1 y anteriores, DI-7100G+V2.D1 v.23.08.23D1 y anteriores, DI-7100GV2.D1 v.23.08.23D1, DI-7200G +V2.D1 v.23.08.23D1 y anteriores, DI-7200GV2.E1 v.23.08.23E1 y anteriores, DI-7300G+V2.D1 v.23.08.23D1 y DI-7400G+V2.D1 v.23.08. 23D1 y anteriores permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro fn de la funci\u00f3n file.data."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.25d1",
+ "matchCriteriaId": "DF075223-7784-4FB7-928A-CE097AD98324"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31604D70-5B52-47AC-93A2-71166176253E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BF92551F-76EE-48D4-AB93-40F427847907"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F87354E1-7EFE-4935-ADDD-4614469C9E90"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "713594B3-8B47-4756-9B7A-EC4F4CD2BD58"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE715DF0-1341-4E7B-95BF-B1031BCFA185"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BBE0C94D-A68E-4CAF-B6E1-124EAC124BF5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29E72D4B-FAA5-4C3E-942B-DB7C5CC55691"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23e1",
+ "matchCriteriaId": "2B6055DC-C51D-4C52-B34D-0AEC6601CB99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDF945B6-549E-4F6A-9432-8D6B2A7E350C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "2A4E73CD-4883-4C19-9345-22281342B600"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "916E75E5-010A-4A8F-B3AD-21FCC76C890A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "46460C55-22D0-4D9C-B4D7-3F108F636469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1495874C-DEF5-4200-B272-C7779EB3E265"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug2.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45575.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45575.json
index fccec383e0d..b747e391ea7 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45575.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45575.json
@@ -2,19 +2,260 @@
"id": "CVE-2023-45575",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T06:15:12.890",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T19:55:33.170",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "Buffer Overflow vulnerability in DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the ip parameter of the ip_position.asp function."
+ "value": "Stack Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the ip parameter of the ip_position.asp function."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desbordamiento de pila en el dispositivo D-Link DI-7003GV2.D1 v.23.08.25D1 y anteriores, DI-7100G+V2.D1 v.23.08.23D1 y anteriores, DI-7100GV2.D1 v.23.08.23D1, DI-7200G +V2.D1 v.23.08.23D1 y anteriores, DI-7200GV2.E1 v.23.08.23E1 y anteriores, DI-7300G+V2.D1 v.23.08.23D1 y DI-7400G+V2.D1 v.23.08. 23D1 y anteriores permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro ip de la funci\u00f3n ip_position.asp."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.25d1",
+ "matchCriteriaId": "DF075223-7784-4FB7-928A-CE097AD98324"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31604D70-5B52-47AC-93A2-71166176253E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BF92551F-76EE-48D4-AB93-40F427847907"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F87354E1-7EFE-4935-ADDD-4614469C9E90"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "713594B3-8B47-4756-9B7A-EC4F4CD2BD58"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE715DF0-1341-4E7B-95BF-B1031BCFA185"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BBE0C94D-A68E-4CAF-B6E1-124EAC124BF5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29E72D4B-FAA5-4C3E-942B-DB7C5CC55691"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23e1",
+ "matchCriteriaId": "2B6055DC-C51D-4C52-B34D-0AEC6601CB99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDF945B6-549E-4F6A-9432-8D6B2A7E350C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "2A4E73CD-4883-4C19-9345-22281342B600"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "916E75E5-010A-4A8F-B3AD-21FCC76C890A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "46460C55-22D0-4D9C-B4D7-3F108F636469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1495874C-DEF5-4200-B272-C7779EB3E265"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug5.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45576.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45576.json
index 0d575ca519f..3ece347a554 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45576.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45576.json
@@ -2,19 +2,260 @@
"id": "CVE-2023-45576",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T07:15:08.843",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T18:30:19.587",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "Buffer Overflow vulnerability in DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the remove_ext_proto/remove_ext_port parameter of the upnp_ctrl.asp function."
+ "value": "Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the remove_ext_proto/remove_ext_port parameter of the upnp_ctrl.asp function."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el dispositivo D-Link DI-7003GV2.D1 v.23.08.25D1 y anteriores, DI-7100G+V2.D1 v.23.08.23D1 y anteriores, DI-7100GV2.D1 v.23.08.23D1, DI-7200G +V2.D1 v.23.08.23D1 y anteriores, DI-7200GV2.E1 v.23.08.23E1 y anteriores, DI-7300G+V2.D1 v.23.08.23D1 y DI-7400G+V2.D1 v.23.08. 23D1 y anteriores permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro remove_ext_proto/remove_ext_port de la funci\u00f3n upnp_ctrl.asp."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.25d1",
+ "matchCriteriaId": "DF075223-7784-4FB7-928A-CE097AD98324"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31604D70-5B52-47AC-93A2-71166176253E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BF92551F-76EE-48D4-AB93-40F427847907"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F87354E1-7EFE-4935-ADDD-4614469C9E90"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "713594B3-8B47-4756-9B7A-EC4F4CD2BD58"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE715DF0-1341-4E7B-95BF-B1031BCFA185"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BBE0C94D-A68E-4CAF-B6E1-124EAC124BF5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29E72D4B-FAA5-4C3E-942B-DB7C5CC55691"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23e1",
+ "matchCriteriaId": "2B6055DC-C51D-4C52-B34D-0AEC6601CB99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDF945B6-549E-4F6A-9432-8D6B2A7E350C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "2A4E73CD-4883-4C19-9345-22281342B600"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "916E75E5-010A-4A8F-B3AD-21FCC76C890A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "46460C55-22D0-4D9C-B4D7-3F108F636469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1495874C-DEF5-4200-B272-C7779EB3E265"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug3.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45577.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45577.json
index f9a92eda24d..805b5a02c5d 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45577.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45577.json
@@ -2,19 +2,260 @@
"id": "CVE-2023-45577",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T07:15:08.907",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:50:50.487",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "An issue in DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wanid parameter of the H5/speedlimit.data function."
+ "value": "Stack Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wanid parameter of the H5/speedlimit.data function."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desbordamiento de pila en el dispositivo D-Link DI-7003GV2.D1 v.23.08.25D1 y anteriores, DI-7100G+V2.D1 v.23.08.23D1 y anteriores, DI-7100GV2.D1 v.23.08.23D1, DI-7200G +V2.D1 v.23.08.23D1 y anteriores, DI-7200GV2.E1 v.23.08.23E1 y anteriores, DI-7300G+V2.D1 v.23.08.23D1 y DI-7400G+V2.D1 v.23.08. 23D1 y anteriores permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro wanid de la funci\u00f3n H5/speedlimit.data."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.25d1",
+ "matchCriteriaId": "DF075223-7784-4FB7-928A-CE097AD98324"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31604D70-5B52-47AC-93A2-71166176253E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BF92551F-76EE-48D4-AB93-40F427847907"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F87354E1-7EFE-4935-ADDD-4614469C9E90"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "713594B3-8B47-4756-9B7A-EC4F4CD2BD58"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE715DF0-1341-4E7B-95BF-B1031BCFA185"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BBE0C94D-A68E-4CAF-B6E1-124EAC124BF5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29E72D4B-FAA5-4C3E-942B-DB7C5CC55691"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23e1",
+ "matchCriteriaId": "2B6055DC-C51D-4C52-B34D-0AEC6601CB99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDF945B6-549E-4F6A-9432-8D6B2A7E350C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "2A4E73CD-4883-4C19-9345-22281342B600"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "916E75E5-010A-4A8F-B3AD-21FCC76C890A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "46460C55-22D0-4D9C-B4D7-3F108F636469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1495874C-DEF5-4200-B272-C7779EB3E265"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug9.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45578.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45578.json
index 9f3a1e0574f..f08d107aa24 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45578.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45578.json
@@ -2,19 +2,260 @@
"id": "CVE-2023-45578",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T07:15:08.967",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:48:39.333",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "Buffer Overflow vulnerability in DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the pap_en/chap_en parameter of the pppoe_base.asp function."
+ "value": "Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the pap_en/chap_en parameter of the pppoe_base.asp function."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el dispositivo D-Link DI-7003GV2.D1 v.23.08.25D1 y anteriores, DI-7100G+V2.D1 v.23.08.23D1 y anteriores, DI-7100GV2.D1 v.23.08.23D1, DI-7200G +V2.D1 v.23.08.23D1 y anteriores, DI-7200GV2.E1 v.23.08.23E1 y anteriores, DI-7300G+V2.D1 v.23.08.23D1 y DI-7400G+V2.D1 v.23.08. 23D1 y anteriores permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro pap_en/chap_en de la funci\u00f3n pppoe_base.asp."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.25d1",
+ "matchCriteriaId": "DF075223-7784-4FB7-928A-CE097AD98324"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31604D70-5B52-47AC-93A2-71166176253E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BF92551F-76EE-48D4-AB93-40F427847907"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F87354E1-7EFE-4935-ADDD-4614469C9E90"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "713594B3-8B47-4756-9B7A-EC4F4CD2BD58"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE715DF0-1341-4E7B-95BF-B1031BCFA185"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BBE0C94D-A68E-4CAF-B6E1-124EAC124BF5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29E72D4B-FAA5-4C3E-942B-DB7C5CC55691"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23e1",
+ "matchCriteriaId": "2B6055DC-C51D-4C52-B34D-0AEC6601CB99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDF945B6-549E-4F6A-9432-8D6B2A7E350C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "2A4E73CD-4883-4C19-9345-22281342B600"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "916E75E5-010A-4A8F-B3AD-21FCC76C890A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "46460C55-22D0-4D9C-B4D7-3F108F636469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1495874C-DEF5-4200-B272-C7779EB3E265"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug4.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45579.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45579.json
index e71d263e541..0e3411533ed 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45579.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45579.json
@@ -2,19 +2,260 @@
"id": "CVE-2023-45579",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T07:15:09.027",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:36:17.083",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "Buffer Overflow vulnerability in DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the ip/type parameter of the jingx.asp function."
+ "value": "Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the ip/type parameter of the jingx.asp function."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el dispositivo D-Link DI-7003GV2.D1 v.23.08.25D1 y anteriores, DI-7100G+V2.D1 v.23.08.23D1 y anteriores, DI-7100GV2.D1 v.23.08.23D1, DI-7200G +V2.D1 v.23.08.23D1 y anteriores, DI-7200GV2.E1 v.23.08.23E1 y anteriores, DI-7300G+V2.D1 v.23.08.23D1 y DI-7400G+V2.D1 v.23.08. 23D1 y anteriores permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro ip/type de la funci\u00f3n jingx.asp."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.25d1",
+ "matchCriteriaId": "DF075223-7784-4FB7-928A-CE097AD98324"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31604D70-5B52-47AC-93A2-71166176253E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BF92551F-76EE-48D4-AB93-40F427847907"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F87354E1-7EFE-4935-ADDD-4614469C9E90"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "713594B3-8B47-4756-9B7A-EC4F4CD2BD58"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE715DF0-1341-4E7B-95BF-B1031BCFA185"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BBE0C94D-A68E-4CAF-B6E1-124EAC124BF5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29E72D4B-FAA5-4C3E-942B-DB7C5CC55691"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23e1",
+ "matchCriteriaId": "2B6055DC-C51D-4C52-B34D-0AEC6601CB99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDF945B6-549E-4F6A-9432-8D6B2A7E350C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "2A4E73CD-4883-4C19-9345-22281342B600"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "916E75E5-010A-4A8F-B3AD-21FCC76C890A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "46460C55-22D0-4D9C-B4D7-3F108F636469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1495874C-DEF5-4200-B272-C7779EB3E265"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug8.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45580.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45580.json
index d16eca59778..0e83ad64c98 100644
--- a/CVE-2023/CVE-2023-455xx/CVE-2023-45580.json
+++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45580.json
@@ -2,19 +2,260 @@
"id": "CVE-2023-45580",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T07:15:09.107",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T22:15:10.187",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Buffer Overflow vulnerability in DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wild/mx parameter of the ddns.asp function."
+ "value": "Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wild/mx and other parameters of the ddns.asp function"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en el dispositivo D-Link DI-7003GV2.D1 v.23.08.25D1 y anteriores, DI-7100G+V2.D1 v.23.08.23D1 y anteriores, DI-7100GV2.D1 v.23.08.23D1, DI-7200G +V2.D1 v.23.08.23D1 y anteriores, DI-7200GV2.E1 v.23.08.23E1 y anteriores, DI-7300G+V2.D1 v.23.08.23D1 y DI-7400G+V2.D1 v.23.08. 23D1 y anteriores permiten a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de wild/mx y otros par\u00e1metros de la funci\u00f3n ddns.asp."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.25d1",
+ "matchCriteriaId": "DF075223-7784-4FB7-928A-CE097AD98324"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31604D70-5B52-47AC-93A2-71166176253E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BF92551F-76EE-48D4-AB93-40F427847907"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F87354E1-7EFE-4935-ADDD-4614469C9E90"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "713594B3-8B47-4756-9B7A-EC4F4CD2BD58"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE715DF0-1341-4E7B-95BF-B1031BCFA185"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "BBE0C94D-A68E-4CAF-B6E1-124EAC124BF5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "29E72D4B-FAA5-4C3E-942B-DB7C5CC55691"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23e1",
+ "matchCriteriaId": "2B6055DC-C51D-4C52-B34D-0AEC6601CB99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CDF945B6-549E-4F6A-9432-8D6B2A7E350C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "2A4E73CD-4883-4C19-9345-22281342B600"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "916E75E5-010A-4A8F-B3AD-21FCC76C890A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.08.23d1",
+ "matchCriteriaId": "46460C55-22D0-4D9C-B4D7-3F108F636469"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1495874C-DEF5-4200-B272-C7779EB3E265"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug6.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45602.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45602.json
new file mode 100644
index 00000000000..68038b87d3b
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45602.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45602",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T14:15:09.333",
+ "lastModified": "2023-10-25T01:26:39.923",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Shopfiles Ltd Ebook Store plugin <=\u00a05.785 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Shopfiles Ltd Ebook Store en versiones<= 5.785."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:shopfiles:ebook_store:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "5.785",
+ "matchCriteriaId": "5D36D2CA-E8CF-4356-A90D-DBA955981D52"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/ebook-store/wordpress-ebook-store-plugin-5-784-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45604.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45604.json
new file mode 100644
index 00000000000..1a0358bee1a
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45604.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45604",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T14:15:09.407",
+ "lastModified": "2023-10-25T01:26:32.360",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Scott Reilly Get Custom Field Values plugin <=\u00a04.0.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Scott Reilly Get Custom Field Values en versiones <= 4.0.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:get_custom_field_values_project:get_custom_field_values:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.1",
+ "matchCriteriaId": "DB1D0124-B18A-40E0-8FFB-4B0DC7AEA912"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/get-custom-field-values/wordpress-get-custom-field-values-plugin-4-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45605.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45605.json
index 65c9a466596..b9f01fb5e19 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45605.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45605.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45605",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:10.797",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T22:49:46.790",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Christopher Finke Feed Statistics plugin <=\u00a04.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Christopher Finke Feed Statistics en versiones <= 4.1."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:feed_statistics_project:feed_statistics:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "4.1",
+ "matchCriteriaId": "FADC2680-910F-4CA4-A8A1-3355743CBBC9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wordpress-feed-statistics/wordpress-feed-statistics-plugin-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45606.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45606.json
index 5198094ec7e..fbe02f063de 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45606.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45606.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45606",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:10.877",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T22:46:59.367",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Lasso Simple URLs plugin <=\u00a0120 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Lasso Simple URLs en versiones <= 120."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:getlasso:simple_urls:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "120",
+ "matchCriteriaId": "EF922366-2007-4612-95CE-72FF05545D3D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/simple-urls/wordpress-simple-urls-plugin-120-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45607.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45607.json
new file mode 100644
index 00000000000..a68e79f4447
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45607.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45607",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T14:15:09.483",
+ "lastModified": "2023-10-25T01:26:18.333",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Hector Cabrera WordPress Popular Posts plugin <=\u00a06.3.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento Hector Cabrera WordPress Popular Posts en versiones <= 6.3.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wordpress_popular_posts_project:wordpress_popular_posts:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "6.3.3",
+ "matchCriteriaId": "E4E4600F-894A-4D28-B9E3-C6D4F86D973F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-6-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45608.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45608.json
new file mode 100644
index 00000000000..2a365b0b100
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45608.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45608",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T13:15:09.480",
+ "lastModified": "2023-10-25T01:23:43.360",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Nicola Modugno Smart Cookie Kit plugin <=\u00a02.3.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento Nicola Modugno Smart Cookie Kit en versiones <= 2.3.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nicolamodugno:smart_cookie_kit:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.3.2",
+ "matchCriteriaId": "6C97B4F7-1A92-497A-9BB8-FD59833F8502"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/smart-cookie-kit/wordpress-smart-cookie-kit-plugin-2-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45628.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45628.json
new file mode 100644
index 00000000000..6219166c8d0
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45628.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-45628",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T14:15:09.557",
+ "lastModified": "2023-10-25T01:26:12.197",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in QROkes QR Twitter Widget plugin <=\u00a00.2.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento QROkes QR Twitter Widget en versiones <= 0.2.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:qrokes:qr_twitter_widget:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "0.2.3",
+ "matchCriteriaId": "DD1BD578-69C3-4586-8088-3B3CFE4966D7"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/qr-twitter-widget/wordpress-qr-twitter-widget-plugin-0-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45629.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45629.json
index bcef307c2d8..49447f8bfde 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45629.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45629.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45629",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:10.957",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T22:46:36.583",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Gallery \u2013 Image and Video Gallery with Thumbnails plugin <=\u00a02.0.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento wpdevart Gallery \u2013 Image and Video Gallery with Thumbnails en versiones <= 2.0.3."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -36,7 +60,7 @@
},
"weaknesses": [
{
- "source": "audit@patchstack.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -44,12 +68,43 @@
"value": "CWE-352"
}
]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:total-soft:portfolio_gallery_responsive_image_gallery:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.0.3",
+ "matchCriteriaId": "CE0CDD5C-3BF7-4C40-AC3E-606A2C142B86"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gallery-album/wordpress-gallery-image-and-video-gallery-with-thumbnails-plugin-2-0-3-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45630.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45630.json
new file mode 100644
index 00000000000..c16defd07dc
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45630.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45630",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T14:15:09.637",
+ "lastModified": "2023-10-25T01:25:54.793",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Stored Cross-Site Scripting (XSS) vulnerability in wpdevart Gallery \u2013 Image and Video Gallery with Thumbnails plugin <=\u00a02.0.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenada No Autenticada en el complemento wpdevart Gallery \u2013 Image and Video Gallery with Thumbnails en versiones <= 2.0.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpdevart:gallery:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.0.3",
+ "matchCriteriaId": "7F75183E-499F-4680-94D7-659F0596D168"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/gallery-album/wordpress-gallery-image-and-video-gallery-with-thumbnails-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45632.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45632.json
new file mode 100644
index 00000000000..6b6ed20bbf5
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45632.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45632",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-18T14:15:09.710",
+ "lastModified": "2023-10-25T01:25:40.933",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WebDorado SpiderVPlayer plugin <=\u00a01.5.22 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento WebDorado SpiderVPlayer en versiones <= 1.5.22."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:web-dorado:spidervplayer:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.5.22",
+ "matchCriteriaId": "C8CADC1A-35EF-420C-8022-80BFC1ABC352"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/player/wordpress-spidervplayer-plugin-1-5-22-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45634.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45634.json
new file mode 100644
index 00000000000..b5aea1ca028
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45634.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45634",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:33.353",
+ "lastModified": "2023-10-27T21:58:08.617",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Biztechc Copy or Move Comments plugin <=\u00a05.0.4 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Biztechc Copy or Move Comments en versiones <= 5.0.4."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:appjetty:copy_or_move_comments:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "5.0.4",
+ "matchCriteriaId": "53AB2802-992C-4878-AF5B-C9844AE78B63"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/copy-or-move-comments/wordpress-copy-or-move-comments-plugin-5-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45637.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45637.json
new file mode 100644
index 00000000000..35f1c70585f
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45637.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45637",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:33.433",
+ "lastModified": "2023-10-27T21:56:43.497",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in EventPrime EventPrime \u2013 Events Calendar, Bookings and Tickets plugin <=\u00a03.1.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento EventPrime EventPrime \u2013 Events Calendar, Bookings and Tickets en versiones <= 3.1.5."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:metagauss:eventprime:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.1.5",
+ "matchCriteriaId": "A3CE2271-71A5-4B00-93FB-FC7BFDD0F45E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-3-1-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45638.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45638.json
index 25c9171c00e..9aaa56d03be 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45638.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45638.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45638",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:11.040",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T22:46:07.233",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in euPago Eupago Gateway For Woocommerce plugin <=\u00a03.1.9 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento euPago Eupago Gateway para Woocommerce en versiones <= 3.1.9."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eupago:eupago_gateway_woocommerce:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.1.9",
+ "matchCriteriaId": "71424D78-AB76-41C1-84BE-2D441F4AF282"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/eupago-gateway-for-woocommerce/wordpress-eupago-gateway-for-woocommerce-plugin-3-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45639.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45639.json
index 9cec7f4dfd1..3a3a4900810 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45639.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45639.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45639",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T10:15:11.093",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:44:02.860",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Codex-m Sort SearchResult By Title plugin <=\u00a010.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Codex-m Sort SearchResult By Title en versiones <= 10.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:phpdeveloper:sort_searchresult_by_title:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "10.0",
+ "matchCriteriaId": "1C1C03C7-ED72-4892-B363-EF8E1339FB14"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sort-searchresult-by-title/wordpress-sort-searchresult-by-title-plugin-10-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45640.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45640.json
new file mode 100644
index 00000000000..14a70cd842e
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45640.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45640",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:33.567",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in TechnoWich WP ULike \u2013 Most Advanced WordPress Marketing Toolkit plugin <=\u00a04.6.8 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en TechnoWich WP ULike \u2013 Most Advanced WordPress Marketing Toolkit en versiones <= 4.6.8."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wp-ulike/wordpress-wp-ulike-plugin-4-6-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45641.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45641.json
index 5fe29b3e740..6195639b0e7 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45641.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45641.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45641",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T10:15:11.173",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T18:19:25.680",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Caret Inc. Caret Country Access Limit plugin <=\u00a01.0.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Caret Inc. Caret Country Access Limit en versiones <= 1.0.2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ca-ret:country_access_limit:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.0.2",
+ "matchCriteriaId": "7CA594C0-EE5E-41C6-86CC-90410E75CA32"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/caret-country-access-limit/wordpress-caret-country-access-limit-plugin-1-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45642.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45642.json
index 14e12b963f1..10e87cc6d57 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45642.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45642.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45642",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T10:15:11.247",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T18:56:54.393",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Hassan Ali Snap Pixel plugin <=\u00a01.5.7 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Hassan Ali Snap Pixel en versiones <= 1.5.7."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:coresol:snap_pixel:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.5.7",
+ "matchCriteriaId": "A0771212-929B-429D-B0CF-F6389187405D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/snap-pixel/wordpress-snap-pixel-plugin-1-5-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45643.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45643.json
index 91ee1da6a3a..7db9e319295 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45643.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45643.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45643",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T10:15:11.320",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:29:06.500",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Anurag Deshmukh CPT Shortcode Generator plugin <=\u00a01.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Anurag Deshmukh CPT Shortcode Generator en versiones <= 1.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:anuragdeshmukh:cpt_shortcode_generator:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.0",
+ "matchCriteriaId": "08ACDA5F-946F-4EBC-B57D-AAAC691BF210"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cpt-shortcode/wordpress-cpt-shortcode-generator-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45644.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45644.json
new file mode 100644
index 00000000000..2a71c3fc9c2
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45644.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45644",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:33.647",
+ "lastModified": "2023-10-27T21:56:50.480",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anurag Deshmukh CPT Shortcode Generator plugin <=\u00a01.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Anurag Deshmukh CPT Shortcode Generator en versiones <= 1.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:anuragdeshmukh:cpt_shortcode_generator:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.0",
+ "matchCriteriaId": "08ACDA5F-946F-4EBC-B57D-AAAC691BF210"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/cpt-shortcode/wordpress-cpt-shortcode-generator-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45645.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45645.json
index 4c5f3217043..32cf51532a3 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45645.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45645.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45645",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T10:15:11.393",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T21:03:17.713",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in InfoD74 WP Open Street Map plugin <=\u00a01.25 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento InfoD74 WP Open Street Map en versiones <= 1.25."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:info-d-74:open_street_map:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.25",
+ "matchCriteriaId": "662E9D82-2C68-4137-A3AF-5E9BC3D4A20F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-open-street-map/wordpress-wp-open-street-map-plugin-1-25-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45646.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45646.json
new file mode 100644
index 00000000000..5fcd8575223
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45646.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45646",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:33.740",
+ "lastModified": "2023-10-27T21:56:56.340",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Henryholtgeerts PDF Block plugin <=\u00a01.1.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento Henryholtgeerts PDF Block en versiones <= 1.1.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:henryholtgeerts:pdf_block:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.0",
+ "matchCriteriaId": "B9C358A5-51B7-4F12-B1E4-5D1BC5FBD49F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/pdf-block/wordpress-pdf-block-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45647.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45647.json
index 852a46ae94f..1f7623882ea 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45647.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45647.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45647",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T10:15:11.467",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:52:36.490",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in MailMunch Constant Contact Forms by MailMunch plugin <=\u00a02.0.10 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento MailMunch Constant Contact Forms by MailMunch en versiones <= 2.0.10."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mailmunch:constant_contact_forms:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.0.10",
+ "matchCriteriaId": "0C602889-C545-4995-927C-AE9274F46A2B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/constant-contact-forms-by-mailmunch/wordpress-constant-contact-forms-by-mailmunch-plugin-2-0-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45650.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45650.json
index d54da37efd6..9a54d05ce0d 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45650.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45650.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45650",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:11.113",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:53:00.570",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com HTML5 Maps plugin <=\u00a01.7.1.4 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Fla-shop.Com HTML5 Maps en versiones <= 1.7.1.4."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:fla-shop:html5_maps:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.7.1.4",
+ "matchCriteriaId": "7DE5FC70-CFFF-4E5E-AB5C-142DDB5A847B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/html5-maps/wordpress-html5-maps-plugin-1-7-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45651.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45651.json
index ba3416233e5..4d54007c151 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45651.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45651.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45651",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:11.190",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:30:00.853",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi WP Attachments plugin <=\u00a05.0.6 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Marco Milesi WP Attachments en versiones <= 5.0.6."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:marcomilesi:wp_attachments:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "5.0.6",
+ "matchCriteriaId": "815FBF5F-8349-4796-BDBC-1A8C2A0F09E5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-attachments/wordpress-wp-attachments-plugin-5-0-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45653.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45653.json
index 8c468660e70..350c81544ee 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45653.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45653.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45653",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:11.267",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:37:04.863",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Galaxy Weblinks Video Playlist For YouTube plugin <=\u00a06.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Galaxy Weblinks Video Playlist For YouTube en versiones <= 6.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:galaxyweblinks:video_playlist_for_youtube:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "6.0",
+ "matchCriteriaId": "C1A05008-36B5-4EBB-9E6F-919E76A93D94"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/video-playlist-for-youtube/wordpress-video-playlist-for-youtube-plugin-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45654.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45654.json
index 902f26cc648..d653a0b7a99 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45654.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45654.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45654",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:11.340",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:30:30.677",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Pixelgrade Comments Ratings plugin <=\u00a01.1.7 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Pixelgrade Comments Ratings en versiones <= 1.1.7."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pixelgrade:comments_rating:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.7",
+ "matchCriteriaId": "275A0A08-5E2B-4198-9519-55DE38DAFB52"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/comments-ratings/wordpress-comments-ratings-plugin-1-1-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45655.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45655.json
index 4e27d3dddd0..b61795d02bd 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45655.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45655.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45655",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:11.417",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T17:56:36.927",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in PixelGrade PixFields plugin <=\u00a00.7.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento PixelGrade PixFields en versiones <= 0.7.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,14 +70,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pixelgrade:pixfields:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "0.7.0",
+ "matchCriteriaId": "CD701CDA-9EAD-4BEF-8DCF-ABAFC61E3F36"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/pixelgrade/pixfields/releases/tag/0.7.1",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://patchstack.com/database/vulnerability/pixfields/wordpress-pixfields-plugin-0-7-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45656.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45656.json
index cd1a89ed43f..baefa014481 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45656.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45656.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45656",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T09:15:11.487",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T18:07:45.763",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Kevin Weber Lazy Load for Videos plugin <=\u00a02.18.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Kevin Weber Lazy Load for Videos en versiones <= 2.18.2."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:kevinweber:lazy_load_for_videos:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.18.2",
+ "matchCriteriaId": "86CBBECB-AB83-471E-B0DF-C4B72BF4015C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/lazy-load-for-videos/wordpress-lazy-load-for-videos-plugin-2-18-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45660.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45660.json
index b539e922d4f..6b601573e1b 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45660.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45660.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45660",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T19:15:11.060",
- "lastModified": "2023-10-16T19:24:26.033",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:18:07.003",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Nextcloud mail is an email app for the Nextcloud home server platform. In affected versions a missing check of origin, target and cookies allows for an attacker to abuse the proxy endpoint to denial of service a third server. It is recommended that the Nextcloud Mail is upgraded to 2.2.8 or 3.3.0. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Nextcloud mail es una aplicaci\u00f3n de correo electr\u00f3nico para la plataforma de servidor dom\u00e9stico Nextcloud. En las versiones afectadas, la falta de verificaci\u00f3n de origen, destino y cookies permite a un atacante abusar del endpoint del proxy para negar el servicio a un tercer servidor. Se recomienda actualizar Nextcloud Mail a 2.2.8 o 3.3.0. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,54 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.2.0",
+ "versionEndExcluding": "2.2.8",
+ "matchCriteriaId": "C39C0C2A-42B6-406A-83E6-F27F6D7A51EA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "3.0.0",
+ "versionEndExcluding": "3.3.0",
+ "matchCriteriaId": "98F3704F-323A-4BC4-BC5F-259C8648CB97"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/nextcloud/mail/pull/8459",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
},
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8j9x-fmww-qr37",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://hackerone.com/reports/1895874",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45661.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45661.json
new file mode 100644
index 00000000000..9e7f4474a91
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45661.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-45661",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:08.783",
+ "lastModified": "2023-10-27T21:51:11.950",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_image is a single file MIT licensed library for processing images. A crafted image file may trigger out of bounds memcpy read in `stbi__gif_load_next`. This happens because two_back points to a memory address lower than the start of the buffer out. This issue may be used to leak internal memory allocation information."
+ },
+ {
+ "lang": "es",
+ "value": "stb_image es una librer\u00eda con licencia MIT de un solo archivo para procesar im\u00e1genes. Un archivo de imagen manipulado puede provocar una lectura de memcpy fuera de l\u00edmites en `stbi__gif_load_next`. Esto sucede porque two_back apunta a una direcci\u00f3n de memoria inferior al inicio del b\u00fafer de salida. Este problema puede utilizarse para filtrar informaci\u00f3n de asignaci\u00f3n de memoria interna."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.2
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_image.h:2.28:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76840B8F-81FC-4BC6-A92C-EBB978741DAB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L6817",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L7021-L7022",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45662.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45662.json
new file mode 100644
index 00000000000..83b42c1f571
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45662.json
@@ -0,0 +1,116 @@
+{
+ "id": "CVE-2023-45662",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:08.867",
+ "lastModified": "2023-10-27T21:49:52.633",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_image is a single file MIT licensed library for processing images. When `stbi_set_flip_vertically_on_load` is set to `TRUE` and `req_comp` is set to a number that doesn\u2019t match the real number of components per pixel, the library attempts to flip the image vertically. A crafted image file can trigger `memcpy` out-of-bounds read because `bytes_per_pixel` used to calculate `bytes_per_row` doesn\u2019t match the real image array dimensions. "
+ },
+ {
+ "lang": "es",
+ "value": "stb_image es una librer\u00eda con licencia MIT de un solo archivo para procesar im\u00e1genes. Cuando `stbi_set_flip_vertically_on_load` se establece en `TRUE` y `req_comp` se establece en un n\u00famero que no coincide con el n\u00famero real de componentes por p\u00edxel, la librer\u00eda intenta voltear la imagen verticalmente. Un archivo de imagen manipulado puede provocar una lectura fuera de l\u00edmites de `memcpy` porque los `bytes_per_pixel` utilizados para calcular `bytes_per_row` no coinciden con las dimensiones reales de la matriz de im\u00e1genes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_image.h:2.28:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76840B8F-81FC-4BC6-A92C-EBB978741DAB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L1235",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45663.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45663.json
new file mode 100644
index 00000000000..f9f51426548
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45663.json
@@ -0,0 +1,130 @@
+{
+ "id": "CVE-2023-45663",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:08.930",
+ "lastModified": "2023-10-27T21:49:11.837",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_image is a single file MIT licensed library for processing images. The stbi__getn function reads a specified number of bytes from context (typically a file) into the specified buffer. In case the file stream points to the end, it returns zero. There are two places where its return value is not checked: In the `stbi__hdr_load` function and in the `stbi__tga_load` function. The latter of the two is likely more exploitable as an attacker may also control the size of an uninitialized buffer."
+ },
+ {
+ "lang": "es",
+ "value": "stb_image es una librer\u00eda con licencia MIT de un solo archivo para procesar im\u00e1genes. La funci\u00f3n stbi__getn lee una cantidad espec\u00edfica de bytes del contexto (normalmente un archivo) en el b\u00fafer especificado. En caso de que la secuencia del archivo apunte al final, devuelve cero. Hay dos lugares donde no se verifica su valor de retorno: en la funci\u00f3n `stbi__hdr_load` y en la funci\u00f3n `stbi__tga_load`. Es probable que el \u00faltimo de los dos sea m\u00e1s explotable, ya que un atacante tambi\u00e9n puede controlar el tama\u00f1o de un b\u00fafer no inicializado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-908"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-908"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_image.h:2.28:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76840B8F-81FC-4BC6-A92C-EBB978741DAB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L1664",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L5936C10-L5936C20",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L7221",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45664.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45664.json
new file mode 100644
index 00000000000..64e82a369b6
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45664.json
@@ -0,0 +1,116 @@
+{
+ "id": "CVE-2023-45664",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.003",
+ "lastModified": "2023-10-27T21:47:45.230",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_image is a single file MIT licensed library for processing images. A crafted image file can trigger `stbi__load_gif_main_outofmem` attempt to double-free the out variable. This happens in `stbi__load_gif_main` because when the `layers * stride` value is zero the behavior is implementation defined, but common that realloc frees the old memory and returns null pointer. Since it attempts to double-free the memory a few lines below the first \u201cfree\u201d, the issue can be potentially exploited only in a multi-threaded environment. In the worst case this may lead to code execution."
+ },
+ {
+ "lang": "es",
+ "value": "stb_image es una librer\u00eda con licencia MIT de un solo archivo para procesar im\u00e1genes. Un archivo de imagen manipulado puede provocar que `stbi__load_gif_main_outofmem` intente liberar dos veces la variable out. Esto sucede en `stbi__load_gif_main` porque cuando el valor de `layers * stride` es cero, el comportamiento est\u00e1 definido por la implementaci\u00f3n, pero es com\u00fan que la realloc libere la memoria antigua y devuelva un puntero nulo. Dado que intenta liberar dos veces la memoria unas pocas l\u00edneas debajo de la primera \"free\", el problema s\u00f3lo puede explotarse en un entorno de subprocesos m\u00faltiples. En el peor de los casos, esto puede provocar la ejecuci\u00f3n del c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_image.h:2.28:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76840B8F-81FC-4BC6-A92C-EBB978741DAB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L6993-L6995",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45665.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45665.json
new file mode 100644
index 00000000000..1e27c70f123
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45665.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2023-45665",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T17:15:10.293",
+ "lastModified": "2023-10-19T17:15:10.293",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** This CVE is a duplicate of another CVE."
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45666.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45666.json
new file mode 100644
index 00000000000..f29caeae4a5
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45666.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-45666",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.077",
+ "lastModified": "2023-10-27T21:46:47.577",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_image is a single file MIT licensed library for processing images. It may look like `stbi__load_gif_main` doesn\u2019t give guarantees about the content of output value `*delays` upon failure. Although it sets `*delays` to zero at the beginning, it doesn\u2019t do it in case the image is not recognized as GIF and a call to `stbi__load_gif_main_outofmem` only frees possibly allocated memory in `*delays` without resetting it to zero. Thus it would be fair to say the caller of `stbi__load_gif_main` is responsible to free the allocated memory in `*delays` only if `stbi__load_gif_main` returns a non null value. However at the same time the function may return null value, but fail to free the memory in `*delays` if internally `stbi__convert_format` is called and fails. Thus the issue may lead to a memory leak if the caller chooses to free `delays` only when `stbi__load_gif_main` didn\u2019t fail or to a double-free if the `delays` is always freed"
+ },
+ {
+ "lang": "es",
+ "value": "stb_image es una librer\u00eda con licencia MIT de un solo archivo para procesar im\u00e1genes. Puede parecer que `stbi__load_gif_main` no ofrece garant\u00edas sobre el contenido del valor de salida `*delays` en caso de falla. Aunque establece `*delays` en cero al principio, no lo hace en caso de que la imagen no se reconozca como GIF y una llamada a `stbi__load_gif_main_outofmem` solo libera la memoria posiblemente asignada en `*delays` sin restablecerla a cero. Por lo tanto, ser\u00eda justo decir que la persona que llama a `stbi__load_gif_main` es responsable de liberar la memoria asignada en `*delays` solo si `stbi__load_gif_main` devuelve un valor no nulo. Sin embargo, al mismo tiempo, la funci\u00f3n puede devolver un valor nulo, pero no puede liberar la memoria en `*delays` si internamente se llama a `stbi__convert_format` y falla. Por lo tanto, el problema puede provocar una p\u00e9rdida de memoria si la persona que llama elige liberar los \"delays\" solo cuando \"stbi__load_gif_main\" no fall\u00f3 o una doble liberaci\u00f3n si los \"delays\" siempre se liberan."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_image.h:2.28:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76840B8F-81FC-4BC6-A92C-EBB978741DAB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L6957",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L6962-L7045",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45667.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45667.json
new file mode 100644
index 00000000000..04dcfb40c2a
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45667.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-45667",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.143",
+ "lastModified": "2023-10-27T21:45:16.910",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_image is a single file MIT licensed library for processing images.\n\nIf `stbi__load_gif_main` in `stbi_load_gif_from_memory` fails it returns a null pointer and may keep the `z` variable uninitialized. In case the caller also sets the flip vertically flag, it continues and calls `stbi__vertical_flip_slices` with the null pointer result value and the uninitialized `z` value. This may result in a program crash."
+ },
+ {
+ "lang": "es",
+ "value": "stb_image es una librer\u00eda con licencia MIT de un solo archivo para procesar im\u00e1genes. Si falla `stbi__load_gif_main` en `stbi_load_gif_from_memory`, devuelve un puntero nulo y puede mantener la variable `z` sin inicializar. En caso de que la persona que llama tambi\u00e9n establezca el indicador de giro vertical, contin\u00faa y llama a `stbi__vertical_flip_slices` con el valor de resultado del puntero nulo y el valor `z` no inicializado. Esto puede provocar un fallo del programa."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_image.h:2.28:*:*:*:*:*:*:*",
+ "matchCriteriaId": "76840B8F-81FC-4BC6-A92C-EBB978741DAB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L1442-L1454",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_image.h#L1448",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45669.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45669.json
index 011ebcdd059..830d7267b4b 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45669.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45669.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45669",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T19:15:11.167",
- "lastModified": "2023-10-16T19:24:26.033",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:17:31.490",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "WebAuthn4J Spring Security provides Web Authentication specification support for Spring applications. Affected versions are subject to improper signature counter value handling. A flaw was found in webauthn4j-spring-security-core. When an authneticator returns an incremented signature counter value during authentication, webauthn4j-spring-security-core does not properly persist the value, which means cloned authenticator detection does not work. An attacker who cloned valid authenticator in some way can use the cloned authenticator without being detected. This issue has been addressed in version `0.9.1.RELEASE`. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n"
+ },
+ {
+ "lang": "es",
+ "value": "WebAuthn4J Spring Security proporciona soporte de especificaci\u00f3n de autenticaci\u00f3n web para aplicaciones Spring. Las versiones afectadas est\u00e1n sujetas a un manejo inadecuado del valor del contador de firmas. Se encontr\u00f3 una falla en webautn4j-spring-security-core. Cuando un autenticador devuelve un valor de contador de firma incrementado durante la autenticaci\u00f3n, webauthn4j-spring-security-core no conserva correctamente el valor, lo que significa que la detecci\u00f3n del autenticador clonado no funciona. Un atacante que clon\u00f3 un autenticador v\u00e1lido de alguna manera puede utilizar el autenticador clonado sin ser detectado. Este problema se solucion\u00f3 en la versi\u00f3n `0.9.1.RELEASE`. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,18 +70,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:webauthn4j:spring_security:*:*:*:*:*:spring:*:*",
+ "versionEndExcluding": "0.9.1",
+ "matchCriteriaId": "C036992E-5946-498B-A788-E72C49955376"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/webauthn4j/webauthn4j-spring-security/commit/129700d74d83f9b9a82bf88ebc63707e3cb0a725",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/webauthn4j/webauthn4j-spring-security/security/advisories/GHSA-v9hx-v6vf-g36j",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.w3.org/TR/2021/REC-webauthn-2-20210408/#sctn-sign-counter",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Technical Description"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45674.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45674.json
index 907d0dc0011..c1b88410d59 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45674.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45674.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45674",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-14T00:15:10.143",
- "lastModified": "2023-10-14T17:32:33.483",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:55:55.410",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Farmbot-Web-App is a web control interface for the Farmbot farm automation platform. An SQL injection vulnerability was found in FarmBot's web app that allows authenticated attackers to extract arbitrary data from its database (including the user table). This issue may lead to Information Disclosure. This issue has been patched in version 15.8.4. Users are advised to upgrade. There are no known workarounds for this issue."
+ },
+ {
+ "lang": "es",
+ "value": "Farmbot-Web-App es una interfaz de control web para la plataforma de automatizaci\u00f3n agr\u00edcola Farmbot. Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en la aplicaci\u00f3n web de FarmBot que permite a atacantes autenticados extraer datos arbitrarios de su base de datos (incluida la tabla de usuarios). Este problema puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n. Este problema se solucion\u00f3 en la versi\u00f3n 15.8.4. Se recomienda a los usuarios que actualicen. No se conocen workarounds para este problema."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:farmbot:farmbot_web_app:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "15.8.4",
+ "matchCriteriaId": "83D5FEE4-B492-45E5-BA78-F1F2EAC1A06E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/FarmBot/Farmbot-Web-App/security/advisories/GHSA-pgq5-ff74-g7xq",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45675.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45675.json
new file mode 100644
index 00000000000..7509ea63a15
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45675.json
@@ -0,0 +1,130 @@
+{
+ "id": "CVE-2023-45675",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.207",
+ "lastModified": "2023-10-27T21:45:04.977",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds write in `f->vendor[len] = (char)'\\0';`. The root cause is that if the len read in `start_decoder` is `-1` and `len + 1` becomes 0 when passed to `setup_malloc`. The `setup_malloc` behaves differently when `f->alloc.alloc_buffer` is pre-allocated. Instead of returning `NULL` as in `malloc` case it shifts the pre-allocated buffer by zero and returns the currently available memory block. This issue may lead to code execution."
+ },
+ {
+ "lang": "es",
+ "value": "stb_vorbis es una librer\u00eda de archivo \u00fanico con licencia MIT para procesar archivos ogg vorbis. Un archivo manipulado puede provocar una escritura fuera de l\u00edmites en `f->vendor[len] = (char)'\\0';`. La causa principal es que si el len le\u00eddo en `start_decoder` es `-1` y `len + 1` se convierte en 0 cuando se pasa a `setup_malloc`. `setup_malloc` se comporta de manera diferente cuando `f->alloc.alloc_buffer` est\u00e1 preasignado. En lugar de devolver \"NULL\" como en el caso de \"malloc\", desplaza el b\u00fafer preasignado a cero y devuelve el bloque de memoria disponible actualmente. Este problema puede provocar la ejecuci\u00f3n del c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_vorbis.c:1.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6709627-5AFB-4F0C-801D-238CA02D1BFE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3652-L3658",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3658",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L950-L960",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45676.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45676.json
new file mode 100644
index 00000000000..6b0333ed6a7
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45676.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-45676",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.277",
+ "lastModified": "2023-10-26T22:44:03.933",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds write in `f->vendor[i] = get8_packet(f);`. The root cause is an integer overflow in `setup_malloc`. A sufficiently large value in the variable `sz` overflows with `sz+7` in and the negative value passes the maximum available memory buffer check. This issue may lead to code execution."
+ },
+ {
+ "lang": "es",
+ "value": "stb_vorbis es una librer\u00eda de archivo \u00fanico con licencia MIT para procesar archivos ogg vorbis. Un archivo manipulado puede provocar una escritura fuera de l\u00edmites en `f->vendor[i] = get8_packet(f);`. La causa principal es un desbordamiento de enteros en `setup_malloc`. Un valor suficientemente grande en la variable `sz` se desborda con `sz+7` y el valor negativo pasa la verificaci\u00f3n del b\u00fafer de memoria m\u00e1xima disponible. Este problema puede provocar la ejecuci\u00f3n del c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_vorbis.c:1.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6709627-5AFB-4F0C-801D-238CA02D1BFE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3656",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L950-L960",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45677.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45677.json
new file mode 100644
index 00000000000..2db107a8763
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45677.json
@@ -0,0 +1,144 @@
+{
+ "id": "CVE-2023-45677",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.347",
+ "lastModified": "2023-10-26T22:44:17.277",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds write in `f->vendor[len] = (char)'\\0';`. The root cause is that if `len` read in `start_decoder` is a negative number and `setup_malloc` successfully allocates memory in that case, but memory write is done with a negative index `len`. Similarly if len is INT_MAX the integer overflow len+1 happens in `f->vendor = (char*)setup_malloc(f, sizeof(char) * (len+1));` and `f->comment_list[i] = (char*)setup_malloc(f, sizeof(char) * (len+1));`. This issue may lead to code execution."
+ },
+ {
+ "lang": "es",
+ "value": "stb_vorbis es una librer\u00eda de archivo \u00fanico con licencia MIT para procesar archivos ogg vorbis. Un archivo manipulado puede provocar una escritura fuera de l\u00edmites en `f->vendor[len] = (char)'\\0';`. La causa principal es que si `len` le\u00eddo en `start_decoder` es un n\u00famero negativo y `setup_malloc` asigna memoria exitosamente en ese caso, pero la escritura en memoria se realiza con un \u00edndice negativo `len`. De manera similar, si len es INT_MAX, el desbordamiento de enteros len+1 ocurre en `f->vendor = (char*)setup_malloc(f, sizeof(char) * (len+1));` y `f->comment_list[i] = (char*)setup_malloc(f, tama\u00f1o de(char) * (len+1));`. Este problema puede provocar la ejecuci\u00f3n del c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_vorbis.c:1.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6709627-5AFB-4F0C-801D-238CA02D1BFE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3652-L3658",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3653",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3658",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3670C7-L3670C75",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L950-L961",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45678.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45678.json
new file mode 100644
index 00000000000..59f9fc5e932
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45678.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-45678",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.413",
+ "lastModified": "2023-10-26T22:44:30.403",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of buffer write in `start_decoder` because at maximum `m->submaps` can be 16 but `submap_floor` and `submap_residue` are declared as arrays of 15 elements. This issue may lead to code execution."
+ },
+ {
+ "lang": "es",
+ "value": "stb_vorbis es una librer\u00eda de archivo \u00fanico con licencia MIT para procesar archivos ogg vorbis. Un archivo manipulado puede desencadenar una escritura fuera del b\u00fafer en `start_decoder` porque, como m\u00e1ximo, `m->submaps` puede ser 16, pero `submap_floor` y `submap_residue` se declaran como matrices de 15 elementos. Este problema puede provocar la ejecuci\u00f3n del c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_vorbis.c:1.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6709627-5AFB-4F0C-801D-238CA02D1BFE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L4074-L4079",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L753-L760",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45679.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45679.json
new file mode 100644
index 00000000000..a5141eb4f7f
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45679.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-45679",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.477",
+ "lastModified": "2023-10-26T22:44:51.613",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory allocation failure in `start_decoder`. In that case the function returns early, but some of the pointers in `f->comment_list` are left initialized and later `setup_free` is called on these pointers in `vorbis_deinit`. This issue may lead to code execution."
+ },
+ {
+ "lang": "es",
+ "value": "stb_vorbis es una librer\u00eda de archivo \u00fanico con licencia MIT para procesar archivos ogg vorbis. Un archivo manipulado puede provocar una falla en la asignaci\u00f3n de memoria en `start_decoder`. En ese caso, la funci\u00f3n regresa antes, pero algunos de los punteros en `f->comment_list` se dejan inicializados y luego se llama a `setup_free` en estos punteros en `vorbis_deinit`. Este problema puede provocar la ejecuci\u00f3n del c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-415"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_vorbis.c:1.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6709627-5AFB-4F0C-801D-238CA02D1BFE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3660-L3677",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L4208-L4215",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45680.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45680.json
new file mode 100644
index 00000000000..8f5d60b979a
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45680.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-45680",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.540",
+ "lastModified": "2023-10-26T22:45:06.703",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory allocation failure in `start_decoder`. In that case the function returns early, the `f->comment_list` is set to `NULL`, but `f->comment_list_length` is not reset. Later in `vorbis_deinit` it tries to dereference the `NULL` pointer. This issue may lead to denial of service."
+ },
+ {
+ "lang": "es",
+ "value": "stb_vorbis es una librer\u00eda de archivo \u00fanico con licencia MIT para procesar archivos ogg vorbis. Un archivo manipulado puede provocar una falla en la asignaci\u00f3n de memoria en `start_decoder`. En ese caso, la funci\u00f3n regresa antes, `f->comment_list` se establece en `NULL`, pero `f->comment_list_length` no se restablece. M\u00e1s adelante en `vorbis_deinit` intenta eliminar la referencia al puntero `NULL`. Este problema puede provocar la denegaci\u00f3n del servicio."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_vorbis.c:1.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6709627-5AFB-4F0C-801D-238CA02D1BFE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3660-L3666",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L4208-L4215",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45681.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45681.json
new file mode 100644
index 00000000000..71386c03fec
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45681.json
@@ -0,0 +1,116 @@
+{
+ "id": "CVE-2023-45681",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.607",
+ "lastModified": "2023-10-26T22:45:25.790",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory write past an allocated heap buffer in `start_decoder`. The root cause is a potential integer overflow in `sizeof(char*) * (f->comment_list_length)` which may make `setup_malloc` allocate less memory than required. Since there is another integer overflow an attacker may overflow it too to force `setup_malloc` to return 0 and make the exploit more reliable. This issue may lead to code execution."
+ },
+ {
+ "lang": "es",
+ "value": "stb_vorbis es una librer\u00eda de archivo \u00fanico con licencia MIT para procesar archivos ogg vorbis. Un archivo manipulado puede activar la escritura en memoria m\u00e1s all\u00e1 de un b\u00fafer de mont\u00f3n asignado en `start_decoder`. La causa principal es un posible desbordamiento de enteros en `sizeof(char*) * (f->comment_list_length)` que puede hacer que `setup_malloc` asigne menos memoria de la requerida. Dado que hay otro desbordamiento de enteros, un atacante tambi\u00e9n puede desbordarlo para forzar a `setup_malloc` a devolver 0 y hacer que el exploit sea m\u00e1s confiable. Este problema puede provocar la ejecuci\u00f3n del c\u00f3digo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_vorbis.c:1.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6709627-5AFB-4F0C-801D-238CA02D1BFE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3660-L3677",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45682.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45682.json
new file mode 100644
index 00000000000..82485260e48
--- /dev/null
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45682.json
@@ -0,0 +1,130 @@
+{
+ "id": "CVE-2023-45682",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-21T00:15:09.670",
+ "lastModified": "2023-10-26T22:45:57.160",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds read in `DECODE` macro when `var` is negative. As it can be seen in the definition of `DECODE_RAW` a negative `var` is a valid value. This issue may be used to leak internal memory allocation information."
+ },
+ {
+ "lang": "es",
+ "value": "stb_vorbis es una librer\u00eda de archivo \u00fanico con licencia MIT para procesar archivos ogg vorbis. Un archivo manipulado puede desencadenar una lectura fuera de l\u00edmites en la macro `DECODE` cuando `var` es negativo. Como se puede ver en la definici\u00f3n de `DECODE_RAW`, una `var` negativa es un valor v\u00e1lido. Este problema puede utilizarse para filtrar informaci\u00f3n de asignaci\u00f3n de memoria interna."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.2
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nothings:stb_vorbis.c:1.22:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C6709627-5AFB-4F0C-801D-238CA02D1BFE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L1717-L1729",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L1754-L1756",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3231",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45683.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45683.json
index ab9ec320bc8..1735f11a35e 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45683.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45683.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45683",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T19:15:11.253",
- "lastModified": "2023-10-16T19:24:26.033",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:16:16.443",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "github.com/crewjam/saml is a saml library for the go language. In affected versions the package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim\u2019s browser loaded the SAML IdP initiated SSO link for the malicious service provider. Note: SP registration is commonly an unrestricted operation in IdPs, hence not requiring particular permissions or publicly accessible to ease the IdP interoperability. This issue is fixed in version 0.4.14. Users unable to upgrade may perform external validation of URLs provided in SAML metadata, or restrict the ability for end-users to upload arbitrary metadata."
+ },
+ {
+ "lang": "es",
+ "value": "github.com/crewjam/saml es una librer\u00eda saml para el lenguaje go. En las versiones afectadas, el paquete no valida el URI de ubicaci\u00f3n ACS seg\u00fan el enlace SAML que se analiza. Si se abusa de ella, esta falla permite a los atacantes registrar proveedores de servicios maliciosos en el IdP e inyectar Javascript en la definici\u00f3n del endpoint ACS, logrando Cross-Site-Scripting (XSS) en el contexto del IdP durante la redirecci\u00f3n al final de un flujo SSO SAML. En consecuencia, un atacante puede realizar cualquier acci\u00f3n autenticada como v\u00edctima una vez que el navegador de la v\u00edctima carg\u00f3 el enlace SSO iniciado por el IdP SAML para el proveedor de servicios malicioso. Nota: El registro de SP suele ser una operaci\u00f3n sin restricciones en los IdP, por lo que no requiere permisos particulares ni es de acceso p\u00fablico para facilitar la interoperabilidad del IdP. Este problema se solucion\u00f3 en la versi\u00f3n 0.4.14. Los usuarios que no puedan actualizar pueden realizar una validaci\u00f3n externa de las URL proporcionadas en los metadatos SAML o restringir la capacidad de los usuarios finales de cargar metadatos arbitrarios."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -46,14 +70,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:saml_project:saml:*:*:*:*:*:go:*:*",
+ "versionEndExcluding": "0.4.14",
+ "matchCriteriaId": "0962FF33-8E54-4E11-8D06-11F261059453"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/crewjam/saml/commit/b07b16cf83c4171d16da4d85608cb827f183cd79",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/crewjam/saml/security/advisories/GHSA-267v-3v32-g6q5",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45685.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45685.json
index 1fab7ac7fbd..7df7bbb7457 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45685.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45685.json
@@ -2,16 +2,53 @@
"id": "CVE-2023-45685",
"sourceIdentifier": "cve@rapid7.con",
"published": "2023-10-16T17:15:09.963",
- "lastModified": "2023-10-16T18:33:43.730",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T15:10:57.873",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Insufficient path validation when extracting a zip archive in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal"
+ },
+ {
+ "lang": "es",
+ "value": "La validaci\u00f3n de ruta insuficiente al extraer un archivo zip en los servidores Titan MFT y Titan SFTP de South River Technologies en Windows y Linux permite a un atacante autenticado escribir un archivo en cualquier ubicaci\u00f3n del sistema de archivos a trav\u00e9s de un path traversal"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
{
"source": "cve@rapid7.con",
"type": "Secondary",
@@ -23,14 +60,67 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "6F4EB0AE-8C4A-4FF6-AE00-D87C9719C6D7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "2740E6FA-C5D8-465F-95A7-54F75421FD95"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "B3EDB373-C26D-478D-9B44-D2D5A19276E5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "E6520883-8DE6-4682-8937-1E49573112EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://helpdesk.southrivertech.com/portal/en/kb/articles/security-patch-for-issues-cve-2023-45685-through-cve-2023-45690",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45686.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45686.json
index b866990ec68..656c6ea9e18 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45686.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45686.json
@@ -2,16 +2,53 @@
"id": "CVE-2023-45686",
"sourceIdentifier": "cve@rapid7.con",
"published": "2023-10-16T17:15:10.040",
- "lastModified": "2023-10-16T18:33:43.730",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T15:47:56.750",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Insufficient path validation when writing a file via WebDAV in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal"
+ },
+ {
+ "lang": "es",
+ "value": "La validaci\u00f3n de ruta insuficiente al escribir un archivo a trav\u00e9s de WebDAV en los servidores Titan MFT y Titan SFTP de South River Technologies en Linux permite a un atacante autenticado escribir un archivo en cualquier ubicaci\u00f3n del sistema de archivos a trav\u00e9s de un path traversal "
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
{
"source": "cve@rapid7.con",
"type": "Secondary",
@@ -23,14 +60,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_mfp_server:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "CF66EAF2-A7DA-4A9F-A905-78ED33AD8442"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://helpdesk.southrivertech.com/portal/en/kb/articles/security-patch-for-issues-cve-2023-45685-through-cve-2023-45690",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45687.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45687.json
index 5f5d97f7097..5b9fa46a972 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45687.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45687.json
@@ -2,16 +2,53 @@
"id": "CVE-2023-45687",
"sourceIdentifier": "cve@rapid7.con",
"published": "2023-10-16T17:15:10.107",
- "lastModified": "2023-10-16T18:33:43.730",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T15:58:30.740",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A session fixation vulnerability in South River Technologies' Titan MFT and Titan SFTP servers on Linux and Windows allows an attacker to bypass the server's authentication if they can trick an administrator into authorizating a session id of their choosing"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de fijaci\u00f3n de sesi\u00f3n en los servidores Titan MFT y Titan SFTP de South River Technologies en Linux y Windows permite a un atacante eludir la autenticaci\u00f3n del servidor si puede enga\u00f1ar a un administrador para que autorice una identificaci\u00f3n de sesi\u00f3n de su elecci\u00f3n."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-384"
+ }
+ ]
+ },
{
"source": "cve@rapid7.con",
"type": "Secondary",
@@ -23,14 +60,67 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "6F4EB0AE-8C4A-4FF6-AE00-D87C9719C6D7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "2740E6FA-C5D8-465F-95A7-54F75421FD95"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "B3EDB373-C26D-478D-9B44-D2D5A19276E5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "E6520883-8DE6-4682-8937-1E49573112EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://helpdesk.southrivertech.com/portal/en/kb/articles/security-patch-for-issues-cve-2023-45685-through-cve-2023-45690",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45688.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45688.json
index 0ba086ee403..7a8ea835767 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45688.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45688.json
@@ -2,16 +2,53 @@
"id": "CVE-2023-45688",
"sourceIdentifier": "cve@rapid7.con",
"published": "2023-10-16T17:15:10.183",
- "lastModified": "2023-10-16T18:33:43.730",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T16:02:30.307",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to get the size of an arbitrary file on the filesystem using path traversal in the ftp \"SIZE\" command"
+ },
+ {
+ "lang": "es",
+ "value": "La falta de suficiente validaci\u00f3n de ruta en los servidores Titan MFT y Titan SFTP de South River Technologies en Linux permite a un atacante autenticado obtener el tama\u00f1o de un archivo arbitrario en el sistema de archivos utilizando path traversal en el comando ftp \"SIZE\""
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
{
"source": "cve@rapid7.con",
"type": "Secondary",
@@ -23,14 +60,55 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "6F4EB0AE-8C4A-4FF6-AE00-D87C9719C6D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "B3EDB373-C26D-478D-9B44-D2D5A19276E5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://helpdesk.southrivertech.com/portal/en/kb/articles/security-patch-for-issues-cve-2023-45685-through-cve-2023-45690",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45689.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45689.json
index 77a4af5fa9b..aaa87c2d1dc 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45689.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45689.json
@@ -2,16 +2,53 @@
"id": "CVE-2023-45689",
"sourceIdentifier": "cve@rapid7.con",
"published": "2023-10-16T17:15:10.243",
- "lastModified": "2023-10-16T18:33:43.730",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T16:30:59.473",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker with administrative privileges to read any file on the filesystem via path traversal"
+ },
+ {
+ "lang": "es",
+ "value": "La falta de suficiente validaci\u00f3n de ruta en los servidores Titan MFT y Titan SFTP de South River Technologies en Windows y Linux permite a un atacante autenticado con privilegios administrativos leer cualquier archivo en el sistema de archivos a trav\u00e9s de path traversal"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.2
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
{
"source": "cve@rapid7.con",
"type": "Secondary",
@@ -23,14 +60,67 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "6F4EB0AE-8C4A-4FF6-AE00-D87C9719C6D7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "2740E6FA-C5D8-465F-95A7-54F75421FD95"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "B3EDB373-C26D-478D-9B44-D2D5A19276E5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "E6520883-8DE6-4682-8937-1E49573112EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://helpdesk.southrivertech.com/portal/en/kb/articles/security-patch-for-issues-cve-2023-45685-through-cve-2023-45690",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45690.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45690.json
index 5c1489da837..b6697a960c2 100644
--- a/CVE-2023/CVE-2023-456xx/CVE-2023-45690.json
+++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45690.json
@@ -2,16 +2,53 @@
"id": "CVE-2023-45690",
"sourceIdentifier": "cve@rapid7.con",
"published": "2023-10-16T17:15:10.310",
- "lastModified": "2023-10-16T18:33:43.730",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T16:45:38.280",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Default file permissions on South River Technologies' Titan MFT and Titan SFTP servers on Linux allows a user that's authentication to the OS to read sensitive files on the filesystem"
+ },
+ {
+ "lang": "es",
+ "value": "Los permisos de archivos predeterminados en los servidores Titan MFT y Titan SFTP de South River Technologies en Linux permiten que un usuario que se autentica en el sistema operativo lea archivos confidenciales en el sistema de archivos."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-276"
+ }
+ ]
+ },
{
"source": "cve@rapid7.con",
"type": "Secondary",
@@ -23,14 +60,55 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_ftp_server:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.0.16.2277",
+ "matchCriteriaId": "6789AE7E-5499-4F33-954F-B051EF52C213"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:linux:*:*",
+ "versionEndExcluding": "2.0.18",
+ "matchCriteriaId": "6F4EB0AE-8C4A-4FF6-AE00-D87C9719C6D7"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://helpdesk.southrivertech.com/portal/en/kb/articles/security-patch-for-issues-cve-2023-45685-through-cve-2023-45690",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Vendor Advisory"
+ ]
},
{
"url": "https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/",
- "source": "cve@rapid7.con"
+ "source": "cve@rapid7.con",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45727.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45727.json
new file mode 100644
index 00000000000..dfee2eb1784
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45727.json
@@ -0,0 +1,105 @@
+{
+ "id": "CVE-2023-45727",
+ "sourceIdentifier": "vultures@jpcert.or.jp",
+ "published": "2023-10-18T10:15:08.643",
+ "lastModified": "2023-10-25T17:31:59.553",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Proself Enterprise/Standard Edition Ver5.62 and earlier, Proself Gateway Edition Ver1.65 and earlier, and Proself Mail Sanitize Edition Ver1.08 and earlier allow a remote unauthenticated attacker to conduct XML External Entity (XXE) attacks. By processing a specially crafted request containing malformed XML data, arbitrary files on the server containing account information may be read by the attacker."
+ },
+ {
+ "lang": "es",
+ "value": "Proself Enterprise/Standard Edition Ver5.62 y anteriores, Proself Gateway Edition Ver1.65 y anteriores, y Proself Mail Sanitize Edition Ver1.08 y anteriores permiten a un atacante remoto no autenticado realizar ataques de entidad externa XML (XXE). Al procesar una solicitud especialmente manipulada que contiene datos XML con formato incorrecto, el atacante puede leer archivos arbitrarios en el servidor que contienen informaci\u00f3n de la cuenta."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-611"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:mail_sanitize:*:*:*",
+ "versionEndExcluding": "1.09",
+ "matchCriteriaId": "6D6F51B5-6B83-41C4-A1F6-9D10CB601DB5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:gateway:*:*:*",
+ "versionEndExcluding": "1.66",
+ "matchCriteriaId": "F1BB1954-50C1-40A8-9F47-415ECBB6259F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:enterprise:*:*:*",
+ "versionEndExcluding": "5.63",
+ "matchCriteriaId": "66942ECC-2DB7-4B63-9364-FC7D71722355"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:northgrid:proself:*:*:*:*:standard:*:*:*",
+ "versionEndExcluding": "5.63",
+ "matchCriteriaId": "1ED1659B-802E-4F0F-9CF3-BD1BBED1A27F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://jvn.jp/en/jp/JVN95981460/",
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.proself.jp/information/153/",
+ "source": "vultures@jpcert.or.jp",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45747.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45747.json
new file mode 100644
index 00000000000..7d1eb7f1dac
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45747.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45747",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:33.827",
+ "lastModified": "2023-10-27T21:57:07.240",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Syed Balkhi WP Lightbox 2 plugin <=\u00a03.0.6.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Syed Balkhi WP Lightbox 2 en versiones <= 3.0.6.5."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:syedbalkhi:wp_lightbox_2:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.0.6.5",
+ "matchCriteriaId": "9E44289F-640E-46BB-984D-DC2763D200A6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wp-lightbox-2/wordpress-wp-lightbox-2-plugin-3-0-6-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45748.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45748.json
index a94790087c5..96c65220c8c 100644
--- a/CVE-2023/CVE-2023-457xx/CVE-2023-45748.json
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45748.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45748",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:44.800",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:50:00.853",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in MailMunch MailChimp Forms by MailMunch plugin <=\u00a03.1.4 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en MailMunch MailChimp Forms by MailMunch en versiones <= 3.1.4."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mailmunch:mailchimp_forms:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.1.4",
+ "matchCriteriaId": "7F3B7734-015B-412B-A4A3-AE7F041866F9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mailchimp-forms-by-mailmunch/wordpress-mailchimp-forms-by-mailmunch-plugin-3-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45749.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45749.json
index ce35e22f0e4..6592cebe0fd 100644
--- a/CVE-2023/CVE-2023-457xx/CVE-2023-45749.json
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45749.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45749",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:44.870",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:06:48.303",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Alexey Golubnichenko AGP Font Awesome Collection plugin <=\u00a03.2.4 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Alexey Golubnichenko AGP Font Awesome Collection en versiones <= 3.2.4."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:profosbox:agp_font_awesome_collection:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.2.4",
+ "matchCriteriaId": "070BC037-FA26-4382-839A-0A207820357E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/agp-font-awesome-collection/wordpress-agp-font-awesome-collection-plugin-3-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45750.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45750.json
new file mode 100644
index 00000000000..e7939d45812
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45750.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45750",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:33.907",
+ "lastModified": "2023-10-27T21:57:14.363",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in POSIMYTH Nexter Extension plugin <=\u00a02.0.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento POSIMYTH Nexter Extension en versiones <= 2.0.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:posimyth:nexter_extension:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.0.3",
+ "matchCriteriaId": "017C65B3-1231-470C-8290-75D6F9EC5324"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/nexter-extension/wordpress-nexter-extension-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45752.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45752.json
index 1889922f85b..bb52f696e06 100644
--- a/CVE-2023/CVE-2023-457xx/CVE-2023-45752.json
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45752.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45752",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:44.943",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:50:21.603",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in 10 Quality Post Gallery plugin <=\u00a02.3.12 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complementos 10 Quality Post Gallery en versiones <= 2.3.12."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:10quality:post_gallery:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.3.12",
+ "matchCriteriaId": "34766B44-5D60-492B-B753-00F41B711544"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/simple-post-gallery/wordpress-post-gallery-plugin-2-3-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45753.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45753.json
index 63bde3a5a6a..3c84a31252a 100644
--- a/CVE-2023/CVE-2023-457xx/CVE-2023-45753.json
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45753.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45753",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:45.017",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:19:43.020",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Gilles Dumas which template file plugin <=\u00a04.6.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Gilles Dumas which template file en versiones <= 4.6.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gillesdumas:which_template_file:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "4.6.0",
+ "matchCriteriaId": "E52DA9E9-C1CB-4B9A-BECA-B59893E12EF4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/which-template-file/wordpress-which-template-file-plugin-4-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45754.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45754.json
new file mode 100644
index 00000000000..6e7000d7be5
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45754.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45754",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:33.977",
+ "lastModified": "2023-10-27T21:57:26.393",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Easy Testimonial Slider and Form plugin <=\u00a01.0.18 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento I Thirteen Web Solution Easy Testimonial Slider and Form en versiones <= 1.0.18."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:i13websolution:easy_testimonial_slider_and_form:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.0.18",
+ "matchCriteriaId": "768F4917-EEC9-461D-B84D-21C9EFB92E55"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/easy-testimonial-rotator/wordpress-easy-testimonial-slider-and-form-plugin-1-0-18-cross-site-scripting-xss?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45755.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45755.json
new file mode 100644
index 00000000000..2db95c118e8
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45755.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45755",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.047",
+ "lastModified": "2023-10-27T21:57:34.403",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in BuddyBoss BuddyPress Global Search plugin <=\u00a01.2.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento BuddyBoss BuddyPress Global Search en versiones <= 1.2.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:buddyboss:buddypress_global_search:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.2.1",
+ "matchCriteriaId": "979F9175-3DFA-4664-81B2-8B561B6D7780"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/buddypress-global-search/wordpress-buddypress-global-search-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45756.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45756.json
new file mode 100644
index 00000000000..0b9ef97adc1
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45756.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45756",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.133",
+ "lastModified": "2023-10-27T21:57:58.330",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Spider Teams ApplyOnline \u2013 Application Form Builder and Manager plugin <=\u00a02.5.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Spider Teams ApplyOnline \u2013 Application Form Builder and Manager en versiones <= 2.5.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:spiderteams:applyonline_-_application_form_builder_and_manager:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.5.2",
+ "matchCriteriaId": "A0FF650B-694B-465C-8A48-56550D0EC146"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/apply-online/wordpress-applyonline-application-form-builder-and-manager-plugin-2-5-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45757.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45757.json
index 9130e701fae..5c2e39d64bd 100644
--- a/CVE-2023/CVE-2023-457xx/CVE-2023-45757.json
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45757.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45757",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-16T09:15:11.563",
- "lastModified": "2023-10-16T15:15:17.613",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T18:21:01.680",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "Una vulnerabilidad de seguridad en Apache bRPC en versiones <=1.6.0 en todas las plataformas permite a los atacantes inyectar c\u00f3digo XSS en la p\u00e1gina rpcz incorporada. Un atacante que pueda enviar una solicitud http al servidor bRPC con rpcz habilitado puede inyectar c\u00f3digo XSS arbitrario en la p\u00e1gina rpcz incorporada. Soluci\u00f3n (elija una de estas tres): \n1. actualice a bRPC versi\u00f3n > 1.6.0, enlace de descarga: https://dist.apache.org/repos/dist/release/brpc/1.6.1/ \n2. Si est\u00e1 utilizando un versi\u00f3n antigua de bRPC y dif\u00edcil de actualizar, puede aplicar este parche: https://github.com/apache/brpc/pull/2411 \n3. deshabilite la funci\u00f3n rpcz"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "security@apache.org",
@@ -27,14 +50,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:brpc:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.6.1",
+ "matchCriteriaId": "A4F27ECA-3212-4F3E-8857-87AB5172DBFB"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/16/8",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4",
- "source": "security@apache.org"
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45758.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45758.json
new file mode 100644
index 00000000000..0f7e56558ee
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45758.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45758",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.220",
+ "lastModified": "2023-10-28T03:27:43.807",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Marco Milesi Amministrazione Trasparente plugin <=\u00a08.0.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Marco Milesi Amministrazione Trasparente en versiones <= 8.0.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:amministrazione_trasparente_project:amministrazione_trasparente:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "8.0.2",
+ "matchCriteriaId": "5BDBBF0B-1A55-4723-A687-8865962E077F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/amministrazione-trasparente/wordpress-amministrazione-trasparente-plugin-8-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45759.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45759.json
new file mode 100644
index 00000000000..cc8be81a85c
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45759.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45759",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.293",
+ "lastModified": "2023-10-25T20:32:16.527",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Peter Keung Peter\u2019s Custom Anti-Spam plugin <=\u00a03.2.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Peter Keung Peter\u2019s Custom Anti-Spam en versiones <= 3.2.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/peters-custom-anti-spam-image/wordpress-peter-s-custom-anti-spam-plugin-3-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45761.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45761.json
new file mode 100644
index 00000000000..6017c13a256
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45761.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45761",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.363",
+ "lastModified": "2023-10-28T03:27:51.290",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Joovii Sendle Shipping Plugin plugin <=\u00a05.13 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Joovii Sendle Shipping Plugin en versiones <= 5.13."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:joovii:sendle_shipping:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "5.13",
+ "matchCriteriaId": "9006B33B-55E5-44FA-98C3-9136ECD4212A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/official-sendle-shipping-method/wordpress-sendle-shipping-plugin-5-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45763.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45763.json
index 7ff36e99769..3b9232a35b5 100644
--- a/CVE-2023/CVE-2023-457xx/CVE-2023-45763.json
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45763.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45763",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:45.090",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:19:30.943",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Taggbox plugin <=\u00a02.9 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Taggbox en versiones <= 2.9."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:taggbox:taggbox:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.9",
+ "matchCriteriaId": "22E3A78A-8EC3-4C1F-875B-8935754418A3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/taggbox-widget/wordpress-taggbox-ugc-galleries-social-media-widgets-user-reviews-analytics-plugin-2-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45764.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45764.json
new file mode 100644
index 00000000000..90b14b28c18
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45764.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-45764",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.437",
+ "lastModified": "2023-10-28T03:27:59.727",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Scroll post excerpt plugin <=\u00a08.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenado autenticada (con permisos de admin o superiores) en el complemento de Gopi Ramasamy Scroll post excerpt en versiones <= 8.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gopiplus:scroll_post_excerpt:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "8.0",
+ "matchCriteriaId": "14C04C74-1A9E-4029-B3FD-4B9E0942110D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/scroll-post-excerpt/wordpress-scroll-post-excerpt-plugin-8-0-cross-site-scripting-xss?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45767.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45767.json
new file mode 100644
index 00000000000..3fdaecdd5ea
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45767.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45767",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.513",
+ "lastModified": "2023-10-28T03:28:05.577",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Wokamoto Simple Tweet plugin <=\u00a01.4.0.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenado autenticada (con permisos de admin o superiores) en el complemento Wokamoto Simple Tweet en versiones <= 1.4.0.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wokamoto:simple_tweet:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.4.0.2",
+ "matchCriteriaId": "FC9F67DE-35E1-467A-9161-5D3E95CE19C9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/simple-tweet/wordpress-simple-tweet-plugin-1-4-0-2-cross-site-scripting-xss?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45768.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45768.json
new file mode 100644
index 00000000000..b6935df6c38
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45768.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45768",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.590",
+ "lastModified": "2023-10-28T03:27:00.623",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Stephanie Leary Next Page plugin <=\u00a01.5.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenado autenticado (con permisos de admin o superiores) en el complemento Stephanie Leary Next Page en versiones <= 1.5.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:stephanieleary:next_page:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.5.2",
+ "matchCriteriaId": "5F67BC0A-2C8B-4588-A7F7-593A4B3B0967"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/next-page/wordpress-next-page-plugin-1-5-2-cross-site-scripting-xss?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45769.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45769.json
new file mode 100644
index 00000000000..4df1d82ed69
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45769.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45769",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.667",
+ "lastModified": "2023-10-28T03:27:10.200",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Alex Raven WP Report Post plugin <=\u00a02.1.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Alex Raven WP Report Post en versiones <= 2.1.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:alexraven:wp_report_post:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.1.2",
+ "matchCriteriaId": "39CCF528-8983-420C-90D8-1DDE62B55C59"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wp-report-post/wordpress-wp-report-post-plugin-2-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45770.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45770.json
new file mode 100644
index 00000000000..131e38e42d7
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45770.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45770",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.737",
+ "lastModified": "2023-10-28T03:27:17.170",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fastwpspeed Fast WP Speed plugin <=\u00a01.0.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Fastwpspeed Fast WP Speed en versiones <= 1.0.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:fastwpspeed:fast_wp_speed:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.0.0",
+ "matchCriteriaId": "770659C5-DBCB-4320-8AA8-186F28775DD6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/fast-wp-speed/wordpress-fast-wp-speed-plugin-1-0-0-reflected-cross-site-scripting-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45772.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45772.json
new file mode 100644
index 00000000000..718af738477
--- /dev/null
+++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45772.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45772",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.813",
+ "lastModified": "2023-10-28T03:27:24.907",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Scribit Proofreading plugin <=\u00a01.0.11 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Scribit Proofreading en versiones <= 1.0.11."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:scribit:proofreading:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.0.11",
+ "matchCriteriaId": "68F66EE4-CDF1-4DD4-8AD8-691D677CC206"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/proofreading/wordpress-proofreading-plugin-1-0-11-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json
new file mode 100644
index 00000000000..f0c02a01b8a
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json
@@ -0,0 +1,44 @@
+{
+ "id": "CVE-2023-45802",
+ "sourceIdentifier": "security@apache.org",
+ "published": "2023-10-23T07:15:11.330",
+ "lastModified": "2023-10-27T15:15:13.940",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.\n\nThis was found by the reporter during testing of\u00a0CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During \"normal\" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.\n\nUsers are recommended to upgrade to version 2.4.58, which fixes the issue.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Cuando un cliente restablec\u00eda una secuencia HTTP/2 (trama RST), hab\u00eda una ventana de tiempo en la que los recursos de memoria de la solicitud no se recuperaban inmediatamente. En cambio, la desasignaci\u00f3n se aplaz\u00f3 hasta el cierre de la conexi\u00f3n. Un cliente podr\u00eda enviar nuevas solicitudes y reinicios, manteniendo la conexi\u00f3n ocupada y abierta y provocando que la huella de memoria siga creciendo. Al cerrar la conexi\u00f3n, se recuperaron todos los recursos, pero el proceso podr\u00eda quedarse sin memoria antes de eso. El periodista descubri\u00f3 esto durante la prueba de CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) con su propio cliente de prueba. Durante el uso \"normal\" de HTTP/2, la probabilidad de encontrar este error es muy baja. La memoria guardada no se notar\u00e1 antes de que la conexi\u00f3n se cierre o se agote el tiempo de espera. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.58, que soluciona el problema."
+ }
+ ],
+ "metrics": {},
+ "weaknesses": [
+ {
+ "source": "security@apache.org",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://httpd.apache.org/security/vulnerabilities_24.html",
+ "source": "security@apache.org"
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
+ "source": "security@apache.org"
+ },
+ {
+ "url": "https://security.netapp.com/advisory/ntap-20231027-0011/",
+ "source": "security@apache.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45803.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45803.json
new file mode 100644
index 00000000000..ce50c2e8714
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45803.json
@@ -0,0 +1,153 @@
+{
+ "id": "CVE-2023-45803",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-17T20:15:10.070",
+ "lastModified": "2023-10-25T17:21:39.427",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.\n"
+ },
+ {
+ "lang": "es",
+ "value": "urllib3 es una librer\u00eda cliente HTTP f\u00e1cil de usar para Python. Anteriormente, urllib3 no eliminaba el cuerpo de la solicitud HTTP cuando una respuesta de redirecci\u00f3n HTTP usaba el estado 301, 302 o 303 despu\u00e9s de que la solicitud cambiara su m\u00e9todo de uno que pudiera aceptar un cuerpo de solicitud (como `POST`) a `GET` tal como est\u00e1. requerido por los RFC HTTP. Aunque este comportamiento no se especifica en la secci\u00f3n de redirecciones, se puede inferir reuniendo informaci\u00f3n de diferentes secciones y hemos observado el comportamiento en otras implementaciones importantes de clientes HTTP como curl y navegadores web. Debido a que la vulnerabilidad requiere que un servicio previamente confiable se vea comprometido para tener un impacto en la confidencialidad, creemos que la explotabilidad de esta vulnerabilidad es baja. Adem\u00e1s, muchos usuarios no colocan datos confidenciales en los cuerpos de solicitud HTTP; si este es el caso, entonces esta vulnerabilidad no es explotable. Las dos condiciones siguientes deben ser ciertas para verse afectado por esta vulnerabilidad: 1. Usar urllib3 y enviar informaci\u00f3n confidencial en el cuerpo de la solicitud HTTP (como datos de formulario o JSON) y 2. El servicio de origen est\u00e1 comprometido y comienza a redireccionar usando 301. 302 o 303 a un par malicioso o el servicio redirigido se ve comprometido. Este problema se solucion\u00f3 en las versiones 1.26.18 y 2.0.7 y se recomienda a los usuarios que actualicen para resolverlo. Los usuarios que no puedan actualizar deben deshabilitar los redireccionamientos para servicios que no esperan responder con redireccionamientos con `redirects=False` y deshabilitar los redireccionamientos autom\u00e1ticos con `redirects=False` y manejar los redireccionamientos 301, 302 y 303 manualmente eliminando el cuerpo de la solicitud HTTP."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.2,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.5,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.2,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.5,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.26.18",
+ "matchCriteriaId": "3F2284A6-F467-4419-9AF7-9FFD133B04E5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.0.7",
+ "matchCriteriaId": "6A586164-F448-431C-8966-14E145A82BB5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45805.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45805.json
new file mode 100644
index 00000000000..cd25ea00be2
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45805.json
@@ -0,0 +1,147 @@
+{
+ "id": "CVE-2023-45805",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-20T19:15:08.820",
+ "lastModified": "2023-10-28T03:24:28.190",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "pdm is a Python package and dependency manager supporting the latest PEP standards. It's possible to craft a malicious `pdm.lock` file that could allow e.g. an insider or a malicious open source project to appear to depend on a trusted PyPI project, but actually install another project. A project `foo` can be targeted by creating the project `foo-2` and uploading the file `foo-2-2.tar.gz` to pypi.org. PyPI will see this as project `foo-2` version `2`, while PDM will see this as project `foo` version `2-2`. The version must only be `parseable as a version` and the filename must be a prefix of the project name, but it's not verified to match the version being installed. Version `2-2` is also not a valid normalized version per PEP 440. Matching the project name exactly (not just prefix) would fix the issue. When installing dependencies with PDM, what's actually installed could differ from what's listed in `pyproject.toml` (including arbitrary code execution on install). It could also be used for downgrade attacks by only changing the version. This issue has been addressed in commit `6853e2642df` which is included in release version `2.9.4`. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "pdm es un administrador de dependencias y paquetes de Python que admite los \u00faltimos est\u00e1ndares PEP. Es posible crear un archivo `pdm.lock` malicioso que podr\u00eda permitir, por ejemplo, que un proyecto interno o de c\u00f3digo abierto malicioso parezca depender de un proyecto PyPI confiable, pero en realidad instale otro proyecto. Se puede apuntar a un proyecto `foo` creando el proyecto `foo-2` y cargando el archivo `foo-2-2.tar.gz` en pypi.org. PyPI ver\u00e1 esto como proyecto `foo-2` versi\u00f3n `2`, mientras que PDM ver\u00e1 esto como proyecto `foo` versi\u00f3n `2-2`. La versi\u00f3n solo debe ser \"analizable como versi\u00f3n\" y el nombre del archivo debe ser un prefijo del nombre del proyecto, pero no se verifica que coincida con la versi\u00f3n que se est\u00e1 instalando. La versi\u00f3n `2-2` tampoco es una versi\u00f3n normalizada v\u00e1lida seg\u00fan PEP 440. Hacer coincidir exactamente el nombre del proyecto (no solo el prefijo) solucionar\u00eda el problema. Al instalar dependencias con PDM, lo que realmente se instala puede diferir de lo que aparece en `pyproject.toml` (incluida la ejecuci\u00f3n de c\u00f3digo arbitrario durante la instalaci\u00f3n). Tambi\u00e9n podr\u00eda usarse para ataques de degradaci\u00f3n cambiando solo la versi\u00f3n. Este problema se solucion\u00f3 en el commit `6853e2642df` que se incluye en la versi\u00f3n `2.9.4`. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:frostming:pdm:*:*:*:*:*:python:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.10.0",
+ "matchCriteriaId": "678C6891-163D-40EC-AA3F-F6C62650F55B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:frostming:unearth:*:*:*:*:*:python:*:*",
+ "versionEndExcluding": "0.11.2",
+ "matchCriteriaId": "2D6377F2-F3DF-4E02-810F-11EF3C227B7E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/frostming/unearth/blob/eca170d9370ac5032f2e497ee9b1b63823d3fe0f/src/unearth/evaluator.py#L215-L229",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://github.com/pdm-project/pdm/blob/45d1dfa47d4900c14a31b9bb761e4c46eb5c9442/src/pdm/models/candidates.py#L98-L99",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://github.com/pdm-project/pdm/commit/6853e2642dfa281d4a9958fbc6c95b7e32d84831",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://peps.python.org/pep-0440/#post-release-spelling",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Not Applicable"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45807.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45807.json
index 8b9b5617b61..3290449493d 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45807.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45807.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-45807",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-16T22:15:12.790",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:29:38.150",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ },
{
"source": "security-advisories@github.com",
"type": "Secondary",
@@ -50,10 +70,51 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:docker:*:*",
+ "versionEndExcluding": "1.3.14.0",
+ "matchCriteriaId": "242C9ADA-A2B2-4FBE-BB25-2A3389572290"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:maven:*:*",
+ "versionEndExcluding": "1.3.14.0",
+ "matchCriteriaId": "1E5DD7C0-C800-47F6-8A3D-F539F8E74015"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:docker:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.11.0.0",
+ "matchCriteriaId": "A1F3994F-21EE-4DA8-9C00-65AC4BC0BA8E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:maven:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.11.0.0",
+ "matchCriteriaId": "94EFD1AD-102F-4E21-9E1A-0CE30CB17A25"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/opensearch-project/security/security/advisories/GHSA-72q2-gwwf-6hrv",
- "source": "security-advisories@github.com"
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45809.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45809.json
new file mode 100644
index 00000000000..2cd6e768d52
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45809.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-45809",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T19:15:15.867",
+ "lastModified": "2023-10-19T19:36:55.490",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Wagtail is an open source content management system built on Django. A user with a limited-permission editor account for the Wagtail admin can make a direct URL request to the admin view that handles bulk actions on user accounts. While authentication rules prevent the user from making any changes, the error message discloses the display names of user accounts, and by modifying URL parameters, the user can retrieve the display name for any user. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. Patched versions have been released as Wagtail 4.1.8 (LTS), 5.0.5 and 5.1.3. The fix is also included in Release Candidate 1 of the forthcoming Wagtail 5.2 release. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Wagtail es un sistema de gesti\u00f3n de contenidos de c\u00f3digo abierto construido sobre Django. Un usuario con una cuenta de editor con permisos limitados para el administrador de Wagtail puede realizar una solicitud de URL directa a la vista de administrador que maneja acciones masivas en cuentas de usuario. Si bien las reglas de autenticaci\u00f3n impiden que el usuario realice cambios, el mensaje de error revela los nombres para mostrar de las cuentas de usuario y, al modificar los par\u00e1metros de URL, el usuario puede recuperar el nombre para mostrar de cualquier usuario. La vulnerabilidad no es explotable por un visitante normal del sitio sin acceso al administrador de Wagtail. Se han lanzado versiones parcheadas como Wagtail 4.1.8 (LTS), 5.0.5 y 5.1.3. La soluci\u00f3n tambi\u00e9n se incluye en la versi\u00f3n candidata 1 de la pr\u00f3xima versi\u00f3n Wagtail 5.2. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 2.7,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-425"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/wagtail/wagtail/commit/bc96aed6ac53f998b2f4c4bf97e2d4f5fe337e5b",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/wagtail/wagtail/security/advisories/GHSA-fc75-58r8-rm3h",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45810.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45810.json
new file mode 100644
index 00000000000..98e4524a806
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45810.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-45810",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-17T23:15:12.403",
+ "lastModified": "2023-10-25T13:38:33.620",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "OpenFGA is a flexible authorization/permission engine built for developers and inspired by Google Zanzibar. Affected versions of OpenFGA are vulnerable to a denial of service attack. When a number of `ListObjects` calls are executed, in some scenarios, those calls are not releasing resources even after a response has been sent, and given a sufficient call volume the service as a whole becomes unresponsive. This issue has been addressed in version 1.3.4 and the upgrade is considered backwards compatible. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "OpenFGA es un motor de autorizaci\u00f3n/permiso flexible creado para desarrolladores e inspirado en Google Zanzibar. Las versiones afectadas de OpenFGA son vulnerables a un ataque de denegaci\u00f3n de servicio. Cuando se ejecutan varias llamadas `ListObjects`, en algunos escenarios, esas llamadas no liberan recursos incluso despu\u00e9s de que se haya enviado una respuesta y, dado un volumen de llamadas suficiente, el servicio en su conjunto deja de responder. Este problema se solucion\u00f3 en la versi\u00f3n 1.3.4 y la actualizaci\u00f3n se considera compatible con versiones anteriores. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:openfga:openfga:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.3.4",
+ "matchCriteriaId": "0A991E55-6232-4B78-A9C3-4CDD2454AFF7"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/openfga/openfga/security/advisories/GHSA-hr4f-6jh8-f2vq",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45811.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45811.json
new file mode 100644
index 00000000000..3a76cfb889a
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45811.json
@@ -0,0 +1,126 @@
+{
+ "id": "CVE-2023-45811",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-17T23:15:12.487",
+ "lastModified": "2023-10-25T13:33:35.367",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Synchrony deobfuscator is a javascript cleaner & deobfuscator. A `__proto__` pollution vulnerability exists in versions before v2.4.4. Successful exploitation could lead to arbitrary code execution. A `__proto__` pollution vulnerability exists in the `LiteralMap` transformer allowing crafted input to modify properties in the Object prototype. A fix has been released in `deobfuscator@2.4.4`. Users are advised to upgrade. Users unable to upgrade should launch node with the [--disable-proto=delete][disable-proto] or [--disable-proto=throw][disable-proto] flags\n"
+ },
+ {
+ "lang": "es",
+ "value": "Synchrony deofuscator es un limpiador y desofuscador de JavaScript. Existe una vulnerabilidad de contaminaci\u00f3n `__proto__` en versiones anteriores a la v2.4.4. Una explotaci\u00f3n exitosa podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario. Existe una vulnerabilidad de contaminaci\u00f3n `__proto__` en el transformador `LiteralMap` que permite que una entrada manipulada modifique las propiedades en el prototipo del objeto. Se ha publicado una soluci\u00f3n en `deobfuscator@2.4.4`. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben iniciar el nodo con los indicadores [--disable-proto=delete][disable-proto] o [--disable-proto=throw][disable-proto]"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.4,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1321"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1321"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:relative:synchrony:*:*:*:*:*:nodejs:*:*",
+ "versionStartIncluding": "2.0.1",
+ "versionEndExcluding": "2.4.4",
+ "matchCriteriaId": "76233930-2DF9-4929-B80B-B2E997EFDACF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/relative/synchrony/commit/b583126be94c4db7c5a478f1c5204bfb4162cf40",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/relative/synchrony/security/advisories/src/transformers/literalmap.ts",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Broken Link"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45812.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45812.json
new file mode 100644
index 00000000000..5946f47c4ec
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45812.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-45812",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-18T22:15:09.403",
+ "lastModified": "2023-10-19T12:59:35.787",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Apollo Router is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation. Affected versions are subject to a Denial-of-Service (DoS) type vulnerability which causes the Router to panic and terminate when a multi-part response is sent. When users send queries to the router that uses the `@defer` or Subscriptions, the Router will panic. To be vulnerable, users of Router must have a coprocessor with `coprocessor.supergraph.response` configured in their `router.yaml` and also to support either `@defer` or Subscriptions. Apollo Router version 1.33.0 has a fix for this vulnerability which was introduced in PR #4014. Users are advised to upgrade. Users unable to upgrade should avoid using the coprocessor supergraph response or disable defer and subscriptions support and continue to use the coprocessor supergraph response."
+ },
+ {
+ "lang": "es",
+ "value": "Apollo Router es un router de gr\u00e1ficos configurable y de alto rendimiento escrito en Rust para ejecutar un supergrafo federado que utiliza Apollo Federation. Las versiones afectadas est\u00e1n sujetas a una vulnerabilidad de tipo Denegaci\u00f3n de Servicio (DoS) que hace que el Router entre en p\u00e1nico y finalice cuando se env\u00eda una respuesta de varias partes. Cuando los usuarios env\u00edan consultas al Router que utiliza `@defer` o Suscripciones, el Router entrar\u00e1 en p\u00e1nico. Para ser vulnerables, los usuarios de Router deben tener un coprocesador con `coprocessor.supergraph.response` configurado en su `router.yaml` y tambi\u00e9n admitir `@defer` o Suscripciones. La versi\u00f3n 1.33.0 de Apollo Router tiene una soluci\u00f3n para esta vulnerabilidad que se introdujo en el PR #4014. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben evitar el uso de la respuesta supergraph del coprocesador o desactivar el soporte de aplazamiento y suscripciones y continuar usando la respuesta supergraph del coprocesador."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-754"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/apollographql/router/pull/4014",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/apollographql/router/security/advisories/GHSA-r344-xw3p-2frj",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45813.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45813.json
new file mode 100644
index 00000000000..0afaef37ddc
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45813.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-45813",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-18T21:15:09.640",
+ "lastModified": "2023-10-19T12:59:35.787",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Torbot is an open source tor network intelligence tool. In affected versions the `torbot.modules.validators.validate_link function` uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Torbot es una herramienta de inteligencia de red Tor de c\u00f3digo abierto. En las versiones afectadas, la `funci\u00f3n torbot.modules.validators.validate_link` utiliza la expresi\u00f3n regular de validaci\u00f3n de URL de python-validators. Esta expresi\u00f3n regular en particular tiene una complejidad exponencial que permite a un atacante provocar el bloqueo de una aplicaci\u00f3n utilizando un argumento manipulado bien elaborado. Un atacante puede utilizar un argumento de URL manipulado bien elaborado para explotar la vulnerabilidad en la expresi\u00f3n regular y provocar una Denegaci\u00f3n de Servicio en el System. El archivo de validadores se elimin\u00f3 en la versi\u00f3n 4.0.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.6,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-1333"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/DedSecInside/TorBot/commit/ef6e06bc7785355b1701d5524eb4550441086ac4",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45814.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45814.json
new file mode 100644
index 00000000000..80ca594e24e
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45814.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-45814",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-18T22:15:09.497",
+ "lastModified": "2023-10-19T12:59:35.787",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Bunkum is an open-source protocol-agnostic request server for custom game servers. First, a little bit of background. So, in the beginning, Bunkum's `AuthenticationService` only supported injecting `IUser`s. However, as Refresh and SoundShapesServer implemented permissions systems support for injecting `IToken`s into endpoints was added. All was well until 4.0. Bunkum 4.0 then changed to enforce relations between `IToken`s and `IUser`s. This wasn't implemented in a very good way in the `AuthenticationService`, and ended up breaking caching in such a way that cached tokens would persist after the lifetime of the request - since we tried to cache both tokens and users. From that point until now, from what I understand, Bunkum was attempting to use that cached token at the start of the next request once cached. Naturally, when that token expired, downstream projects like Refresh would remove the object from Realm - and cause the object in the cache to be in a detached state, causing an exception from invalid use of `IToken.User`. So in other words, a use-after-free since Realm can't manage the lifetime of the cached token. Security-wise, the scope is fairly limited, can only be pulled off on a couple endpoints given a few conditions, and you can't guarantee which token you're going to get. Also, the token *would* get invalidated properly if the endpoint had either a `IToken` usage or a `IUser` usage. The fix is to just wipe the token cache after the request was handled, which is now in `4.2.1`. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Bunkum es un servidor de solicitudes independiente del protocolo de c\u00f3digo abierto para servidores de juegos personalizados. Primero, un poco de historia. Entonces, al principio, el \"AuthenticationService\" de Bunkum solo admit\u00eda la inyecci\u00f3n de \"IUser\". Sin embargo, a medida que Refresh y SoundShapesServer implementaron sistemas de permisos, se agreg\u00f3 soporte para inyectar \"IToken\" en los endpoints. Todo estuvo bien hasta el 4.0. Bunkum 4.0, luego cambi\u00f3 para imponer relaciones entre `IToken`s e `IUser`s. Esto no se implement\u00f3 de muy buena manera en `AuthenticationService` y termin\u00f3 rompiendo el almacenamiento en cach\u00e9 de tal manera que los tokens almacenados en cach\u00e9 persistir\u00edan despu\u00e9s de la vida \u00fatil de la solicitud, ya que intentamos almacenar en cach\u00e9 tanto los tokens como los usuarios. Desde ese momento hasta ahora, seg\u00fan tengo entendido, Bunkum estaba intentando usar ese token almacenado en cach\u00e9 al comienzo de la siguiente solicitud una vez almacenado en cach\u00e9. Naturalmente, cuando ese token expir\u00f3, los proyectos posteriores como Refresh eliminar\u00edan el objeto de Realm y provocar\u00edan que el objeto en el cach\u00e9 estuviera en un estado separado, lo que provocar\u00eda una excepci\u00f3n por el uso no v\u00e1lido de `IToken.User`. En otras palabras, un use-after-free ya que Realm no puede administrar la vida \u00fatil del token almacenado en cach\u00e9. En cuanto a la seguridad, el alcance es bastante limitado, solo se puede implementar en un par de endpoints dadas algunas condiciones y no se puede garantizar qu\u00e9 token obtendr\u00e1. Adem\u00e1s, el token *would* invalidar\u00eda correctamente si el endpoint tuviera un uso de \"IToken\" o un uso de \"IUser\". La soluci\u00f3n es simplemente borrar el cach\u00e9 del token despu\u00e9s de que se manej\u00f3 la solicitud, que ahora est\u00e1 en `4.2.1`. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-772"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/LittleBigRefresh/Bunkum/commit/6e109464ed9255f558182f001f475a378405ff76",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/LittleBigRefresh/Bunkum/security/advisories/GHSA-jrf2-h5j6-3rrq",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45815.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45815.json
new file mode 100644
index 00000000000..83227ab4c87
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45815.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-45815",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T22:15:10.407",
+ "lastModified": "2023-10-20T11:27:31.330",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "ArchiveBox is an open source self-hosted web archiving system. Any users who are using the `wget` extractor and view the content it outputs. The impact is potentially severe if you are logged in to the ArchiveBox admin site in the same browser session and view an archived malicious page designed to target your ArchiveBox instance. Malicious Javascript could potentially act using your logged-in admin credentials and add/remove/modify snapshots, add/remove/modify ArchiveBox users, and generally do anything an admin user could do. The impact is less severe for non-logged-in users, as malicious Javascript cannot *modify* any archives, but it can still *read* all the other archived content by fetching the snapshot index and iterating through it. Because all of ArchiveBox's archived content is served from the same host and port as the admin panel, when archived pages are viewed the JS executes in the same context as all the other archived pages (and the admin panel), defeating most of the browser's usual CORS/CSRF security protections and leading to this issue. A patch is being developed in https://github.com/ArchiveBox/ArchiveBox/issues/239. As a mitigation for this issue would be to disable the wget extractor by setting `archivebox config --set SAVE_WGET=False`, ensure you are always logged out, or serve only a [static HTML version](https://github.com/ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive#2-export-and-host-it-as-static-html) of your archive."
+ },
+ {
+ "lang": "es",
+ "value": "ArchiveBox es un sistema de archivo web autohospedado de c\u00f3digo abierto. Cualquier usuario que est\u00e9 utilizando el extractor `wget` y vea el contenido que genera. El impacto es potencialmente grave si inicia sesi\u00f3n en el sitio de administraci\u00f3n de ArchiveBox en la misma sesi\u00f3n del navegador y ve una p\u00e1gina maliciosa archivada dise\u00f1ada para apuntar a su instancia de ArchiveBox. Javascript malicioso podr\u00eda potencialmente actuar utilizando sus credenciales de administrador iniciadas y agregar/eliminar/modificar instant\u00e1neas, agregar/eliminar/modificar usuarios de ArchiveBox y, en general, hacer cualquier cosa que un usuario administrador pueda hacer. El impacto es menos severo para los usuarios que no han iniciado sesi\u00f3n, ya que Javascript malicioso no puede *modificar* ning\u00fan archivo, pero a\u00fan puede *leer* todo el resto del contenido archivado al obtener el \u00edndice de la instant\u00e1nea y recorrerlo en iteraci\u00f3n. Debido a que todo el contenido archivado de ArchiveBox se sirve desde el mismo host y puerto que el panel de administraci\u00f3n, cuando se ven las p\u00e1ginas archivadas, JS se ejecuta en el mismo contexto que todas las dem\u00e1s p\u00e1ginas archivadas (y el panel de administraci\u00f3n), anulando la mayor\u00eda de las funciones habituales del navegador. Protecciones de seguridad CORS/CSRF y lo que lleva a este problema. Se est\u00e1 desarrollando un parche en https://github.com/ArchiveBox/ArchiveBox/issues/239. Como mitigaci\u00f3n para este problema, ser\u00eda deshabilitar el extractor de wget configurando `archivebox config --set SAVE_WGET=False`, asegurarse de estar siempre desconectado o servir solo una [versi\u00f3n HTML est\u00e1tica] (https://github.com /ArchiveBox/ArchiveBox/wiki/Publishing-Your-Archive#2-export-and-host-it-as-static-html) de su archivo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/ArchiveBox/ArchiveBox/issues/239",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/ArchiveBox/ArchiveBox/security/advisories/GHSA-cr45-98w9-gwqx",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45818.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45818.json
new file mode 100644
index 00000000000..8de42c82d96
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45818.json
@@ -0,0 +1,145 @@
+{
+ "id": "CVE-2023-45818",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T22:15:10.817",
+ "lastModified": "2023-10-26T16:32:24.767",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TinyMCE is an open source rich text editor. A mutation cross-site scripting (mXSS) vulnerability was discovered in TinyMCE\u2019s core undo and redo functionality. When a carefully-crafted HTML snippet passes the XSS sanitisation layer, it is manipulated as a string by internal trimming functions before being stored in the undo stack. If the HTML snippet is restored from the undo stack, the combination of the string manipulation and reparative parsing by either the browser's native [DOMParser API](https://developer.mozilla.org/en-US/docs/Web/API/DOMParser) (TinyMCE 6) or the SaxParser API (TinyMCE 5) mutates the HTML maliciously, allowing an XSS payload to be executed. This vulnerability has been patched in TinyMCE 5.10.8 and TinyMCE 6.7.1 by ensuring HTML is trimmed using node-level manipulation instead of string manipulation. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "TinyMCE es un editor de texto enriquecido de c\u00f3digo abierto. Se descubri\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) en la funcionalidad principal de deshacer y rehacer de TinyMCE. Cuando un fragmento de HTML cuidadosamente manipulado pasa la capa de sanitizaci\u00f3n XSS, las funciones de recorte internas lo manipulan como una cadena antes de almacenarlo en la pila de deshacer. Si el fragmento HTML se restaura desde la pila de deshacer, la combinaci\u00f3n de manipulaci\u00f3n de cadenas y an\u00e1lisis reparativo mediante la [API DOMParser] nativa del navegador (https://developer.mozilla.org/en-US/docs/Web/API/ DOMParser) (TinyMCE 6) o la API SaxParser (TinyMCE 5) muta el HTML de forma maliciosa, permitiendo que se ejecute un payload XSS. Esta vulnerabilidad se ha solucionado en TinyMCE 5.10.8 y TinyMCE 6.7.1 garantizando que HTML se recorte mediante manipulaci\u00f3n a nivel de nodo en lugar de manipulaci\u00f3n de cadenas. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tiny:tinymce:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.10.8",
+ "matchCriteriaId": "E9D412ED-B744-4750-B6D4-3D55C8DCD8D0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tiny:tinymce:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0.0",
+ "versionEndExcluding": "6.7.1",
+ "matchCriteriaId": "0328BE76-BE2B-48C0-B4D1-B6B04C9AB29C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/tinymce/tinymce/security/advisories/GHSA-v65r-p3vv-jjfv",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://researchgate.net/publication/266654651_mXSS_attacks_Attacking_well-secured_web-applications_by_using_innerHTML_mutations",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://tiny.cloud/docs/release-notes/release-notes5108/#securityfixes",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://tiny.cloud/docs/tinymce/6/6.7.1-release-notes/#security-fixes",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://www.tiny.cloud/docs/api/tinymce.html/tinymce.html.saxparser/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45819.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45819.json
new file mode 100644
index 00000000000..d5bf44c5d5d
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45819.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-45819",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T22:15:11.150",
+ "lastModified": "2023-10-26T16:30:27.223",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE\u2019s Notification Manager API. The vulnerability exploits TinyMCE's unfiltered notification system, which is used in error handling. The conditions for this exploit requires carefully crafted malicious content to have been inserted into the editor and a notification to have been triggered. When a notification was opened, the HTML within the text argument was displayed unfiltered in the notification. The vulnerability allowed arbitrary JavaScript execution when an notification presented in the TinyMCE UI for the current user. This issue could also be exploited by any integration which uses a TinyMCE notification to display unfiltered HTML content. This vulnerability has been patched in TinyMCE 5.10.8 and TinyMCE 6.7.1 by ensuring that the HTML displayed in the notification is sanitized, preventing the exploit. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n"
+ },
+ {
+ "lang": "es",
+ "value": "TinyMCE es un editor de texto enriquecido de c\u00f3digo abierto. Se descubri\u00f3 una vulnerabilidad de Cross-Site Scripting (XSS) en la API del Administrador de notificaciones de TinyMCE. La vulnerabilidad explota el sistema de notificaci\u00f3n sin filtrar de TinyMCE, que se utiliza en el manejo de errores. Las condiciones para este exploit requieren que se haya insertado contenido malicioso cuidadosamente manipulado en el editor y que se haya activado una notificaci\u00f3n. Cuando se abri\u00f3 una notificaci\u00f3n, el HTML dentro del argumento de texto se mostr\u00f3 sin filtrar en la notificaci\u00f3n. La vulnerabilidad permit\u00eda la ejecuci\u00f3n arbitraria de JavaScript cuando se presentaba una notificaci\u00f3n en la interfaz de usuario de TinyMCE para el usuario actual. Este problema tambi\u00e9n podr\u00eda ser aprovechado por cualquier integraci\u00f3n que utilice una notificaci\u00f3n TinyMCE para mostrar contenido HTML sin filtrar. Esta vulnerabilidad se ha solucionado en TinyMCE 5.10.8 y TinyMCE 6.7.1 garantizando que el HTML que se muestra en la notificaci\u00f3n est\u00e9 sanitizado, lo que evita el exploit. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tiny:tinymce:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.10.8",
+ "matchCriteriaId": "E9D412ED-B744-4750-B6D4-3D55C8DCD8D0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tiny:tinymce:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "6.0.0",
+ "versionEndExcluding": "6.7.1",
+ "matchCriteriaId": "0328BE76-BE2B-48C0-B4D1-B6B04C9AB29C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/tinymce/tinymce/security/advisories/GHSA-hgqx-r2hp-jr38",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45820.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45820.json
new file mode 100644
index 00000000000..4ce71bd7434
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45820.json
@@ -0,0 +1,119 @@
+{
+ "id": "CVE-2023-45820",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T19:15:15.950",
+ "lastModified": "2023-10-25T20:27:12.457",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Directus is a real-time API and App dashboard for managing SQL database content. In affected versions any Directus installation that has websockets enabled can be crashed if the websocket server receives an invalid frame. A malicious user could leverage this bug to crash Directus. This issue has been addressed in version 10.6.2. Users are advised to upgrade. Users unable to upgrade should avoid using websockets."
+ },
+ {
+ "lang": "es",
+ "value": "Directus es una API y un panel de aplicaciones en tiempo real para administrar el contenido de la base de datos SQL. En las versiones afectadas, cualquier instalaci\u00f3n de Directus que tenga websockets habilitados puede fallar si el servidor websocket recibe un frame no v\u00e1lido. Un usuario malintencionado podr\u00eda aprovechar este error para bloquear Directus. Este problema se solucion\u00f3 en la versi\u00f3n 10.6.2. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben evitar el uso de websockets."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-755"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-755"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*",
+ "versionStartIncluding": "10.4.0",
+ "versionEndExcluding": "10.6.2",
+ "matchCriteriaId": "975F0834-DF6F-42D1-8D6F-482C096BB328"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/directus/directus/commit/243eed781b42d6b4948ddb8c3792bcf5b44f55bb",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/directus/directus/security/advisories/GHSA-hmgw-9jrg-hf2m",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45821.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45821.json
new file mode 100644
index 00000000000..993ca727a8d
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45821.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-45821",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T21:15:08.847",
+ "lastModified": "2023-10-20T11:27:31.330",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which the `registryIsDockerHub` function was only checking that the registry domain had the `docker.io` suffix. Artifact Hub allows providing some Docker credentials that are used to increase the rate limit applied when interacting with the Docker Hub registry API to read publicly available content. Due to the incorrect check described above, it'd be possible to hijack those credentials by purchasing a domain which ends with `docker.io` and deploying a fake OCI registry on it. uses some credentials that only have permissions to read public content available in the Docker Hub. However, even though credentials for private repositories (disabled on `artifacthub.io`) are handled in a different way, other Artifact Hub deployments could have been using them for a different purpose. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Artifact Hub es una aplicaci\u00f3n basada en web que permite buscar, instalar y publicar paquetes y configuraciones para proyectos CNCF. Durante una auditor\u00eda de seguridad del c\u00f3digo base de Artifact Hub, un investigador de seguridad identific\u00f3 un error en el que la funci\u00f3n \"registryIsDockerHub\" solo verificaba que el dominio de registro tuviera el sufijo \"docker.io\". Artifact Hub permite proporcionar algunas credenciales de Docker que se utilizan para aumentar el l\u00edmite de velocidad aplicado al interactuar con la API de registro de Docker Hub para leer contenido disponible p\u00fablicamente. Debido a la verificaci\u00f3n incorrecta descrita anteriormente, ser\u00eda posible secuestrar esas credenciales comprando un dominio que termine con `docker.io` e implementando un registro OCI falso en \u00e9l. utiliza algunas credenciales que solo tienen permisos para leer contenido p\u00fablico disponible en Docker Hub. Sin embargo, aunque las credenciales para repositorios privados (deshabilitadas en `artifacthub.io`) se manejan de una manera diferente, otras implementaciones de Artifact Hub podr\u00edan haberlas usado para un prop\u00f3sito diferente. Este problema se resolvi\u00f3 en la versi\u00f3n `1.16.0`. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-494"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://artifacthub.io/packages/helm/artifact-hub/artifact-hub?modal=changelog&version=1.16.0",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/artifacthub/hub/security/advisories/GHSA-g6pq-x539-7w4j",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45822.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45822.json
new file mode 100644
index 00000000000..93603c8629c
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45822.json
@@ -0,0 +1,71 @@
+{
+ "id": "CVE-2023-45822",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T21:15:08.930",
+ "lastModified": "2023-10-20T11:27:31.330",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which a default unsafe rego built-in was allowed to be used when defining authorization policies. Artifact Hub includes a fine-grained authorization mechanism that allows organizations to define what actions can be performed by their members. It is based on customizable authorization policies that are enforced by the `Open Policy Agent`. Policies are written using `rego` and their data files are expected to be json documents. By default, `rego` allows policies to make HTTP requests, which can be abused to send requests to internal resources and forward the responses to an external entity. In the context of Artifact Hub, this capability should have been disabled. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Artifact Hub es una aplicaci\u00f3n basada en web que permite buscar, instalar y publicar paquetes y configuraciones para proyectos CNCF. Durante una auditor\u00eda de seguridad del c\u00f3digo base de Artifact Hub, un investigador de seguridad identific\u00f3 un error en el que se permit\u00eda el uso de un rego incorporado predeterminado no seguro al definir pol\u00edticas de autorizaci\u00f3n. Artifact Hub incluye un mecanismo de autorizaci\u00f3n detallado que permite a las organizaciones definir qu\u00e9 acciones pueden realizar sus miembros. Se basa en pol\u00edticas de autorizaci\u00f3n personalizables que aplica el \"Open Policy Agent\". Las pol\u00edticas se escriben utilizando `rego` y se espera que sus archivos de datos sean documentos json. De forma predeterminada, `rego` permite que las pol\u00edticas realicen solicitudes HTTP, de las cuales se puede abusar para enviar solicitudes a recursos internos y reenviar las respuestas a una entidad externa. En el contexto de Artifact Hub, esta capacidad deber\u00eda haberse deshabilitado. Este problema se resolvi\u00f3 en la versi\u00f3n `1.16.0`. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.7,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://artifacthub.io/packages/helm/artifact-hub/artifact-hub?modal=changelog&version=1.16.0",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/artifacthub/hub/security/advisories/GHSA-9pc8-m4vp-ggvf",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://www.openpolicyagent.org/",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://www.openpolicyagent.org/docs/latest/#rego",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45823.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45823.json
new file mode 100644
index 00000000000..f9c42c50d0e
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45823.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-45823",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T21:15:09.003",
+ "lastModified": "2023-10-20T11:27:31.330",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which by using symbolic links in certain kinds of repositories loaded into Artifact Hub, it was possible to read internal files. Artifact Hub indexes content from a variety of sources, including git repositories. When processing git based repositories, Artifact Hub clones the repository and, depending on the artifact kind, reads some files from it. During this process, in some cases, no validation was done to check if the file was a symbolic link. This made possible to read arbitrary files in the system, potentially leaking sensitive information. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Artifact Hub es una aplicaci\u00f3n basada en web que permite buscar, instalar y publicar paquetes y configuraciones para proyectos CNCF. Durante una auditor\u00eda de seguridad del c\u00f3digo base de Artifact Hub, un investigador de seguridad identific\u00f3 un error en el que, mediante el uso de enlaces simb\u00f3licos en ciertos tipos de repositorios cargados en Artifact Hub, era posible leer archivos internos. Artifact Hub indexa contenido de una variedad de fuentes, incluidos repositorios de git. Al procesar repositorios basados en git, Artifact Hub clona el repositorio y, seg\u00fan el tipo de artefacto, lee algunos archivos del mismo. Durante este proceso, en algunos casos, no se realiz\u00f3 ninguna validaci\u00f3n para verificar si el archivo era un enlace simb\u00f3lico. Esto hizo posible leer archivos arbitrarios en el system, potencialmente filtrando informaci\u00f3n confidencial. Este problema se resolvi\u00f3 en la versi\u00f3n `1.16.0`. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://artifacthub.io/packages/helm/artifact-hub/artifact-hub?modal=changelog&version=1.16.0",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/artifacthub/hub/security/advisories/GHSA-hmq4-c2r4-5q8h",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45825.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45825.json
new file mode 100644
index 00000000000..af48cdfcba3
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45825.json
@@ -0,0 +1,132 @@
+{
+ "id": "CVE-2023-45825",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T19:15:16.043",
+ "lastModified": "2023-10-27T18:17:11.990",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "ydb-go-sdk is a pure Go native and database/sql driver for the YDB platform. Since ydb-go-sdk v3.48.6 if you use a custom credentials object (implementation of interface Credentials it may leak into logs. This happens because this object could be serialized into an error message using `fmt.Errorf(\"something went wrong (credentials: %q)\", credentials)` during connection to the YDB server. If such logging occurred, a malicious user with access to logs could read sensitive information (i.e. credentials) information and use it to get access to the database. ydb-go-sdk contains this problem in versions from v3.48.6 to v3.53.2. The fix for this problem has been released in version v3.53.3. Users are advised to upgrade. Users unable to upgrade should implement the `fmt.Stringer` interface in your custom credentials type with explicit stringify of object state."
+ },
+ {
+ "lang": "es",
+ "value": "ydb-go-sdk es un controlador de base de datos/sql y nativo de Go puro para la plataforma YDB. Desde ydb-go-sdk v3.48.6, si usa un objeto de credenciales personalizado (implementaci\u00f3n de la interfaz Credenciales, puede filtrarse en los registros. Esto sucede porque este objeto podr\u00eda serializarse en un mensaje de error usando `fmt.Errorf(\"something went wrong (credentials: %q)\", credenciales)` durante la conexi\u00f3n al servidor YDB. Si se produjera dicho registro, un usuario malintencionado con acceso a los registros podr\u00eda leer informaci\u00f3n confidencial (es decir, credenciales) y utilizarla para obtener acceso a la base de datos. ydb- go-sdk contiene este problema en las versiones de v3.48.6 a v3.53.2. La soluci\u00f3n para este problema se public\u00f3 en la versi\u00f3n v3.53.3. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben implementar la interfaz `fmt.Stringer` en su tipo de credenciales personalizadas con cadena expl\u00edcita del estado del objeto."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ydb:ydb-go-sdk:*:*:*:*:*:go:*:*",
+ "versionStartIncluding": "3.48.6",
+ "versionEndExcluding": "3.53.2",
+ "matchCriteriaId": "5DEE71A5-8F9B-44E9-B983-648E88BEC94E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/ydb-platform/ydb-go-sdk/blob/master/credentials/credentials.go#L10",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://github.com/ydb-platform/ydb-go-sdk/blob/v3.48.6/internal/balancer/balancer.go#L71",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://github.com/ydb-platform/ydb-go-sdk/pull/859",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Issue Tracking"
+ ]
+ },
+ {
+ "url": "https://github.com/ydb-platform/ydb-go-sdk/security/advisories/GHSA-q24m-6h38-5xj8",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45826.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45826.json
new file mode 100644
index 00000000000..a3a4613c03e
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45826.json
@@ -0,0 +1,137 @@
+{
+ "id": "CVE-2023-45826",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-19T19:15:16.133",
+ "lastModified": "2023-10-27T15:27:30.243",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Leantime is an open source project management system. A 'userId' variable in `app/domain/files/repositories/class.files.php` is not parameterized. An authenticated attacker can send a carefully crafted POST request to `/api/jsonrpc` to exploit an SQL injection vulnerability. Confidentiality is impacted as it allows for dumping information from the database. This issue has been addressed in version 2.4-beta-4. Users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Leantime es un sistema de gesti\u00f3n de proyectos de c\u00f3digo abierto. Una variable 'userId' en `app/domain/files/repositories/class.files.php` no est\u00e1 parametrizada. Un atacante autenticado puede enviar una solicitud POST cuidadosamente manipulada a `/api/jsonrpc` para explotar una vulnerabilidad de inyecci\u00f3n SQL. La confidencialidad se ve afectada ya que permite descargar informaci\u00f3n de la base de datos. Este problema se solucion\u00f3 en la versi\u00f3n 2.4-beta-4. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:leantime:leantime:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.4",
+ "matchCriteriaId": "B60921EA-E652-4FE2-9C25-F33F78A44EB4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:leantime:leantime:2.4:-:*:*:*:*:*:*",
+ "matchCriteriaId": "22C7093F-E16C-4767-97A2-C403DEA9A6FD"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:leantime:leantime:2.4:beta:*:*:*:*:*:*",
+ "matchCriteriaId": "A1592B9A-1F65-4533-A6BE-4B26F48E12D6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:leantime:leantime:2.4:beta2:*:*:*:*:*:*",
+ "matchCriteriaId": "6EE5A2E1-9AD9-482B-8FF1-9B72DE5E9349"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:leantime:leantime:2.4:beta3:*:*:*:*:*:*",
+ "matchCriteriaId": "B9E3DC96-3C78-40A3-8CA1-D631478597CF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/Leantime/leantime/commit/be75f1e0f311d11c00a0bdc7079a62eef3594bf0",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/Leantime/leantime/security/advisories/GHSA-559g-3h98-g3fj",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45829.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45829.json
new file mode 100644
index 00000000000..31590c29377
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45829.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45829",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:34.953",
+ "lastModified": "2023-10-28T03:27:33.903",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in HappyBox Newsletter & Bulk Email Sender \u2013 Email Newsletter Plugin for WordPress plugin <=\u00a02.0.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en HappyBox Newsletter & Bulk Email Sender \u2013 Complemento Email Newsletter para el complemento WordPress en versiones <= 2.0.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:happybox:newsletter_\\&_bulk_email_sender:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.0.1",
+ "matchCriteriaId": "C1FAC40B-8A7B-4EB8-A394-E25197988948"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/newsletter-bulk-email/wordpress-newsletter-bulk-email-sender-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45831.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45831.json
index bbb7425d04a..5d6655442f1 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45831.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45831.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45831",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:45.163",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T18:35:15.887",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Pixelative, Mohsin Rafique AMP WP \u2013 Google AMP For WordPress plugin <=\u00a01.5.15 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Pixelative, Mohsin Rafique AMP WP \u2013 Complemento Google AMP para WordPress en versiones <= 1.5.15."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pixelative:google_amp:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.5.15",
+ "matchCriteriaId": "BBF42F1F-9588-4EB9-B906-EA405199F98D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/amp-wp/wordpress-amp-wp-google-amp-for-wordpress-plugin-1-5-15-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45832.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45832.json
new file mode 100644
index 00000000000..5a35b78e673
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45832.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45832",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:35.027",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Martin Gibson WP GoToWebinar plugin <=\u00a014.45 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Martin Gibson WP GoToWebinar en versiones <= 14.45."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wp-gotowebinar/wordpress-wp-gotowebinar-plugin-14-45-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45833.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45833.json
new file mode 100644
index 00000000000..d7ab49d0702
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45833.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45833",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:35.100",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in LeadSquared Suite plugin <=\u00a00.7.4 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento LeadSquared Suite en versiones <= 0.7.4."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/leadsquared-suite/wordpress-leadsquared-suite-plugin-0-7-4-cross-site-scripting-xss?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45835.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45835.json
new file mode 100644
index 00000000000..a088e8f4dc9
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45835.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45835",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:35.180",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Libsyn Libsyn Publisher Hub plugin <=\u00a01.4.4 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Libsyn Libsyn Publisher Hub en versiones <= 1.4.4."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/libsyn-podcasting/wordpress-libsyn-publisher-hub-plugin-1-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45836.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45836.json
index e6072331f80..1f18de4eadf 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45836.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45836.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-45836",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T11:15:45.233",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:50:04.203",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in XYDAC Ultimate Taxonomy Manager plugin <=\u00a02.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento XYDAC Ultimate Taxonomy Manager en versiones <= 2.0."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:xydac:ultimate_taxonomy_manager:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.0",
+ "matchCriteriaId": "6693470A-FFC2-48DF-8FE0-0DCE0110D25E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ultimate-taxonomy-manager/wordpress-ultimate-taxonomy-manager-plugin-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45837.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45837.json
new file mode 100644
index 00000000000..e7ef4fbc51d
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45837.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45837",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:35.260",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in XYDAC Ultimate Taxonomy Manager plugin <=\u00a02.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento XYDAC Ultimate Taxonomy Manager en versiones <= 2.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/ultimate-taxonomy-manager/wordpress-ultimate-taxonomy-manager-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45844.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45844.json
new file mode 100644
index 00000000000..0f8f2bca443
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45844.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45844",
+ "sourceIdentifier": "psirt@bosch.com",
+ "published": "2023-10-25T18:17:35.347",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The vulnerability allows a low privileged user that have access to the device when locked in Kiosk mode to install an arbitrary Android application and leverage it to have access to critical device settings such as the device power management or eventually the device secure settings (ADB debug)."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad permite a un usuario con pocos privilegios que tiene acceso al dispositivo cuando est\u00e1 bloqueado en modo quiosco instalar una aplicaci\u00f3n Android arbitraria y aprovecharla para tener acceso a configuraciones cr\u00edticas del dispositivo, como la administraci\u00f3n de energ\u00eda del dispositivo o, eventualmente, la configuraci\u00f3n segura del dispositivo (depuraci\u00f3n ADB). ."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV30": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 0.7,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html",
+ "source": "psirt@bosch.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45851.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45851.json
new file mode 100644
index 00000000000..1fe598a9569
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45851.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-45851",
+ "sourceIdentifier": "psirt@bosch.com",
+ "published": "2023-10-25T18:17:35.427",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication.\u00a0\r\n\r\n\r\nThis issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device"
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n cliente de Android, cuando se inscribe en el servidor AppHub, se conecta a un agente MQTT sin exigir ninguna autenticaci\u00f3n del servidor. Este problema permite a un atacante forzar a la aplicaci\u00f3n cliente de Android a conectarse a un agente MQTT malicioso, lo que le permite enviar mensajes falsos al dispositivo HMI."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-306"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html",
+ "source": "psirt@bosch.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45852.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45852.json
index 86cdf4d3b70..f9acf7b7b89 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45852.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45852.json
@@ -2,23 +2,99 @@
"id": "CVE-2023-45852",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-14T02:15:09.270",
- "lastModified": "2023-10-14T17:32:33.483",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T21:02:05.847",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method."
+ },
+ {
+ "lang": "es",
+ "value": "En Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi permite que un atacante no autenticado omita la autenticaci\u00f3n y ejecute comandos arbitrarios a trav\u00e9s de metacaracteres de shell en los datos JSON de los par\u00e1metros ipaddr para el m\u00e9todo put."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-77"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:viessmann:vitogate_300_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.1.3.0",
+ "matchCriteriaId": "2DAD3136-6337-4E41-AD13-A371EC4EA975"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:viessmann:vitogate_300:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C464EBFC-DD80-49C9-97BE-232F8E8AE624"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://connectivity.viessmann.com/gb/mp-fp/vitogate/vitogate-300-bn-mb.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_RCE.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45853.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45853.json
index cb931b9643f..abf3d15c245 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45853.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45853.json
@@ -2,35 +2,114 @@
"id": "CVE-2023-45853",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-14T02:15:09.323",
- "lastModified": "2023-10-14T17:32:33.483",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T21:15:09.867",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product."
+ },
+ {
+ "lang": "es",
+ "value": "MiniZip en zlib hasta 1.3 tiene un desbordamiento de enteros y un desbordamiento de b\u00fafer basado en mont\u00f3n resultante en zipOpenNewFileInZip4_64 a trav\u00e9s de un nombre de archivo largo, un comentario o un campo adicional. NOTA: MiniZip no es una parte compatible del producto zlib."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "1.3",
+ "matchCriteriaId": "BCAD5846-089D-4749-88B4-20243BC19B29"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
- "url": "https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356",
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/20/9",
"source": "cve@mitre.org"
},
+ {
+ "url": "https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
+ },
{
"url": "https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
},
{
"url": "https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://github.com/madler/zlib/pull/843",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
},
{
"url": "https://www.winimage.com/zLibDll/minizip.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45855.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45855.json
index 290e1e6dfb3..2114005782a 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45855.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45855.json
@@ -2,23 +2,85 @@
"id": "CVE-2023-45855",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-14T05:15:55.313",
- "lastModified": "2023-10-14T17:32:33.483",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T12:47:29.590",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI."
+ },
+ {
+ "lang": "es",
+ "value": "qdPM 9.2 permite que Directory Traversal enumere archivos y directorios navegando al URI /uploads."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:qdpm:qdpm:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "77454CEC-4140-4637-BFF1-43F824C471BA"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/SunshineOtaku/Report-CVE/blob/main/qdPM/9.2/Directory%20Traversal.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
},
{
"url": "https://qdpm.net",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45856.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45856.json
index db49f8a0c88..4bbf40b017a 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45856.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45856.json
@@ -2,23 +2,85 @@
"id": "CVE-2023-45856",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-14T05:15:55.360",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T12:51:51.217",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "qdPM 9.2 allows remote code execution by using the Add Attachments feature of Edit Project to upload a .php file to the /uploads URI."
+ },
+ {
+ "lang": "es",
+ "value": "qdPM 9.2 permite la ejecuci\u00f3n remota de c\u00f3digo mediante la funci\u00f3n Add Attachments de Edit Project para cargar un archivo .php en el URI /uploads."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:qdpm:qdpm:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "77454CEC-4140-4637-BFF1-43F824C471BA"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/SunshineOtaku/Report-CVE/blob/main/qdPM/9.2/RCE.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
},
{
"url": "https://qdpm.net",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45862.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45862.json
index 3867f269a63..4b0df576754 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45862.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45862.json
@@ -2,23 +2,87 @@
"id": "CVE-2023-45862",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-14T21:15:45.180",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:07:20.757",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en drivers/usb/storage/ene_ub6250.c para el controlador del lector ENE UB6250 en el kernel de Linux anterior a 6.2.5. Un objeto podr\u00eda potencialmente extenderse m\u00e1s all\u00e1 del final de una asignaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-770"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.2.5",
+ "matchCriteriaId": "23684754-3677-425D-8677-66C225B814FB"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.5",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce33e64c1788912976b61314b56935abd4bc97ef",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45863.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45863.json
index 44eab1dae00..ab1240e6893 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45863.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45863.json
@@ -2,23 +2,87 @@
"id": "CVE-2023-45863",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-14T21:15:45.233",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:12:23.513",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en lib/kobject.c en el kernel de Linux anterior a 6.2.3. Con acceso root, un atacante puede desencadenar una condici\u00f3n de ejecuci\u00f3n que resulte en una escritura fuera de los l\u00edmites fill_kobj_path."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.5,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.2.3",
+ "matchCriteriaId": "CFC92E07-E27C-4387-AC08-C20CCB92478A"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45867.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45867.json
new file mode 100644
index 00000000000..d24a2a25c0a
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45867.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-45867",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T15:15:08.900",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "ILIAS (2013-09-12 release) contains a medium-criticality Directory Traversal local file inclusion vulnerability in the ScormAicc module. An attacker with a privileged account, typically holding the tutor role, can exploit this to gain unauthorized access to and potentially retrieve confidential files stored on the web server. The attacker can access files that are readable by the web server user www-data; this may include sensitive configuration files and documents located outside the documentRoot. The vulnerability is exploited by an attacker who manipulates the file parameter in a URL, inserting directory traversal sequences in order to access unauthorized files. This manipulation allows the attacker to retrieve sensitive files, such as /etc/passwd, potentially compromising the system's security. This issue poses a significant risk to confidentiality and is remotely exploitable over the internet."
+ },
+ {
+ "lang": "es",
+ "value": "ILIAS (versi\u00f3n del 12/09/2013) contiene una vulnerabilidad de inclusi\u00f3n de archivos locales Directory Traversal de gravedad media en el m\u00f3dulo ScormAicc. Un atacante con una cuenta privilegiada, que normalmente desempe\u00f1a el rol de tutor, puede aprovechar esto para obtener acceso no autorizado y potencialmente recuperar archivos confidenciales almacenados en el servidor web. El atacante puede acceder a archivos que el usuario del servidor web www-data puede leer; esto puede incluir archivos de configuraci\u00f3n confidenciales y documentos ubicados fuera de documentRoot. La vulnerabilidad es explotada por un atacante que manipula el par\u00e1metro del archivo en una URL, insertando secuencias de Directory Traversal para acceder a archivos no autorizados. Esta manipulaci\u00f3n permite al atacante recuperar archivos confidenciales, como /etc/passwd, comprometiendo potencialmente la seguridad del sistema. Este problema plantea un riesgo importante para la confidencialidad y se puede explotar de forma remota a trav\u00e9s de Internet."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://rehmeinfosec.de",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://rehmeinfosec.de/labor/cve-2023-45867",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45868.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45868.json
new file mode 100644
index 00000000000..894d9cdcd04
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45868.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-45868",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T15:15:08.957",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Learning Module in ILIAS 7.25 (2023-09-12 release) allows an attacker (with basic user privileges) to achieve a high-impact Directory Traversal attack on confidentiality and availability. By exploiting this network-based vulnerability, the attacker can move specified directories, normally outside the documentRoot, to a publicly accessible location via the PHP function rename(). This results in a total loss of confidentiality, exposing sensitive resources, and potentially denying access to the affected component and the operating system's components. To exploit this, an attacker must manipulate a POST request during the creation of an exercise unit, by modifying the old_name and new_name parameters via directory traversal. However, it's essential to note that, when exploiting this vulnerability, the specified directory will be relocated from its original location, rendering all files obtained from there unavailable."
+ },
+ {
+ "lang": "es",
+ "value": "El M\u00f3dulo de Learning en ILIAS 7.25 (versi\u00f3n del 12/09/2013) permite a un atacante (con privilegios de usuario b\u00e1sicos) lograr un ataque de Directory Traversal de alto impacto sobre la confidencialidad y la disponibilidad. Al explotar esta vulnerabilidad basada en la red, el atacante puede mover directorios espec\u00edficos, normalmente fuera de documentRoot, a una ubicaci\u00f3n de acceso p\u00fablico mediante la funci\u00f3n PHP rename(). Esto da como resultado una p\u00e9rdida total de confidencialidad, exponiendo recursos confidenciales y potencialmente denegando el acceso al componente afectado y a los componentes del sistema operativo. Para aprovechar esto, un atacante debe manipular una solicitud POST durante la creaci\u00f3n de una unidad de ejercicio, modificando los par\u00e1metros old_name y new_name a trav\u00e9s del recorrido del directorio. Sin embargo, es esencial tener en cuenta que, al explotar esta vulnerabilidad, el directorio especificado se reubicar\u00e1 desde su ubicaci\u00f3n original, lo que har\u00e1 que todos los archivos obtenidos desde all\u00ed no est\u00e9n disponibles."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://rehmeinfosec.de",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://rehmeinfosec.de/labor/cve-2023-45867",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45869.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45869.json
new file mode 100644
index 00000000000..35a2e30518f
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45869.json
@@ -0,0 +1,51 @@
+{
+ "id": "CVE-2023-45869",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T15:15:09.010",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "ILIAS 7.25 (2023-09-12) allows any authenticated user to execute arbitrary operating system commands remotely, when a highly privileged account accesses an XSS payload. The injected commands are executed via the exec() function in the execQuoted() method of the ilUtil class (/Services/Utilities/classes/class.ilUtil.php) This allows attackers to inject malicious commands into the system, potentially compromising the integrity, confidentiality, and availability of the ILIAS installation and the underlying operating system."
+ },
+ {
+ "lang": "es",
+ "value": "ILIAS 7.25 (2023-09-12) permite a cualquier usuario autenticado ejecutar comandos arbitrarios del sistema operativo de forma remota, cuando una cuenta con altos privilegios accede a un payload XSS. Los comandos inyectados se ejecutan a trav\u00e9s de la funci\u00f3n exec() en el m\u00e9todo execQuoted() de la clase ilUtil (/Services/Utilities/classes/class.ilUtil.php). Esto permite a los atacantes inyectar comandos maliciosos en el sistema, comprometiendo potencialmente la integridad, confidencialidad y disponibilidad de la instalaci\u00f3n de ILIAS y del sistema operativo subyacente."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cve@mitre.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://rehmeinfosec.de/labor/cve-2023-45869",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://rehmeinfosec.de/report/358ad5f6-f712-4f74-a5ee-476efc856cbc/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json
index 8e409dce573..b392a04c1d8 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45871.json
@@ -2,23 +2,87 @@
"id": "CVE-2023-45871",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-15T01:15:09.027",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:12:11.690",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en drivers/net/ethernet/intel/igb/igb_main.c en el controlador IGB en el kernel de Linux anterior a 6.5.3. Es posible que un tama\u00f1o de b\u00fafer no sea adecuado para tramas m\u00e1s grandes que la MTU."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.3",
+ "matchCriteriaId": "94CF2054-EF6D-4135-876E-2925F10BCC0F"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.3",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45883.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45883.json
new file mode 100644
index 00000000000..b67ca071632
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45883.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-45883",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T13:15:10.447",
+ "lastModified": "2023-10-27T21:53:17.253",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM privileges. Standard users may use this to gain arbitrary code execution as SYSTEM."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de escalada de privilegios en Qumu Multicast Extension v2 anterior a 2.0.63 para Windows. Cuando un usuario est\u00e1ndar inicia una reparaci\u00f3n del software, se abre una ventana emergente con privilegios de SYSTEM. Los usuarios est\u00e1ndar pueden usar esto para obtener la ejecuci\u00f3n de c\u00f3digo arbitrario como SYSTEM."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:enghouse:qumu:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.0.0",
+ "versionEndExcluding": "2.0.63",
+ "matchCriteriaId": "1C995409-E387-4294-A583-9CC33321F536"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://hackandpwn.com/disclosures/CVE-2023-45883.pdf",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.vidyo.com/enterprise-video-management/qumu",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45897.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45897.json
new file mode 100644
index 00000000000..b437ff30dce
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45897.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-45897",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-28T21:15:07.577",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "exfatprogs before 1.2.2 allows out-of-bounds memory access, such as in read_file_dentry_set."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/exfatprogs/exfatprogs/commit/22d0e43e8d24119cbfc6efafabb0dec6517a86c4",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/exfatprogs/exfatprogs/commit/4abc55e976573991e6a1117bb2b3711e59da07ae",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/exfatprogs/exfatprogs/commit/ec78688e5fb5a70e13df82b4c0da1e6228d3ccdf",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/exfatprogs/exfatprogs/releases/tag/1.2.2",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json
index 47d37c39fa6..760824a7893 100644
--- a/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45898.json
@@ -2,35 +2,111 @@
"id": "CVE-2023-45898",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T03:15:09.320",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:20:31.453",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent."
+ },
+ {
+ "lang": "es",
+ "value": "El kernel de Linux anterior a 6.5.4 tiene un es1 use-after-free en fs/ext4/extents_status.c, relacionado con ext4_es_insert_extent."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.5.4",
+ "matchCriteriaId": "F125497B-0184-43A2-AB25-BCC4F3E2E97E"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/torvalds/linux/commit/768d612f79822d30a1e7d132a4d4b05337ce42ec",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://lkml.org/lkml/2023/8/13/477",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
},
{
"url": "https://lore.kernel.org/lkml/aa03f191-445c-0d2e-d6d7-0a3208d7df7a@huawei.com/T/",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
},
{
"url": "https://www.spinics.net/lists/stable-commits/msg317086.html",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mailing List",
+ "Patch",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45901.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45901.json
new file mode 100644
index 00000000000..7b696ba6a4f
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45901.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-45901",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T14:15:10.033",
+ "lastModified": "2023-10-18T17:55:22.477",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin\\/category\\/add."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Dreamer CMS v4.1.3 contiene Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin\\/category\\/add."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20newly%20added%20column%20of%20column%20management.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45902.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45902.json
new file mode 100644
index 00000000000..ebb7917d83d
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45902.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-45902",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T14:15:10.083",
+ "lastModified": "2023-10-18T17:55:36.060",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/attachment/delete."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Dreamer CMS v4.1.3 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/attachment/delete."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20attachment%20management%20deletion%20function.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45903.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45903.json
new file mode 100644
index 00000000000..90e6d6f8f1e
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45903.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-45903",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T14:15:10.140",
+ "lastModified": "2023-10-18T17:55:51.257",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/label/delete."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Dreamer CMS v4.1.3 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/label/delete."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20the%20label%20management%20deletion%20function.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45904.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45904.json
new file mode 100644
index 00000000000..c88bcb7af72
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45904.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-45904",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T14:15:10.193",
+ "lastModified": "2023-10-18T17:55:56.933",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /variable/update."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Dreamer CMS v4.1.3 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /variable/update."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20the%20variable%20management%20modification%20function.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45905.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45905.json
new file mode 100644
index 00000000000..eb097d96408
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45905.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-45905",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T14:15:10.247",
+ "lastModified": "2023-10-18T17:56:02.937",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/variable/add."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Dreamer CMS v4.1.3 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/variable/add."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20variable%20management%20with%20added%20functionality.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45906.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45906.json
new file mode 100644
index 00000000000..32a62acffbc
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45906.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-45906",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T14:15:10.307",
+ "lastModified": "2023-10-18T17:56:08.690",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/user/add."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Dreamer CMS v4.1.3 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/user/add."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20user%20added%20function.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45907.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45907.json
new file mode 100644
index 00000000000..5db7ec2e039
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45907.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-45907",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T14:15:10.360",
+ "lastModified": "2023-10-18T17:56:13.600",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/variable/delete."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Dreamer CMS v4.1.3 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/variable/delete."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20the%20variable%20management%20deletion%20function.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45909.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45909.json
new file mode 100644
index 00000000000..10c5bd78b60
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45909.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-45909",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T23:15:08.300",
+ "lastModified": "2023-10-25T13:58:40.897",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "zzzcms v2.2.0 was discovered to contain an open redirect vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que zzzcms v2.2.0 conten\u00eda una vulnerabilidad de redireccionamiento abierto."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-601"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zzzcms:zzzphp:2.2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "410E39C6-3A1E-4E57-A6F9-CB2A08A76B80"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/Num-Nine/CVE/issues/7",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45911.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45911.json
new file mode 100644
index 00000000000..2e898b3e888
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45911.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-45911",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T18:15:09.107",
+ "lastModified": "2023-10-25T13:45:28.653",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in WIPOTEC GmbH ComScale v4.3.29.21344 and v4.4.12.723 allows unauthenticated attackers to login as any user without a password."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en WIPOTEC GmbH ComScale v4.3.29.21344 y v4.4.12.723 permite a atacantes no autenticados iniciar sesi\u00f3n como cualquier usuario sin contrase\u00f1a."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-668"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wipotec:comscale:4.3.29.21344:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E24849ED-E92E-436B-85E4-E1F04B687BE3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wipotec:comscale:4.4.12.723:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C806C819-5873-4625-A0AB-D9FA181092EF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/PostalBlab/Vulnerabilities/blob/main/ComScale/auth_bypass.txt",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45912.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45912.json
new file mode 100644
index 00000000000..5ff9e2a40b4
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45912.json
@@ -0,0 +1,85 @@
+{
+ "id": "CVE-2023-45912",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T18:15:09.153",
+ "lastModified": "2023-10-25T13:49:52.877",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "WIPOTEC GmbH ComScale v4.3.29.21344 and v4.4.12.723 fails to validate user sessions, allowing unauthenticated attackers to read files from the underlying operating system and obtain directory listings."
+ },
+ {
+ "lang": "es",
+ "value": "WIPOTEC GmbH ComScale v4.3.29.21344 y v4.4.12.723 no logra validar las sesiones de usuario, lo que permite a atacantes no autenticados leer archivos del sistema operativo subyacente y obtener listados de directorios."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wipotec:comscale:4.3.29.21344:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E24849ED-E92E-436B-85E4-E1F04B687BE3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wipotec:comscale:4.4.12.723:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C806C819-5873-4625-A0AB-D9FA181092EF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/PostalBlab/Vulnerabilities/blob/main/ComScale/file_access.txt",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45951.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45951.json
new file mode 100644
index 00000000000..bb145c88131
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45951.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-45951",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T20:15:10.213",
+ "lastModified": "2023-10-24T20:49:24.337",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "lylme_spage v1.7.0 was discovered to contain a SQL injection vulnerability via the $userip parameter at function.php."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que lylme_spage v1.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro $userip en function.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lylme:lylme_spage:1.7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE00968C-F848-4DE2-B335-55A1680035FE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/LyLme/lylme_spage/issues/32",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45952.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45952.json
new file mode 100644
index 00000000000..8a4b7c37b38
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45952.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-45952",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-17T20:15:10.273",
+ "lastModified": "2023-10-25T12:57:41.117",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An arbitrary file upload vulnerability in the component ajax_link.php of lylme_spage v1.7.0 allows attackers to execute arbitrary code via uploading a crafted file."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente ajax_link.php de lylme_spage v1.7.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lylme:lylme_spage:1.7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE00968C-F848-4DE2-B335-55A1680035FE"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/LyLme/lylme_spage/issues/33",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45958.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45958.json
new file mode 100644
index 00000000000..7fbcaf4007e
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45958.json
@@ -0,0 +1,86 @@
+{
+ "id": "CVE-2023-45958",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T22:15:09.573",
+ "lastModified": "2023-10-25T15:02:45.697",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Thirty Bees Core v1.4.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the backup_pagination parameter at /controller/AdminController.php. This vulnerability allows attackers to execute arbitrary JavaScript in the web browser of a user via a crafted payload."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Thirty Bees Core v1.4.0 contiene una vulnerabilidad de Cross-Site Scripting (XSS) reflejada a trav\u00e9s del par\u00e1metro backup_pagination en /controller/AdminController.php. Esta vulnerabilidad permite a los atacantes ejecutar JavaScript arbitrario en el navegador web de un usuario mediante un payload manipulado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:thirtybees:thirty_bees:1.4.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "81B78C2D-BAB7-4573-B8E0-2B7D3BC1963D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/thirtybees/thirtybees/commit/2c99464376ad7b3c95f220163a2411e35274c3ba",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://zigrin.com/advisories/thirty-bees-reflected-cross-site-scripting-xss/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45960.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45960.json
new file mode 100644
index 00000000000..dc011702c79
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45960.json
@@ -0,0 +1,36 @@
+{
+ "id": "CVE-2023-45960",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:35.497",
+ "lastModified": "2023-10-28T21:15:07.630",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** DISPUTED ** An issue in dom4.j org.dom4.io.SAXReader v.2.1.4 and before allows a remote attacker to obtain sensitive information via the setFeature function. NOTE: the vendor and original reporter indicate that this is not a vulnerability because setFeature only sets features, which \"can be safe in one case and unsafe in another.\""
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en dom4.j org.dom4.io.SAXReader v.2.1.4 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n setFeature."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://dom4j.github.io/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/dom4j/dom4j/issues/171#issuecomment-1781547256",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/joker-xiaoyan/XXE-SAXReader/issues/1",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/joker-xiaoyan/XXE-SAXReader/tree/main",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45966.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45966.json
new file mode 100644
index 00000000000..554bd728832
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45966.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-45966",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T21:15:08.847",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "umputun remark42 version 1.12.1 and before has a Blind Server-Side Request Forgery (SSRF) vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "umputun remark42 versi\u00f3n 1.12.1 y anteriores tiene una vulnerabilidad de Blind Server-Side Request Forgery (SSRF)."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/jet-pentest/CVE-2023-45966",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/umputun/remark42/issues/1677",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45984.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45984.json
index 56c814df346..bba6ef088b6 100644
--- a/CVE-2023/CVE-2023-459xx/CVE-2023-45984.json
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45984.json
@@ -2,19 +2,118 @@
"id": "CVE-2023-45984",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T18:15:16.510",
- "lastModified": "2023-10-16T18:33:43.730",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:05:29.860",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the lang parameter in the function setLanguageCfg."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0u.6118_B20201102 y TOTOLINK A7000R V9.1.0u.6115_B20201022 conten\u00edan un desbordamiento de pila a trav\u00e9s del par\u00e1metro lang en la funci\u00f3n setLanguageCfg."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AFCC3B52-0985-4F61-BBCC-16A271E15CD4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A5BB152D-5E33-4158-BFFD-68AED6A174E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "603DA206-05D4-48FD-A506-F3BD8B4383B2"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/setLanguageCfg.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45985.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45985.json
index 17bc2fed2c1..3a25a5336a3 100644
--- a/CVE-2023/CVE-2023-459xx/CVE-2023-45985.json
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45985.json
@@ -2,19 +2,118 @@
"id": "CVE-2023-45985",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-16T18:15:16.577",
- "lastModified": "2023-10-16T18:33:43.730",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T13:05:14.910",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 were discovered to contain a stack overflow in the function setParentalRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X5000R V9.1.0u.6118_B20201102 y TOTOLINK A7000R V9.1.0u.6115_B20201022 conten\u00edan un desbordamiento de pila en la funci\u00f3n setParentalRules. Esta vulnerabilidad permite a los atacantes provocar una Denegaci\u00f3n de Servicio (DoS) mediante una solicitud POST manipulada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AFCC3B52-0985-4F61-BBCC-16A271E15CD4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A5BB152D-5E33-4158-BFFD-68AED6A174E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "603DA206-05D4-48FD-A506-F3BD8B4383B2"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/setParentalRules.md",
- "source": "cve@mitre.org"
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45990.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45990.json
new file mode 100644
index 00000000000..0538983e868
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45990.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-45990",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:35.553",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Insecure Permissions vulnerability in WenwenaiCMS v.1.0 allows a remote attacker to escalate privileges."
+ },
+ {
+ "lang": "es",
+ "value": "La vulnerabilidad de permisos inseguros en WenwenaiCMS v.1.0 permite a un atacante remoto escalar privilegios."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/PwnCYN/Wenwenai/issues/2",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45992.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45992.json
new file mode 100644
index 00000000000..bb1637e046e
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45992.json
@@ -0,0 +1,112 @@
+{
+ "id": "CVE-2023-45992",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T19:15:16.223",
+ "lastModified": "2023-10-25T20:22:06.523",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in Ruckus Wireless (CommScope) Ruckus CloudPath v.5.12.54414 allows a remote attacker to escalate privileges via a crafted script to the macaddress parameter in the onboarding portal."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross Site Scripting en Ruckus Wireless (CommScope) Ruckus CloudPath v.5.12.54414 permite a un atacante remoto escalar privilegios a trav\u00e9s de un script manipulado al par\u00e1metro macaddress en el portal de incorporaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:commscope:ruckus_cloudpath:5.12.54414:*:*:*:*:*:*:*",
+ "matchCriteriaId": "52DDAB5B-6E87-43A0-8F61-F0933D137F99"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://ruckus.com",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Not Applicable"
+ ]
+ },
+ {
+ "url": "https://github.com/harry935/CVE-2023-45992",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://server.cloudpath/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
+ },
+ {
+ "url": "https://server.cloudpath/admin/enrollmentData/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Broken Link"
+ ]
+ },
+ {
+ "url": "https://support.ruckuswireless.com/security_bulletins/322",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45998.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45998.json
new file mode 100644
index 00000000000..da70da81ecc
--- /dev/null
+++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45998.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-45998",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T22:15:09.300",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "kodbox 1.44 is vulnerable to Cross Site Scripting (XSS). Customizing global HTML results in storing XSS."
+ },
+ {
+ "lang": "es",
+ "value": "kodbox 1.44 es vulnerable a Cross Site Scripting (XSS). La personalizaci\u00f3n de HTML global da como resultado el almacenamiento de XSS."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/fangjiuye/703fdb643db558640f23e4e7c9532348",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4517.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4517.json
index 8aec94167e1..115fb0be039 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4517.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4517.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-4517",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-13T13:15:12.443",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T16:10:09.867",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository hestiacp/hestiacp prior to 1.8.6."
+ },
+ {
+ "lang": "es",
+ "value": "Cross-Site Scripting (XSS) Almacenado en el repositorio de GitHub hestiacp/hestiacp antes de 1.8.6."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@@ -46,14 +72,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hestiacp:hestiacp:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.8.6",
+ "matchCriteriaId": "EBCB9609-8D84-4DD5-B1D7-ECA7B306D63F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/hestiacp/hestiacp/commit/d30e3edbca5915235643e46ab222cb7aed9b319a",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/508d1d21-c45d-47ff-833f-50c671882e51",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json
index 3bdee1ff649..9a9d08648fd 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4527",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-18T17:15:55.067",
- "lastModified": "2023-10-05T16:15:12.250",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T18:00:01.123",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -93,6 +93,41 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "936B046D-ADEB-4701-8957-AC28CFA9C5C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98638583-9933-42F2-964E-7F8E7CF36918"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "056DABF5-0C1D-4EBA-B02B-443BACB20D6F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "910C9542-26FC-4635-9351-128727971830"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09AAD850-019A-46B8-A5A1-845DE048D30A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA3C5EAE-267F-410F-8AFA-8F5B68A9E617"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86034E5B-BCDD-4AFD-A460-38E790F608F5"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
@@ -102,6 +137,106 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F7DAD7C-9369-4A87-A1D0-4208D3AF0CDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9A879F9F-F087-45D4-BD65-2990276477D2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32AF225E-94C0-4D07-900C-DD868C05F554"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22C65F53-D624-48A9-A9B7-4C78A31E19F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA1F902F-1AD5-489F-B420-A3574D1880B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_s390x:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EEAC443B-622E-49FB-8C0F-2864B7EF5F80"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "23D471AC-7DCA-4425-AD91-E5D928753A8C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.2_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED521457-498F-4E43-B714-9A3F2C3CD09A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F91F9255-4EE1-43C7-8831-D2B6C228BFD9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99952557-C766-4B9E-8BF5-DBBA194349FF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC6A25CB-907A-4D05-8460-A2488938A8BE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22D28543-C7C5-46B0-B909-20435AF7A501"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
@@ -111,15 +246,24 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/25/1",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5453",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5455",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4527",
@@ -139,19 +283,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202310-03",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4562.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4562.json
index 5b6c53bcdea..8e859cbb162 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4562.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4562.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-4562",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2023-10-13T02:15:09.917",
- "lastModified": "2023-10-13T12:47:20.137",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T19:15:51.397",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Authentication vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main modules allows a remote unauthenticated attacker to obtain sequence programs from the product or write malicious sequence programs or improper data in the product without authentication by sending illegitimate messages.\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de autenticaci\u00f3n incorrecta en los m\u00f3dulos principales de la serie MELSEC-F de Mitsubishi Electric Corporation permite que un atacante remoto no autenticado obtenga programas de secuencia del producto o escriba programas de secuencia maliciosos o datos inadecuados en el producto sin autenticaci\u00f3n mediante el env\u00edo de mensajes ileg\u00edtimos."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ },
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ },
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Secondary",
@@ -46,18 +80,5160 @@
]
}
],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14_mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E444A570-C7FD-4CCE-B2F3-CA83BF5164B9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14_mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FEDEE8B5-CC21-4546-9773-D4F34B3951BF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14_mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6795EA4E-191E-4A45-9675-4B2B8AC00785"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14_mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "960F3E05-93CB-4785-9123-F9DC55CD167B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14_mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4981D649-6D01-4DD6-8601-6A7A3BDF4F8B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14_mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "782A7A4A-48C0-4E3D-AFAB-C9912B08CECD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14_mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9B0F45E5-0499-4078-9125-04B3144AE3D1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14_mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6148A382-A3D3-4EBE-AD6F-DBFAB54C23DD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14_mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "38A9DCF8-929A-47FF-8169-6120C542B400"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14_mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9AE272E8-5180-4C2C-A6FB-9813C7BA8786"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14_mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1B903CAE-464B-458F-AD63-2BC5708770DA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14_mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "813A7D21-ADE5-4E97-8FA7-DA4F1F18042F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0AE0608D-908F-4702-9464-F3443D318E21"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5766FC7F-312E-466E-9D1D-2C3D834A2B19"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A5F3736B-F4C5-48A7-B27B-6816E9413D19"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7FDA7E6C-BFBF-4D78-8552-B2B3E6D9987B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "80F706EE-51DC-47C4-9C47-BD3AED1169D8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mr\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "776C81B4-89BE-4E59-8EE4-4172F1C819EE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4B836C49-4CE0-47B9-90B8-46B37EB1C5CD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3EC7A6F2-0FAA-4D9C-8E32-4B630B6E0C1D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B1D9F99-9273-4990-9C5A-345B6D960894"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BC58D73-605B-4656-A93F-015178A11776"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A06675A-29C2-436C-ADD0-647523CAA2E3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "82C8038B-BA5E-4C3C-A9FA-7F4DF5FB4B90"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D6A2CA9-D8F4-47ED-9AC2-CEEB6F43A5A4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F9B5AD3-9E2E-4CF8-BCC1-1DC1B9AFA84C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-14mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BA42524-07CF-4F84-8038-7AA68BF61A8C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-14mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7F172545-1962-4611-AF12-C626B0F765FA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-232adp\\(-mb\\)_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87D2DF99-A998-469B-819E-C578FE5A0C0F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-232adp\\(-mb\\):-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3D16BD14-31FC-4BA9-9DC0-3ECC5A01879A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24_mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3D22F668-5706-4A0B-9063-588C8D278780"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24_mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E65AF48-87D6-4633-80CE-E06D841731E2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24_mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3AAE1DA0-127A-40A8-A59A-CC8753055315"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24_mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7B2E5E6-B5AE-4EEC-98CD-C09C2B3C1CEC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24_mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C16C6E43-DC7F-4C83-A0DB-89C21D326D2E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24_mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DAC68881-7BD4-4CCA-86EF-048119EDF2A1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24_mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F5BC763B-ACC9-4BB5-939A-876F8DC93F38"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24_mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1A7A0502-E034-4647-97F8-4BDD1FEA74B5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24_mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B7A25EA8-0298-4408-B186-B52964885AFC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24_mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3BF48B94-B38E-44F8-8AD8-2813A2DA1E27"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24_mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "774CE6D5-730B-428D-822E-4ECAE3DF8D15"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24_mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED18005B-3ED7-457E-BD81-48BE04D22059"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E186D9C7-0015-4F10-AF4A-5E2B0D808E92"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2FA061AF-EC9E-4490-98B0-4397271B6AFD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BD9EF0CD-CF20-44B4-AF85-36BB46B5C17A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A13FA80E-2FCE-43EE-A5F9-01847762DE05"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "907346DB-7343-472E-8F99-EABDFA5F7717"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mr\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DEC5C39-9751-4AD0-A030-AA283DA25FE4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D66F4099-33B9-4FB4-8FDB-2FCFCD029C41"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "905E3D20-2E81-40CB-8BC5-0F2E99DB4F2C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A826B7E-7CED-4767-9CF1-3EF0B60064DE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1374CFE-25E0-4357-B880-9C52BEE2219C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E3EDF1CF-9726-42FD-A44D-3AAECC0CC739"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E02660FF-B5B1-47F7-8566-45EA3C86783F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6C39385-5311-4CBB-A5A4-46CE5176989F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF7530C6-5244-4591-8037-5EFD35F8AC34"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-24mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DEC4E0C-7D80-4BC2-A88E-00E35090FFB4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-24mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B6709317-170A-4146-8D34-8A36BB46CAB8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-32_mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8D757DCC-29ED-4E09-B309-5DD003952CFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-32_mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "16193E36-7987-45EB-AFBE-AFB360043E67"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-3a-adp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "722B9083-7B72-4161-92BA-52849B189C91"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-3a-adp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EDA013EF-1BCA-4C3E-A15A-B7094A010F80"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40_mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8641082-790F-4FCF-9051-E575C0EF706C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40_mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2C179D4C-9B03-4526-9F21-2581ECA017DB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40_mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CFFF6B18-30CC-499E-8BCA-3D0CD10D433B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40_mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "55A8C97A-8668-4BBA-8923-6004ECD19759"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40_mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E370BF36-CFA9-436B-9BF4-EF9E61599023"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40_mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7EF08660-73EE-4550-997D-F386F7F8441A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40_mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89740455-D496-42A8-B06C-20F33B209C32"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40_mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AB07DCBB-3403-4496-9307-7826D918BB81"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40_mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5ACAD1E7-AE78-479C-97AF-08F4C47C257D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40_mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A4213FC4-861A-4214-A16B-E79E99B88E72"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40_mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A81E62D6-2902-4814-A1C0-C0262C56156E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40_mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9C15FE21-A180-4187-AF50-6B664A33CDE8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "20A0297C-B80E-4B20-8D2D-EA76978E88D6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0BBBBCC7-AC22-49C0-B0C0-8D89E633AB74"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "61DD79AB-6E10-451B-BAE2-120728459EF4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4EEA4C4A-0191-4A2C-B56F-E70475910A03"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A28CD4CC-7705-48F3-B160-FF240BDB7665"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mr\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F1C5D73F-A319-4922-B472-BCF5BBDC560D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89B3D140-E93A-49FD-8BDD-81DCA23062D5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B0520F3B-FE0F-483C-9201-D916D333AC34"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F532869-CCD3-49CA-9CD8-11C389FD610E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "24E0AE74-DF57-4461-9A91-11F31459EC68"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B2146C1E-2DC4-4839-AAF7-20EC5DAA72CC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90A1CA11-AC74-42B4-980B-ADFA6792F85B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "585E560C-B4DD-4355-BC98-2990897C7492"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DE85CAB9-A799-417C-B6C5-B1D2E0291194"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-40mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "06574AD8-8F05-4140-BDD9-4DBD0155A8C3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-40mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B69421D2-A453-43A8-A8D8-5E0B73F7B24A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-485adp\\(-mb\\)_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A49FA21A-A111-4B95-8383-42E9330015BA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-485adp\\(-mb\\):-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "434CCB2F-403A-4C40-8B3F-FFE47B6CE050"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-4ad-adp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EF08287D-2952-4B2A-A31D-AEFB8D1580AF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-4ad-adp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3A0B94DF-17B6-443A-9BE4-0B72A474C794"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-4ad-pt-adp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3C42A0A-99D4-42CB-B576-CD535F4FE5F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-4ad-pt-adp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3FAB2696-16C3-431A-B54A-0D879E363AD9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-4ad-ptw-adp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCD10930-4507-440B-8B08-E0A9819B396F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-4ad-ptw-adp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "278BEDD2-2F91-43FA-A9D7-3501C87F24E9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-4ad-tc-adp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7352D643-90BE-42BD-94C8-5EAD014F1BDE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-4ad-tc-adp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E87C1FA-F824-4F69-AE46-3B0273E887B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-4da-adp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B77879D7-664B-4098-98C4-9705EE5A443F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-4da-adp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D380C6B6-2B87-4279-9B8B-1BB6B64AD895"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-4da-pnk-adp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A740855-A401-4541-B292-984396CC73E3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-4da-pnk-adp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1DA2A08-CFC5-4943-9C35-03A3E5C5AFFF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60_mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "78D13195-CE64-4165-B350-9E60426F8A81"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60_mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "21BE74EA-5D64-4DA5-B909-02BAF7545C5A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60_mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "329149AD-0905-4335-AFB3-39B4A310F29B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60_mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D8B3758-2261-4CE4-BDDB-7B6C22F4D3D7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60_mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DEFC3E81-0F90-438E-8DB1-1D411BC42CD1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60_mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EAC9D3C4-8646-4B14-9984-D6BDF2F3BA16"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60_mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2CF15966-0F09-4029-8893-0B2B8D1A60C8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60_mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "30692B61-A4F7-4639-BE11-5D70593371DE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60_mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F3DFBC7-6842-401B-96BD-E82C626FEC52"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60_mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FCC92E43-E9F9-4B85-A598-7A14F5443918"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60_mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2E5D547B-DAA8-4797-AA35-17E510F4AF57"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60_mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C3E249B8-0FA5-414E-ADA1-2A9322274FF5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A3600241-6D05-4C63-8E3D-A56A5A702C9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB590D55-DA7F-4543-99AA-1A1979F73E69"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "522706E5-D5D3-494D-9290-F9D025ABEBFB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5CBC7773-96DA-433A-ABB8-845B19168EBF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "97DACA77-5FC4-42F1-8D50-0B7A6E3042E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mr\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9EBFAEF-FCB8-4691-8CC8-DCA2AB1453B7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EE9EDD50-E7D6-437E-BBD3-3523CB0D87CB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D05F5287-23A1-4EC3-8524-82A215E881D2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D0A5DBB-65E7-48AB-9C3C-6EF1CE2026C9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B69A0E1-E9FA-4C5C-810F-8D3CEC959C20"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8CEBA70C-C30D-43D1-AB88-09B2DE143C33"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91E087A7-A9EA-4A10-AF7D-6B86D070C323"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "768117D2-E73E-4B88-8998-EDF7F3800433"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CEDE33F5-A390-4444-AA04-E419D6B7FCFE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-60mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AE193F5C-0081-4A6E-856E-DB1DD47C6F73"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-60mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "010DBD73-40FF-4353-9D11-CE81C4D14EDB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3g-cnv-adp_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E09E76A2-8B2F-4C86-8BAE-515B3DE7D4D8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3g-cnv-adp:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "487E84CA-646E-483E-9582-34BFFD44F49E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ga-24mr-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BDE0E13F-028A-4D2C-A7BE-E90FBA8DFBD4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ga-24mr-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "02F36D61-366C-40F2-ABD1-A5ADB1D5758E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ga-24mt-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5B5D74EA-798D-4D5D-A431-098DD529EE99"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ga-24mt-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6B2BF6D-50FC-45BA-8A75-B0207172F192"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ga-40mr-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD82E0E9-E8E2-4F3A-AABE-A458971E8D57"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ga-40mr-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DAC7368C-4339-423E-ADFF-9C4AB902EA19"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ga-40mt-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4F50D3EE-F42F-48BF-B35F-E8E7FB810D93"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ga-40mt-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "825DFC3C-B1A8-460C-9A59-FDB2671C7152"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ga-60mr-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1C79E9FA-A5BF-4A5E-8202-388023D4C09B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ga-60mr-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "866AEC77-EEE5-45C8-9CB3-DA8B7773ED54"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ga-60mt-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7758736E-CC6F-4F6D-9888-A40C91AE47E1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ga-60mt-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7E9E9B4F-E217-455D-98F1-9EFEA12963AC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3gc_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6BF49EC6-DA86-475E-B67A-50E55F4849B2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3gc:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D319713C-7222-429B-87E3-3C4BFCD23E85"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3gc-32mt\\/d_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FC2F8BAB-834B-43E1-8C53-9E9B75C5136A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3gc-32mt\\/d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "49CAB744-E889-4860-9A9E-01FF265CE813"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3gc-32mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C9822843-FB60-4508-907D-D7BA28C078E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3gc-32mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6DEFD48F-EBB6-4B3F-AA8C-7F77073D6B27"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-24mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D149F56-652A-4E69-AE2E-54C013C7E735"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-24mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "95F939C6-1FBC-4D2A-A0E0-A5C74170D71E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-24mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "51C499F3-EF03-4F65-8B0B-87741CA3D055"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-24mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8C4F7E5-1871-4FBD-9AA5-3A13B76290C0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-24mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C97799B7-00AE-4EF2-9420-9FA2256523D5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-24mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6FDF6C3-5995-4330-BFC8-D3F8DB807892"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-24mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31ACE8B7-3C79-4BE8-850D-670EE389F26C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-24mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CF598729-B5F5-4808-BEF5-08CCD52D3BFD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-24mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B504285D-C4B3-498D-A4CB-17D8DE142AD0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-24mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E6F9F6E8-4673-442F-BCAF-7C77538ED742"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-24mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D6555546-9CB4-432B-85D2-A8EACFF3F4D7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-24mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "91263BE3-3F55-4D92-BF7B-FA3A9BC04752"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-40mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "56170D2E-7130-4210-8702-8699DC4C6D84"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-40mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB61263F-0E41-4A89-ACA0-174825775B75"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-40mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99C5E7CD-FC17-4501-88B6-8BD53507F836"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-40mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85C83082-0E9D-48E5-BD38-59A7EAAB463D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-40mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "357F433E-F2C1-4A95-88EC-0B9801FB8A5F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-40mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3041CDDC-2200-403C-9F4D-8BE9A0532774"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-40mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D9F0592-94C2-41F9-A326-D8F3803F3771"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-40mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90B5169A-9D3E-452D-85DB-204438181D6A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-40mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9A8EB7A2-2159-4DDE-A8BD-BD3C4815EB2E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-40mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "143C2ED9-FC12-45FF-9559-6E932AE9537D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3ge-40mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7ED15018-C6D7-413A-91D5-66BCA22AF9D1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3ge-40mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "079675D1-8C10-46C8-8723-E0B66717E8DD"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-10mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB3B4C24-BE31-4358-9F60-045EF88CE1A6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-10mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A69B8D0-51D4-4EAD-B030-25AD01B25F71"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-10mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "61CCB838-A5DD-45CA-8422-F586A6C6AB3B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-10mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DE0DF245-3A50-4DC8-97F3-D60D79051999"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-10mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "394AD4FC-2D14-46DE-AD36-B2721B54D08B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-10mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87A14A96-143B-48AE-9760-4330DF19738C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-10mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8EABCC91-5A76-4E06-A036-9FF6B0E95029"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-10mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9830EB7C-5F96-4DA8-A3D8-4140E8CD239E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-10mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AC113AB1-02CB-4B60-A21A-B58350705524"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-10mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "658E556E-CF4B-4FD9-9B85-03AD34410100"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-10mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C05CCA0A-DF0C-4D68-A1B1-94B1EF756747"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-10mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7BAA8E79-DE23-4906-A923-5A41124ED4B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-14mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0D86B991-7C59-4D50-B6AC-FEA10B740278"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-14mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5248CFDC-7822-4A8F-8034-25A938984B20"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-14mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B66842E-A440-4010-888F-F2E8787114AD"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-14mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E90528E5-FD72-4532-B42E-7242209F1DB3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-14mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "577A1638-11DE-405B-8E66-41ED293A73CB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-14mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65EAF73D-36B6-436B-A68D-79EE187611DE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-14mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89EE194D-AD58-470F-A6D8-37F523399222"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-14mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46CE128F-21E8-4306-AE3F-9E30F1161E69"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-14mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D8383936-27DA-4393-905E-D5E220038650"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-14mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "92C0A39F-EC73-4A85-A443-2AD3B23B2369"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-14mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "298E9588-BE31-4278-B016-EC5C8AABC954"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-14mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ABEA8FBE-EDA3-4A69-8E78-DC9E0BC12763"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-20mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "15D09642-AF76-4ABE-AA3B-CFF9CD815372"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-20mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F55E3A12-EBA0-4D7E-A679-0E0634E8F34A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-20mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B51E1D8D-E663-4037-8CF2-14CD2A1224E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-20mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CE98DCF0-7956-47D7-AC69-2C5BF6FA8086"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-20mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA430C19-0BB0-4698-996B-DBB27798DEDE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-20mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "71918F77-D72F-4FC6-9428-ABC50B784264"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-20mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1F69E6B2-BDF2-436D-B66F-E752F33E9CBF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-20mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9BEC0A27-4672-49FC-9837-68A631FA1C7C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-20mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B19D1167-EB5B-448C-9EDF-F72888FE38DF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-20mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "35F61BD7-F0C2-46CD-8B18-FA65CDD4C56B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-20mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9D8A26A7-AD07-4D68-B761-44FC98F1EBC8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-20mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "87AA0A29-E8FE-4742-B2C5-A30B07E8F2CF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-30mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "12721492-592C-40C8-8E9E-359497D663B1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-30mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "005999C7-8D89-48DA-9310-63840225655B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-30mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AFB98DC2-DA6C-4338-AFA2-5A9717052AFF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-30mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8B29F71-8CDB-43E2-AC1F-F8789399E1B8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-30mr\\/es-2ad_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "18E97BA8-9B11-4E42-AC8D-D281533A75EF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-30mr\\/es-2ad:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "67FF96CF-4C97-4427-93FD-C896CE229413"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "18F0B8C0-A283-4209-82E9-1481969F79D3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "303C9B51-4DFB-49E4-A47C-56B500FAC873"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1AF8636C-5FDF-4B40-B246-669903AF9237"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0B21F82B-3B1D-4435-9EDA-B3375CF9DC9D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "964183F2-6F83-4350-9761-55F13E4F96BA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "90D58142-FD09-415B-B9F6-20E26B4EBBC0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/es-2ad_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5654863A-5D44-4563-B88C-1EA988C6103E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/es-2ad:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BCBAC3A8-AA45-47FF-AE92-A809D2492A67"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "12D8451C-7F17-4A0A-A63A-E85BC50341EF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DC29835F-4E7F-43A0-A2D0-6D322B2BFB88"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3s-30mt\\/ess-2ad_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F6F3191-D86A-4A61-A04B-584CFEC6D082"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3s-30mt\\/ess-2ad:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3BF62084-562B-45F0-91EB-12CDD2304861"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3sa-10mr-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CF253F1-C89B-4F7A-9ED5-AB6E45384E3B"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3sa-10mr-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2039FFC8-2158-4104-BB6C-1F5B4223D362"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3sa-10mt-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B84915B7-988C-4E9B-BA98-DDE669BCB747"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3sa-10mt-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "027D7B3C-4D57-4B51-A097-4DB949AF5AA5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3sa-14mr-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0174E0AF-D4AF-4D48-AD73-13D9E3601506"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3sa-14mr-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DB752455-EB9F-4DDA-8096-F58461AA12CC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3sa-14mt-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E70A4A8E-2C6A-4F69-8165-7D4D4D322479"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3sa-14mt-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A24DD068-5721-4BCF-960F-630E70F3D54B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3sa-20mr-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C1A1C66C-7895-4E4F-BB23-8517B37B66EB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3sa-20mr-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F69DA3AB-EE88-4B75-B151-48E283B34B5D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3sa-20mt-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D95886BA-4CE3-4933-9084-38650D0CE22A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3sa-20mt-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "383C3ED4-3A11-4574-AD11-15E123705A8F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3sa-30mr-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "039A1D95-EC4B-428B-B9A7-88AA89A08667"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3sa-30mr-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B4D84A6F-0353-4534-B7E2-7F0DDE247EF4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3sa-30mt-cm_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "545F5DD4-EA85-408E-8756-99FE700EBD05"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3sa-30mt-cm:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DD33CC9-DE0D-404B-9AD3-E9361F203AF8"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-128mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7C30FB7E-3BCB-4A20-AD13-A36A051FC5D1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-128mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA7595AC-9CBD-4785-9005-5E0FAEC27D2C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-128mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BAEF478A-5D48-47C1-9B32-945DE0281DC6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-128mr\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B641ED-17C0-4383-9D45-6C63A38FB3E5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-128mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "138B4032-E9D4-4E85-8863-C334383A457E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-128mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "19DE07A9-7494-4C42-A452-57CF0573A3B3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-128mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "42CD66FA-074E-4567-A31C-C3243247C361"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-128mt\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E915604A-1C8A-409C-BFD8-A6414C1582E4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-128mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D6BBB82-E022-462F-BBCB-D36C2CC91FC6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-128mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A60E2A0E-D686-470D-82E0-8C28F50E8CD0"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-16mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "04C64F82-7D74-4E36-95E0-4EF0077424F8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-16mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2E9E219D-83B8-4C29-801E-9E3AA9BB87A1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-16mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "10D56C7D-7430-4E27-9AEC-7FE53ECEEAEB"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-16mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F2A8CAFC-6AF5-4044-9E77-F9B8A0CF36BA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-16mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5E0C5307-FB3B-4639-B412-DDA54746B068"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-16mr\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6EC7B0BA-52F1-468E-8C79-033E0A46FE16"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-16mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A46C02E6-FD3C-4E33-93A0-215AFF540AC5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-16mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3A3CE75E-74E8-404B-9DB7-F0446262017E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-16mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "66AE4031-A95C-4BCD-BD37-14F350403C8A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-16mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E450F049-C2FB-494E-86C4-E434E13AAD6C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-16mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1550E8C5-8A19-4B7D-A455-42D073F239FC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-16mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5387C911-2E14-45F6-9F8C-0892F2A5EBDE"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-16mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F884FF0-0CC5-4749-9F74-36814A1A9D24"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-16mt\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D7FE742D-0097-44EB-8297-3AA561A8E511"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-16mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BE5015A-87F2-4C3F-8794-292A98F75475"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-16mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "709A855C-DCA6-4D18-84CC-440E14411FA5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-32mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3749A776-2FA8-43FA-8678-F6B401CB2697"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-32mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1334D6D4-DBBB-4A58-ACF5-AF77603F49FC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-32mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "796B9C41-112B-4BAC-BDF7-308967D4598F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-32mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DF43C36F-8FEB-4B72-AA44-371B54C6E35F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-32mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CD84F16-BBB0-45B2-84E2-A7133C28A3E3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-32mr\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7F20ED3-3BD1-4BC4-A0DA-0D74925E0C2F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-32mr\\/ua1_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3278D0F4-212B-440F-8952-328098996AC8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-32mr\\/ua1:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F724663D-2DA6-42D3-892A-D7AAE8C2C8A6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-32ms\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37EC00DB-D8BF-46DA-AF13-CF26F85F77E2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-32ms\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1E8DA5D5-183A-4804-93EB-09BE60093480"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-32mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D0CE2A49-7C18-4103-AE0A-2C6E02411EAC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-32mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "93F07F53-68BC-4FDE-AC5B-8CFD45AEC0DA"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-32mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A8177335-A337-4061-9599-20B6A6BCACB7"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-32mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "742941D7-F375-455E-AEF4-4981D480A5CB"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-32mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7DCB3423-E61A-473F-A5F6-2365A119D6F6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-32mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F91F9DF6-F1CE-467D-940E-6D8A832F8D1B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-32mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "553E29E6-8B15-421E-94FE-6C89C5E4F96D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-32mt\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "811BE72F-4A19-4C9C-8FBB-F102BDD2B5D5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-32mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E72A8B32-F646-42EF-8CE3-BBD4FF1D8737"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-32mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8B74733B-D6EE-4E42-A600-7CBB42BC1F15"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-48mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E214FC34-6AD6-4456-941F-476A2D52C0B2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-48mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "85303A96-57A7-46AF-B794-556C753ED2E6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-48mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8DE00B76-C8BA-46A6-819D-4B0B412758CC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-48mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6E5DE6E8-55AE-42F8-A324-BEEC0FA53A58"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-48mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AFBB22D5-7BF7-4F23-9402-013EC5D32F61"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-48mr\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "379C0410-CB4E-4972-9B9E-EC5695492301"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-48mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F7A0634C-A048-4261-B6EF-B81AB0574B53"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-48mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "28004AFA-4510-4674-9755-8F8FF16CDFE1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-48mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "180B8CE9-46EE-4CFC-9513-E01FDBA15C2C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-48mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D72828CB-EAB4-40CB-9348-3D24848FAC1A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-48mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F986500-B77C-4699-9294-BFA1BF8DA326"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-48mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2DBD4BAA-014E-4277-B336-660809B4D2A4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-48mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57D19440-9B12-4A30-A3C5-35E331339E16"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-48mt\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "72B1401A-5902-420C-843C-42A5D9E11AE9"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-48mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B9E4B675-836C-4360-8749-C08D01CAF0B8"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-48mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E02893B2-7AD4-4CC5-A6BA-757A4C57B31D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-64mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1B867EF7-30AC-499B-A81E-A7FD3EE00DCE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-64mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F8F9B997-4A54-451C-B7FA-BF85DCBD93B4"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-64mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3E314572-A49C-4CBA-A9C9-F06F888D8530"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-64mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FB5CFC2E-C936-449D-991C-733CB2FBB994"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-64mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1CB5DD71-AC57-48C5-A2A1-F045C9CF7D35"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-64mr\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "13B9AF49-681F-432E-8B31-2D2570B252E1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-64mr\\/ua1_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B3514A08-CBAF-4F10-A7C4-EC5B89D7A28D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-64mr\\/ua1:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E0398640-0BBD-48B2-ACC0-3F2480B5FECF"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-64ms\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA5F6A62-6C15-486C-A8AC-CF14197DFA5F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-64ms\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E5570155-6AAA-4B51-8C8B-8AD8BFDC7181"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-64mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4D1249B5-4141-4B4E-ACCC-A577F18D80AA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-64mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46A45C6D-F039-4A21-BF6E-96AD1AE684A1"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-64mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0F64A86A-69F2-497D-B38D-21D60821E1D1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-64mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2A1E9620-66D0-4BCF-86D9-50F25F631869"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-64mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0239D43D-8167-4EA7-8580-A98E181D8B7F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-64mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1FF26626-6B52-4D5D-8E42-08F137A368F7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-64mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8BCB927C-6E5C-421A-A62B-DC2CA0A88224"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-64mt\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA4118CD-4D88-498E-A63C-3332E8F49166"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-64mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0C685BA9-93C1-4130-BA00-5416252B92CE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-64mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "288C04E9-CFE7-4877-9FE5-1E63ACBD3D9A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-80mr\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DD59F4A3-DDF5-443F-AD0B-755CDA88B4CA"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-80mr\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "632A39FB-1F15-4B4A-994B-74A370093BE3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-80mr\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "02E937EB-2069-4415-A26C-1FDFE53AED25"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-80mr\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A56BA52D-A7E2-413D-96BA-4AF2B47ABF67"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-80mr\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1E3073D1-F083-499E-B3C4-CED326C2B1B1"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-80mr\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37C8DAD8-3CFC-46FA-A007-75AB027E5C9C"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-80mt\\/ds_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BFC1D50D-F364-4BCF-B1EC-5D203F2C0FE9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-80mt\\/ds:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "791E6428-8D18-4FA4-B93A-81022F98A2BC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-80mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E1A3CCA1-B4A5-44C2-85BC-C651ABDE1E2A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-80mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AD52BAA5-66E2-4062-B03A-E391C277EE2D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-80mt\\/es_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "218BED8B-BF2E-43FD-8C50-9C845A512505"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-80mt\\/es:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F1A60072-A39D-47FB-9464-6954EDF90176"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-80mt\\/es-a_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "215557E1-0D0A-482B-B06B-F30BD59C8618"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-80mt\\/es-a:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8F42EF2A-AD06-43A0-9C59-1411F5416AB6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-80mt\\/ess_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "37B57E67-E801-4260-8452-37103A401523"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-80mt\\/ess:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1313D033-3620-406F-A7F3-90192BEFA32E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "DFD943B0-4BD1-447D-9B7C-C5D62C067968"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5D1644E1-F748-46A3-8E09-FF5D53FD046F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet-l_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F0C7FC7F-5BEF-4308-B237-79929D89595F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet-l:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8ACC832-E1EC-46DA-A2D1-CF1A3791A885"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3u-enet-p502_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6F5A0639-3008-4ECE-9467-8036F4D6EFFC"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3u-enet-p502:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "69BA96DC-C462-4286-AE0E-32D141017E7F"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "4C92EBEF-9479-4E84-9DAF-29D1F9784155"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A879DAAF-F3F5-4800-9C2F-0C6F38EEFC4D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-16mr\\/d-t_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2B067EE6-A82D-43FF-8E1C-134FC3E87221"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-16mr\\/d-t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2632C46A-CB9D-4AB9-8590-9857E15108A7"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-16mr\\/ds-t_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "8A7B5607-0598-43E6-A59D-31C9E90D3FB2"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-16mr\\/ds-t:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65F9960F-95CF-4C2E-B701-D14C2419B567"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-16mt\\/d_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CB3E50BC-0E52-46C3-A900-293431F52B8A"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-16mt\\/d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D1AB8259-4ECC-4689-9870-8EC4ADBDAB83"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-16mt\\/d-p4_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E8F3D044-F5B1-45D4-9DE6-D2883142410D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-16mt\\/d-p4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A024062A-F427-411A-AC6B-73A2DA8C4913"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-16mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E76F9051-5720-4324-BDC8-269FE399E0E4"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-16mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C5E55868-3A68-45AA-827B-E485A7A6A653"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-16mt\\/dss-p4_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D52E035F-284D-4601-AD13-33DDB324AB32"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-16mt\\/dss-p4:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "89110E36-36EA-4DD1-99D1-01B642288F1D"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-32mt-lt_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "18D7B4E2-C884-4991-BC5A-68D1C7DB80DE"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-32mt-lt:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF57E8A3-6C69-4D48-B400-49BE4B825398"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-32mt-lt-2_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6724DBF8-D8BB-4FD3-B968-69EB3FF0BEE9"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-32mt-lt-2:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "478A934A-6037-4F31-8380-94467509FD7A"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-32mt\\/d_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C7779FBF-9A59-4DB4-84B2-EDCE67645F78"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-32mt\\/d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "45BC5123-BBD6-45A0-A466-391A53010091"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-32mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C8D3E901-A445-456D-A642-73A8A7FA2640"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-32mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EB95C71D-EBE0-4F39-BC79-D47D266378DC"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-64mt\\/d_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F247CCA1-673F-4FCE-A2AD-30AF2C9603C5"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-64mt\\/d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "26D64749-1E12-4744-8A06-E866DE240A35"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-64mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "895C814A-C07F-420F-A93C-6F2C2A908B5C"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-64mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC74B68C-54E2-4CB3-8E8E-419033F29064"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-96mt\\/d_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7D92D8E6-81A7-479A-9793-2F09204BDEA6"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-96mt\\/d:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "26669F78-0CFF-4AF1-9841-037E618CB14E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:mitsubishielectric:fx3uc-96mt\\/dss_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9E743BF6-7957-4DAF-93E0-B365B2CED03F"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:mitsubishielectric:fx3uc-96mt\\/dss:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BF0132BB-9968-47D7-A692-135A60478967"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://jvn.jp/vu/JVNVU90509290/",
- "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
+ "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-13",
- "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
+ "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-012_en.pdf",
- "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
+ "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4569.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4569.json
index f54bdd82d81..c087605d466 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4569.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4569.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-4569",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-28T22:15:10.487",
- "lastModified": "2023-09-10T12:16:21.120",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-23T22:15:09.347",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause a double-deactivations of catchall elements, which results in a memory leak."
+ "value": "A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json
index 2ad8d3ab048..d2140fc3cd4 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-4571",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:11.080",
- "lastModified": "2023-10-04T16:15:10.330",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-25T18:17:41.333",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "In Splunk IT Service Intelligence (ITSI) versions below below 4.13.3, 4.15.3, or 4.17.1, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed. \n\nThe vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine."
+ "value": "In Splunk IT Service Intelligence (ITSI) versions below 4.13.3 or 4.15.3, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed. \n\nThe vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4585.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4585.json
index fb072c181f7..7f28bc27734 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4585.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4585.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4585",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-09-11T09:15:09.797",
- "lastModified": "2023-09-14T03:45:17.523",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:41.407",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2."
+ },
+ {
+ "lang": "es",
+ "value": "Errores de seguridad de la memoria presentes en Firefox 116, Firefox ESR 115.1 y Thunderbird 115.1. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 117, Firefox ESR < 115.2 y Thunderbird < 115.2."
}
],
"metrics": {
@@ -78,11 +82,8 @@
],
"references": [
{
- "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1751583%2C1833504%2C1841082%2C1847904%2C1848999",
- "source": "security@mozilla.org",
- "tags": [
- "Broken Link"
- ]
+ "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999",
+ "source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2023-34/",
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4586.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4586.json
index 83fd20cf223..b62525312db 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4586.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4586.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4586",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-04T11:15:10.500",
- "lastModified": "2023-10-10T13:29:19.913",
+ "lastModified": "2023-10-23T18:57:20.287",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -81,8 +81,8 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1.0",
- "versionEndIncluding": "4.1.99",
- "matchCriteriaId": "342C96A6-D28A-4399-B66F-095707438E09"
+ "versionEndExcluding": "5.0.0",
+ "matchCriteriaId": "4F93D131-069E-463E-9963-64045FBBA200"
}
]
}
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4598.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4598.json
new file mode 100644
index 00000000000..8dbb5a5341d
--- /dev/null
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4598.json
@@ -0,0 +1,125 @@
+{
+ "id": "CVE-2023-4598",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:15.933",
+ "lastModified": "2023-10-27T17:23:42.593",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Slimstat Analytics plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 5.0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Slimstat Analytics para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del shortcode del complemento en versiones hasta la 5.0.9 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wp-slimstat:slimstat_analytics:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "5.0.10",
+ "matchCriteriaId": "82A0607D-04BD-4B9A-B72B-96C8141B4265"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-slimstat/tags/5.0.8/admin/view/wp-slimstat-db.php#L970",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2959452%40wp-slimstat&new=2959452%40wp-slimstat&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/07c0f5a5-3455-4f06-b481-f4d678309c50?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46003.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46003.json
new file mode 100644
index 00000000000..2bfc7dd1481
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46003.json
@@ -0,0 +1,96 @@
+{
+ "id": "CVE-2023-46003",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-21T01:15:08.093",
+ "lastModified": "2023-10-28T03:28:25.170",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "I-doit pro 25 and below is vulnerable to Cross Site Scripting (XSS) via index.php."
+ },
+ {
+ "lang": "es",
+ "value": "I-doit pro 25 y versiones anteriores son vulnerables a Cross Site Scripting (XSS) a trav\u00e9s de index.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:i-doit:i-doit:*:*:*:*:pro:*:*:*",
+ "versionEndIncluding": "25",
+ "matchCriteriaId": "29ACB05B-F001-4365-B125-526E4D4554A6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/leekenghwa/CVE-2023-46003",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://medium.com/@ray.999/stored-xss-in-i-doit-pro-25-and-below-cve-2023-46003-17fb8d6fe2e9",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.i-doit.com/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46004.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46004.json
new file mode 100644
index 00000000000..8b8d80573e4
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46004.json
@@ -0,0 +1,79 @@
+{
+ "id": "CVE-2023-46004",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T13:15:09.553",
+ "lastModified": "2023-10-25T01:23:59.683",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sourcecodester Best Courier Management System 1.0 is vulnerable to Arbitrary file upload in the update_user function."
+ },
+ {
+ "lang": "es",
+ "value": "Sourcecodester Best Courier Management System 1.0 es vulnerable a la carga arbitraria de archivos en la funci\u00f3n update_user."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mayurik:best_courier_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D0B90AE-6DFA-40B1-A97C-B445F29F3EB3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/Arbitrary-File-Upload-Vulnerability.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46005.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46005.json
new file mode 100644
index 00000000000..84b9b47ae38
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46005.json
@@ -0,0 +1,79 @@
+{
+ "id": "CVE-2023-46005",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T13:15:09.607",
+ "lastModified": "2023-10-25T01:27:12.410",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sourcecodester Best Courier Management System 1.0 is vulnerable to SQL Injection via the parameter id in /edit_branch.php."
+ },
+ {
+ "lang": "es",
+ "value": "Sourcecodester Best Courier Management System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en /edit_branch.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mayurik:best_courier_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D0B90AE-6DFA-40B1-A97C-B445F29F3EB3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46006.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46006.json
new file mode 100644
index 00000000000..9d5ef323057
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46006.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-46006",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T13:15:09.657",
+ "lastModified": "2023-10-25T01:27:03.580",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sourcecodester Best Courier Management System 1.0 is vulnerable to SQL Injection via the parameter id in /edit_user.php."
+ },
+ {
+ "lang": "es",
+ "value": "Sourcecodester Best Courier Management System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en /edit_user.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mayurik:best_courier_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D0B90AE-6DFA-40B1-A97C-B445F29F3EB3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-2.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46007.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46007.json
new file mode 100644
index 00000000000..6eee7545830
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46007.json
@@ -0,0 +1,79 @@
+{
+ "id": "CVE-2023-46007",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T13:15:09.703",
+ "lastModified": "2023-10-25T01:26:56.807",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sourcecodester Best Courier Management System 1.0 is vulnerable to SQL Injection via the parameter id in /edit_staff.php."
+ },
+ {
+ "lang": "es",
+ "value": "Sourcecodester Best Courier Management System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro id en /edit_staff.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mayurik:best_courier_management_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "6D0B90AE-6DFA-40B1-A97C-B445F29F3EB3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-3.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46009.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46009.json
new file mode 100644
index 00000000000..ea1869c2a91
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46009.json
@@ -0,0 +1,82 @@
+{
+ "id": "CVE-2023-46009",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-18T16:15:08.900",
+ "lastModified": "2023-10-25T01:25:00.963",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "gifsicle-1.94 was found to have a floating point exception (FPE) vulnerability via resize_stream at src/xform.c."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que gifsicle-1.94 ten\u00eda una vulnerabilidad de Floating Point Exception (FPE) a trav\u00e9s de resize_stream en src/xform.c."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-697"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:lcdf:gifsicle:1.94:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0E1FA5C7-B009-4B15-91A5-44CA8585663C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/kohler/gifsicle/issues/196",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46010.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46010.json
new file mode 100644
index 00000000000..2cf347eb4cb
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46010.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46010",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:35.657",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in SeaCMS v.12.9 allows an attacker to execute arbitrary commands via the admin_safe.php component."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en SeaCMS v.12.9 permite a un atacante ejecutar comandos arbitrarios a trav\u00e9s del componente admin_safe.php."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://seacms.com",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://blog.csdn.net/DGS666/article/details/133795200?spm=1001.2014.3001.5501",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46033.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46033.json
new file mode 100644
index 00000000000..e64b5f18f6f
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46033.json
@@ -0,0 +1,132 @@
+{
+ "id": "CVE-2023-46033",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T16:15:09.237",
+ "lastModified": "2023-10-27T21:52:46.687",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** UNSUPPORTED WHEN ASSIGNED ** D-Link (Non-US) DSL-2750U N300 ADSL2+ and (Non-US) DSL-2730U N150 ADSL2+ are vulnerable to Incorrect Access Control. The UART/Serial interface on the PCB, provides log output and a root terminal without proper access control."
+ },
+ {
+ "lang": "es",
+ "value": "** NO COMPATIBLE CUANDO EST\u00c1 ASIGNADO ** D-Link (Non-US) DSL-2750U N300 ADSL2+ y (Non-US) DSL-2730U N150 ADSL2+ son vulnerables a un control de acceso incorrecto. La interfaz UART/Serial en la PCB proporciona salida de registro y un terminal root sin control de acceso adecuado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "PHYSICAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:dsl-2730u_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46F8884A-C08D-45AE-8404-E5861D0948E0"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:dsl-2730u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "57EAA6ED-2686-4C92-A438-C58AFF75CC50"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:dlink:dsl-2750u_firmware:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CD29C95B-F465-460E-B807-006A9ADBABDF"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:dlink:dsl-2750u:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E5A7A48A-C126-4EF2-91F8-A8D9987525FF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10357",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.dlink.com/en/products/dsl-2730u-wireless-n150-adsl2-router",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.dlink.com/en/products/dsl-2750u-wireless-n-300-adsl2-modem-router",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46042.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46042.json
new file mode 100644
index 00000000000..08577b04d2f
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46042.json
@@ -0,0 +1,79 @@
+{
+ "id": "CVE-2023-46042",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T15:15:09.917",
+ "lastModified": "2023-10-25T15:20:17.570",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in GetSimpleCMS v.3.4.0a allows a remote attacker to execute arbitrary code via a crafted payload to the phpinfo()."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en GetSimpleCMS v.3.4.0a permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en phpinfo()."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:get-simple:getsimplecms:3.4.0a:*:*:*:*:*:*:*",
+ "matchCriteriaId": "BCE85121-C55E-4280-88D8-F0B53CBDCA75"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/Num-Nine/CVE/wiki/A-file-write-vulnerability-exists-in-GetSimpleCMS",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46054.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46054.json
new file mode 100644
index 00000000000..bf584cf2879
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46054.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-46054",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-21T07:15:07.690",
+ "lastModified": "2023-10-27T19:35:22.627",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting (XSS) vulnerability in WBCE CMS v.1.6.1 and before allows a remote attacker to escalate privileges via a crafted script to the website_footer parameter in the admin/settings/save.php component."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en WBCE CMS v.1.6.1 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de un script manipulado al par\u00e1metro website_footer en el componente admin/settings/save.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "1.6.1",
+ "matchCriteriaId": "FA98EFBF-09A2-455C-A6B1-F409515A05AC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/aaanz/aaanz.github.io/blob/master/XSS.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46055.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46055.json
new file mode 100644
index 00000000000..5cc335512f8
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46055.json
@@ -0,0 +1,80 @@
+{
+ "id": "CVE-2023-46055",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-21T07:15:07.933",
+ "lastModified": "2023-10-28T03:35:48.520",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in ThingNario Photon v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted script to the ping function to the \"thingnario Logger Maintenance Webpage\" endpoint."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en ThingNario Photon v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y escalar privilegios a trav\u00e9s de un script manipulado a la funci\u00f3n de ping al endpoint \"thingnario Logger Maintenance Webpage\"."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:thingnario:photon:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B82C5564-0B9B-4A17-8A23-0D048B86844F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://gist.github.com/GroundCTL2MajorTom/eef0d55f5df77cc911d84392acdbf625",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46058.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46058.json
new file mode 100644
index 00000000000..c2b5501e51d
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46058.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46058",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-24T00:15:08.773",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting (XSS) vulnerability in Geeklog-Core geeklog v.2.2.2 allows a remote attacker to execute arbitrary code via a crafted payload to the grp_desc parameter of the admin/group.php component."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en Geeklog-Core geeklog v.2.2.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado en el par\u00e1metro grp_desc del componente admin/group.php."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/Stored_XSS_in_group.php.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46059.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46059.json
new file mode 100644
index 00000000000..43152d0e151
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46059.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46059",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-24T00:15:08.823",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting (XSS) vulnerability in Geeklog-Core geeklog v.2.2.2 allows a remote attacker to execute arbitrary code via a crafted payload to the Service, and website URL to Ping parameters of the admin/trackback.php component."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en Geeklog-Core geeklog v.2.2.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el Servicio y la URL del sitio web para los par\u00e1metros de Ping del componente admin/trackback.php."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/reflected_XSS_in_editservice.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46066.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46066.json
index 55eb1a0c808..13590b134c8 100644
--- a/CVE-2023/CVE-2023-460xx/CVE-2023-46066.json
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46066.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-46066",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T12:15:10.300",
- "lastModified": "2023-10-16T14:01:11.953",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T18:39:24.183",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Codedrafty Mediabay \u2013 Media Library Folders plugin <=\u00a01.6 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Codedrafty Mediabay \u2013 Media Library Folders en versiones <= 1.6."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:codedraft:mediabay_-_wordpress_media_library_folders:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.6",
+ "matchCriteriaId": "139DC451-0189-415C-9BBA-B04AEF535769"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mediabay-lite/wordpress-mediabay-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46067.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46067.json
new file mode 100644
index 00000000000..eaec6c6b138
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46067.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-46067",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-21T21:15:08.017",
+ "lastModified": "2023-10-27T19:33:46.597",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Qwerty23 Rocket Font plugin <=\u00a01.2.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Qwerty23 Rocket Font en versiones <= 1.2.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:qwerty23:rocket_font:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.2.3",
+ "matchCriteriaId": "98E4F90F-598C-47C5-BBFD-061582B7AD67"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/rocket-font/wordpress-rocket-font-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46068.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46068.json
new file mode 100644
index 00000000000..d5457130394
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46068.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46068",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:35.707",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in XQueue GmbH Maileon for WordPress plugin <=\u00a02.16.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento XQueue GmbH Maileon para WordPress en versiones <= 2.16.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/xqueue-maileon/wordpress-maileon-plugin-2-16-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46069.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46069.json
new file mode 100644
index 00000000000..2d537ddd320
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46069.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46069",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:35.787",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Osmansorkar Ajax Archive Calendar plugin <=\u00a02.6.7 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento Osmansorkar Ajax Archive Calendar en versiones <= 2.6.7."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/ajax-archive-calendar/wordpress-ajax-archive-calendar-plugin-2-6-7-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46070.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46070.json
new file mode 100644
index 00000000000..7e1d17ad8f6
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46070.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46070",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:35.860",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Emmanuel GEORJON EG-Attachments plugin <=\u00a02.1.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Emmanuel GEORJON EG-Attachments en versiones <= 2.1.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/eg-attachments/wordpress-eg-attachments-plugin-2-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46071.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46071.json
new file mode 100644
index 00000000000..80a4ba43889
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46071.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46071",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:35.950",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ClickDatos Protecci\u00f3n de Datos RGPD plugin <=\u00a03.1.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento ClickDatos Protecci\u00f3n de Datos RGPD en versiones <= 3.1.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/click-datos-lopd/wordpress-proteccion-de-datos-rgpd-plugin-3-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46072.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46072.json
new file mode 100644
index 00000000000..6c08ca78078
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46072.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46072",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T12:15:08.613",
+ "lastModified": "2023-10-26T12:58:59.800",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Michael Simpson Add Shortcodes Actions And Filters plugin <=\u00a02.0.9 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada no autenticada en el complemento in Michael Simpson Add Shortcodes Actions And Filters en versiones <= 2.0.9."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/add-actions-and-filters/wordpress-add-shortcodes-actions-and-filters-plugin-2-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46074.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46074.json
new file mode 100644
index 00000000000..d5ae996602e
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46074.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46074",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T12:15:08.687",
+ "lastModified": "2023-10-26T12:58:59.800",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Borbis Media FreshMail For WordPress plugin <=\u00a02.3.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada no autenticada en el complemento Borbis Media FreshMail para WordPress en versiones <= 2.3.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/freshmail-integration/wordpress-freshmail-for-wordpress-plugin-2-3-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46075.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46075.json
new file mode 100644
index 00000000000..94caebb1040
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46075.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46075",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T13:15:09.510",
+ "lastModified": "2023-10-26T15:32:27.440",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in wpdevart Contact Form Builder, Contact Widget plugin <=\u00a02.1.6 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada no autenticada en el complemento wpdevart Contact Form Builder, Contact Widget en versiones <= 2.1.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/contact-forms-builder/wordpress-contact-form-builder-contact-widget-plugin-2-1-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46076.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46076.json
new file mode 100644
index 00000000000..80d68680e13
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46076.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46076",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T13:15:09.593",
+ "lastModified": "2023-10-26T15:32:27.440",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in RedNao WooCommerce PDF Invoice Builder, Create invoices, packing slips and more plugin <=\u00a01.2.102 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada no autenticada el complemento WooCommerce PDF Invoice Builder, Create invoices, packing slips and more en versiones <= 1.2.102."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/woo-pdf-invoice-builder/wordpress-woocommerce-pdf-invoice-builder-plugin-1-2-100-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46077.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46077.json
new file mode 100644
index 00000000000..1beaeeab6b5
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46077.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46077",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T13:15:09.667",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Arrow Plugins The Awesome Feed \u2013 Custom Feed plugin <=\u00a02.2.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada no autenticada en los complementos Arrow en el complemento The Awesome Feed \u2013 Custom Feed en versiones <= 2.2.5."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wp-facebook-feed/wordpress-the-awesome-feed-custom-feed-plugin-2-2-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46078.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46078.json
new file mode 100644
index 00000000000..0f87aeb74d1
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46078.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-46078",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-21T22:15:08.617",
+ "lastModified": "2023-10-27T19:33:21.057",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in PluginEver WC Serial Numbers plugin <=\u00a01.6.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento PluginEver WC Serial Numbers en versiones <= 1.6.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginever:wc_serial_numbers:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.6.3",
+ "matchCriteriaId": "7556F3B8-BD47-4535-B218-6A64973C6765"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wc-serial-numbers/wordpress-serial-numbers-for-woocommerce-license-manager-plugin-1-6-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46081.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46081.json
new file mode 100644
index 00000000000..57ce7c7e89a
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46081.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46081",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T13:15:09.747",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Lavacode Lava Directory Manager plugin <=\u00a01.1.34 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada no autenticada en el complemento Lavacode Lava Directory Manager en versiones <= 1.1.34."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/lava-directory-manager/wordpress-lava-directory-manager-plugin-1-1-34-unauth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46085.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46085.json
new file mode 100644
index 00000000000..ee5b7be0c9c
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46085.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46085",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-22T22:15:08.547",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wpmet Wp Ultimate Review plugin <=\u00a02.2.4 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Wpmet Wp Ultimate Review en versiones <= 2.2.4."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wp-ultimate-review/wordpress-wp-ultimate-review-plugin-2-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46087.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46087.json
index bc9d397f455..1193589edf7 100644
--- a/CVE-2023/CVE-2023-460xx/CVE-2023-46087.json
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46087.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-46087",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-16T15:15:17.690",
- "lastModified": "2023-10-16T18:33:43.730",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:16:43.900",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
{
"source": "audit@patchstack.com",
"type": "Secondary",
@@ -50,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mahlamusa:who_hit_the_page_hit_counter:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.4.14.3",
+ "matchCriteriaId": "C427B527-AC3B-48F0-8918-AA49BF0BB000"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/who-hit-the-page-hit-counter/wordpress-who-hit-the-page-hit-counter-plugin-1-4-14-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
- "source": "audit@patchstack.com"
+ "source": "audit@patchstack.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46088.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46088.json
new file mode 100644
index 00000000000..13b32948534
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46088.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46088",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T13:15:09.823",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Mammothology WP Full Stripe Free plugin <=\u00a01.6.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenada autenticada (con permisos de admin o superior) en el complemento Mammothology WP Full Stripe Free en versiones <= 1.6.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wp-full-stripe-free/wordpress-wp-full-stripe-free-plugin-1-6-1-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46089.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46089.json
new file mode 100644
index 00000000000..5b54d9eccb1
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46089.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46089",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-22T22:15:08.637",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Lee Le @ Userback Userback plugin <=\u00a01.0.13 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Lee Le @ Userback Userback en versiones <= 1.0.13."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/userback/wordpress-userback-plugin-1-0-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46090.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46090.json
new file mode 100644
index 00000000000..c96b34282be
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46090.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46090",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T14:15:08.780",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WebDorado WDSocialWidgets plugin <=\u00a01.0.15 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada no autenticada en el complemento WebDorado WDSocialWidgets en versiones <= 1.0.15."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/spider-facebook/wordpress-wdsocialwidgets-plugin-1-0-15-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46091.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46091.json
new file mode 100644
index 00000000000..7bdab143439
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46091.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46091",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T08:15:31.273",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bala Krishna, Sergey Yakovlev Category SEO Meta Tags plugin <=\u00a02.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Bala Krishna, Sergey Yakovlev Category SEO Meta Tags en versiones <= 2.5."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/category-seo-meta-tags/wordpress-category-seo-meta-tags-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46093.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46093.json
new file mode 100644
index 00000000000..3335a020c34
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46093.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46093",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T08:15:31.377",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in LionScripts.Com Webmaster Tools plugin <=\u00a02.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento LionScripts.Com Webmaster Tools en versiones <= 2.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/webmaster-tools/wordpress-webmaster-tools-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46094.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46094.json
new file mode 100644
index 00000000000..5da16335f02
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46094.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46094",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-26T13:15:09.903",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Conversios Track Google Analytics 4, Facebook Pixel & Conversions API via Google Tag Manager for WooCommerce plugin <=\u00a06.5.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada no autenticada en el complemento Conversios Track Google Analytics 4, Facebook Pixel & Conversions API a trav\u00e9s de Google Tag Manager para WooCommerce en versiones <= 6.5.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/enhanced-e-commerce-for-woocommerce-store/wordpress-conversios-io-plugin-6-5-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46095.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46095.json
new file mode 100644
index 00000000000..866412c571d
--- /dev/null
+++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46095.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46095",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-22T22:15:08.707",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Chetan Gole Smooth Scroll Links [SSL] plugin <=\u00a01.1.0 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Chetan Gole Smooth Scroll Links [SSL] en versiones <= 1.1.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/smooth-scrolling-links-ssl/wordpress-smooth-scroll-links-ssl-plugin-1-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46102.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46102.json
new file mode 100644
index 00000000000..8380de9fd8f
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46102.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46102",
+ "sourceIdentifier": "psirt@bosch.com",
+ "published": "2023-10-25T18:17:36.033",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Android Client application, when enrolled to the AppHub server, connects to an MQTT\r\nbroker to exchange messages and receive commands to execute on the HMI device.\r\nThe protocol builds on top of MQTT to implement the remote management of the device is encrypted with a hard-coded DES symmetric key, that can be retrieved reversing both the Android Client application and the server-side web application.\r\n\r\n\r\nThis issue allows an attacker able to control a malicious MQTT broker on the same subnet\r\nnetwork of the device, to craft malicious messages and send them to the HMI device, executing arbitrary commands on the device itself."
+ },
+ {
+ "lang": "es",
+ "value": "La aplicaci\u00f3n Cliente de Android, cuando se inscribe en el servidor AppHub, se conecta a un intermediario MQTT para intercambiar mensajes y recibir comandos para ejecutar en el dispositivo HMI. El protocolo se basa en MQTT para implementar la administraci\u00f3n remota del dispositivo y est\u00e1 cifrado con una clave sim\u00e9trica DES codificada, que se puede recuperar invirtiendo tanto la aplicaci\u00f3n cliente de Android como la aplicaci\u00f3n web del lado del servidor. Este problema permite a un atacante capaz de controlar un agente MQTT malicioso en la misma red de subred del dispositivo, crear mensajes maliciosos y enviarlos al dispositivo HMI, ejecutando comandos arbitrarios en el propio dispositivo."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@bosch.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-798"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html",
+ "source": "psirt@bosch.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46115.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46115.json
new file mode 100644
index 00000000000..162149c4bbf
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46115.json
@@ -0,0 +1,196 @@
+{
+ "id": "CVE-2023-46115",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-20T00:15:16.920",
+ "lastModified": "2023-10-26T17:59:29.077",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Tauri is a framework for building binaries for all major desktop platforms. This advisory is not describing a vulnerability in the Tauri code base itself but a commonly used misconfiguration which could lead to leaking of the private key and updater key password into bundled Tauri applications using the Vite frontend in a specific configuration. The Tauri documentation used an insecure example configuration in the `Vite guide` to showcase how to use Tauri together with Vite. Copying the following snippet `envPrefix: ['VITE_', 'TAURI_'],` from this guide into the `vite.config.ts` of a Tauri project leads to bundling the `TAURI_PRIVATE_KEY` and `TAURI_KEY_PASSWORD` into the Vite frontend code and therefore leaking this value to the released Tauri application. Using the `envPrefix: ['VITE_'],` or any other framework than Vite means you are not impacted by this advisory. Users are advised to rotate their updater private key if they are affected by this (requires Tauri CLI >=1.5.5). After updating the envPrefix configuration, generate a new private key with `tauri signer generate`, saving the new private key and updating the updater's `pubkey` value on `tauri.conf.json` with the new public key. To update your existing application, the next application build must be signed with the older private key in order to be accepted by the existing application."
+ },
+ {
+ "lang": "es",
+ "value": "Tauri es un framework para crear archivos binarios para las principales plataformas de escritorio. Este aviso no describe una vulnerabilidad en el c\u00f3digo base de Tauri en s\u00ed, sino una configuraci\u00f3n incorrecta de uso com\u00fan que podr\u00eda provocar la filtraci\u00f3n de la clave privada y la contrase\u00f1a de la clave de actualizaci\u00f3n en aplicaciones Tauri empaquetadas que utilizan la interfaz Vite en una configuraci\u00f3n espec\u00edfica. La documentaci\u00f3n de Tauri utiliz\u00f3 una configuraci\u00f3n de ejemplo insegura en \"Vite guide\" para mostrar c\u00f3mo usar Tauri junto con Vite. Copiar el siguiente fragmento `envPrefix: ['VITE_', 'TAURI_'],` de esta gu\u00eda en `vite.config.ts` de un proyecto Tauri lleva a agrupar `TAURI_PRIVATE_KEY` y `TAURI_KEY_PASSWORD` en el c\u00f3digo de interfaz de Vite y por lo tanto filtrar este valor a la aplicaci\u00f3n Tauri lanzada. El uso de `envPrefix: ['VITE_'],` o cualquier otro marco que no sea Vite significa que este aviso no lo afecta. Se recomienda a los usuarios que roten su clave privada de actualizaci\u00f3n si se ven afectados por esto (requiere Tauri CLI >=1.5.5). Despu\u00e9s de actualizar la configuraci\u00f3n de envPrefix, genere una nueva clave privada con `tauri signer generate`, guarde la nueva clave privada y actualice el valor `pubkey` del actualizador en `tauri.conf.json` con la nueva clave p\u00fablica. Para actualizar su aplicaci\u00f3n existente, la siguiente compilaci\u00f3n de la aplicaci\u00f3n debe firmarse con la clave privada anterior para que la aplicaci\u00f3n existente la acepte."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.0,
+ "impactScore": 5.8
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-522"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-522"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.0.0",
+ "matchCriteriaId": "E430B9A2-009E-472C-8332-F59AFCA75CE4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha0:*:*:*:*:*:*",
+ "matchCriteriaId": "83AB9A39-B228-4A04-BC9B-55CCEDF56453"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha10:*:*:*:*:*:*",
+ "matchCriteriaId": "243B9A11-1E18-40F2-AC37-C5670F13B0F1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha11:*:*:*:*:*:*",
+ "matchCriteriaId": "70FE95B8-4319-474C-8C9E-04120C69A801"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha12:*:*:*:*:*:*",
+ "matchCriteriaId": "3379B435-C9F9-41F6-AAD0-07EB1B5978BB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha13:*:*:*:*:*:*",
+ "matchCriteriaId": "CC75ED3D-4E54-436A-A104-CE5B463B6EA3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha14:*:*:*:*:*:*",
+ "matchCriteriaId": "A50E93D4-0E9A-464C-A3AC-54687A1FEA03"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha15:*:*:*:*:*:*",
+ "matchCriteriaId": "03DA148A-66DA-4475-B344-017BD02C80DA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha2:*:*:*:*:*:*",
+ "matchCriteriaId": "E79F38C9-2CDA-45D0-A952-4EA7B9D3BA4D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha3:*:*:*:*:*:*",
+ "matchCriteriaId": "FCD1D142-7233-454B-9406-8E50CCF3641E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha4:*:*:*:*:*:*",
+ "matchCriteriaId": "E23B6CAE-8CB0-435C-A47B-8B319D0FA3C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha5:*:*:*:*:*:*",
+ "matchCriteriaId": "29989D53-47A4-4A50-918B-B554A0E3C23C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha6:*:*:*:*:*:*",
+ "matchCriteriaId": "ED4E889F-9F87-4315-AFAC-91472A413291"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha7:*:*:*:*:*:*",
+ "matchCriteriaId": "F224BCC0-FEED-46BA-9786-4CD256782247"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha8:*:*:*:*:*:*",
+ "matchCriteriaId": "44962758-55B7-4CDB-B32D-CD37C1481B38"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tauri:tauri:2.0.0:alpha9:*:*:*:*:*:*",
+ "matchCriteriaId": "C8F7749F-AD30-4B90-ACEE-B93CDA3D56D2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/tauri-apps/tauri/security/advisories/GHSA-2rcp-jvr4-r259",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ },
+ {
+ "url": "https://tauri.app/v1/guides/getting-started/setup/vite/",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46117.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46117.json
new file mode 100644
index 00000000000..3e35778e10b
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46117.json
@@ -0,0 +1,119 @@
+{
+ "id": "CVE-2023-46117",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-20T19:15:09.037",
+ "lastModified": "2023-10-28T03:48:19.117",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities. A vulnerability has been identified in reconftw where inadequate validation of retrieved subdomains may lead to a Remote Code Execution (RCE) attack. An attacker can exploit this vulnerability by crafting a malicious CSP entry on it's own domain. Successful exploitation can lead to the execution of arbitrary code within the context of the application, potentially compromising the system. This issue has been addressed in version 2.7.1.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "reconFTW es una herramienta dise\u00f1ada para realizar un reconocimiento automatizado en un dominio de destino ejecutando el mejor conjunto de herramientas para realizar escaneos y descubrir vulnerabilidades. Se ha identificado una vulnerabilidad en reconftw donde la validaci\u00f3n inadecuada de los subdominios recuperados puede provocar un ataque de Remote Code Execution (RCE). Un atacante puede aprovechar esta vulnerabilidad creando una entrada CSP maliciosa en su propio dominio. Una explotaci\u00f3n exitosa puede conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario dentro del contexto de la aplicaci\u00f3n, comprometiendo potencialmente el sistema. Este problema se solucion\u00f3 en la versi\u00f3n 2.7.1.1 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:six2dez:reconftw:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.7.1.1",
+ "matchCriteriaId": "2668F9CE-3520-490A-8F35-197666112516"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/six2dez/reconftw/commit/e639de356c0880fe5fe01a32de9d0c58afb5f086",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/six2dez/reconftw/security/advisories/GHSA-fxwr-vr9x-wvjp",
+ "source": "security-advisories@github.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46118.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46118.json
new file mode 100644
index 00000000000..8833f6e7978
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46118.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46118",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:36.117",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an \"out-of-memory killer\"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7."
+ },
+ {
+ "lang": "es",
+ "value": "RabbitMQ es un corredor de transmisi\u00f3n y mensajer\u00eda multiprotocolo. La API HTTP no aplicaba un l\u00edmite de cuerpo de solicitud HTTP, lo que la hac\u00eda vulnerable a ataques de denegaci\u00f3n de servicio (DoS) con mensajes muy grandes. Un usuario autenticado con credenciales suficientes puede publicar mensajes muy grandes a trav\u00e9s de la API HTTP y hacer que el nodo de destino finalice mediante un mecanismo similar al \"eliminador de memoria insuficiente\". Esta vulnerabilidad ha sido parcheada en las versiones 3.11.24 y 3.12.7."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46119.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46119.json
new file mode 100644
index 00000000000..9a74504c528
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46119.json
@@ -0,0 +1,75 @@
+{
+ "id": "CVE-2023-46119",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:36.183",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Parse Server crashes when uploading a file without extension. This vulnerability has been patched in versions 5.5.6 and 6.3.1.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Parse Server es un backend de c\u00f3digo abierto que se puede implementar en cualquier infraestructura que pueda ejecutar Node.js. Parse Server falla al cargar un archivo sin extensi\u00f3n. Esta vulnerabilidad ha sido parcheada en las versiones 5.5.6 y 6.3.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-23"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/parse-community/parse-server/commit/686a9f282dc23c31beab3d93e6d21ccd0e1328fe",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/parse-community/parse-server/commit/fd86278919556d3682e7e2c856dfccd5beffbfc0",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/parse-community/parse-server/releases/tag/5.5.6",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/parse-community/parse-server/releases/tag/6.3.1",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-792q-q67h-w579",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46120.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46120.json
new file mode 100644
index 00000000000..49cb95180a4
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46120.json
@@ -0,0 +1,71 @@
+{
+ "id": "CVE-2023-46120",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:36.257",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The RabbitMQ Java client library allows Java and JVM-based applications to connect to and interact with RabbitMQ nodes. `maxBodyLebgth` was not used when receiving Message objects. Attackers could send a very large Message causing a memory overflow and triggering an OOM Error. Users of RabbitMQ may suffer from DoS attacks from RabbitMQ Java client which will ultimately exhaust the memory of the consumer. This vulnerability was patched in version 5.18.0."
+ },
+ {
+ "lang": "es",
+ "value": "La librer\u00eda cliente Java RabbitMQ permite que las aplicaciones basadas en Java y JVM se conecten e interact\u00faen con los nodos RabbitMQ. `maxBodyLebgth` no se us\u00f3 al recibir objetos de mensaje. Los atacantes podr\u00edan enviar un mensaje muy grande provocando un desbordamiento de la memoria y desencadenando un error OOM. Los usuarios de RabbitMQ pueden sufrir ataques DoS del cliente Java RabbitMQ que, en \u00faltima instancia, agotar\u00e1n la memoria del consumidor. Esta vulnerabilidad fue parcheada en la versi\u00f3n 5.18.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/rabbitmq/rabbitmq-java-client/commit/714aae602dcae6cb4b53cadf009323ebac313cc8",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/rabbitmq/rabbitmq-java-client/issues/1062",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/rabbitmq/rabbitmq-java-client/releases/tag/v5.18.0",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46122.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46122.json
new file mode 100644
index 00000000000..ccd03ad041d
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46122.json
@@ -0,0 +1,71 @@
+{
+ "id": "CVE-2023-46122",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-23T16:15:09.383",
+ "lastModified": "2023-10-23T18:18:33.750",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "sbt is a build tool for Scala, Java, and others. Given a specially crafted zip or JAR file, `IO.unzip` allows writing of arbitrary file. This would have potential to overwrite `/root/.ssh/authorized_keys`. Within sbt's main code, `IO.unzip` is used in `pullRemoteCache` task and `Resolvers.remote`; however many projects use `IO.unzip(...)` directly to implement custom tasks. This vulnerability has been patched in version 1.9.7."
+ },
+ {
+ "lang": "es",
+ "value": "sbt es una herramienta de compilaci\u00f3n para Scala, Java y otros. Dado un archivo zip o JAR especialmente manipulado, `IO.unzip` permite escribir archivos arbitrarios. Esto tendr\u00eda potencial para sobrescribir `/root/.ssh/authorized_keys`. Dentro del c\u00f3digo principal de sbt, `IO.unzip` se usa en la tarea `pullRemoteCache` y `Resolvers.remote`; sin embargo, muchos proyectos utilizan `IO.unzip(...)` directamente para implementar tareas personalizadas. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 1.9.7."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 3.9,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/sbt/io/commit/124538348db0713c80793cb57b915f97ec13188a",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/sbt/io/issues/358",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/sbt/io/pull/360",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/sbt/sbt/security/advisories/GHSA-h9mw-grgx-2fhf",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46123.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46123.json
new file mode 100644
index 00000000000..2ef4d043291
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46123.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-46123",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:36.330",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "jumpserver es una m\u00e1quina basti\u00f3n de c\u00f3digo abierto, un sistema profesional de auditor\u00eda de seguridad de operaci\u00f3n y mantenimiento que cumple con las especificaciones 4A. Una falla en la API principal permite a los atacantes eludir las protecciones de fuerza bruta de las contrase\u00f1as falsificando direcciones IP arbitrarias. Al explotar esta vulnerabilidad, los atacantes pueden realizar intentos ilimitados de contrase\u00f1a alterando su direcci\u00f3n IP aparente para cada solicitud. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 3.8.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-307"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/jumpserver/jumpserver/releases/tag/v3.8.0",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-hvw4-766m-p89f",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46124.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46124.json
new file mode 100644
index 00000000000..43417a0bd21
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46124.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46124",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:36.400",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in runtime environments, and the enforcement of privacy regulations in code. The Fides web application allows a custom integration to be uploaded as a ZIP file containing configuration and dataset definitions in YAML format. It was discovered that specially crafted YAML dataset and config files allow a malicious user to perform arbitrary requests to internal systems and exfiltrate data outside the environment (also known as a Server-Side Request Forgery). The application does not perform proper validation to block attempts to connect to internal (including localhost) resources. The vulnerability has been patched in Fides version `2.22.1`. "
+ },
+ {
+ "lang": "es",
+ "value": "Fides es una plataforma de ingenier\u00eda de privacidad de c\u00f3digo abierto para gestionar el cumplimiento de solicitudes de privacidad de datos en entornos de ejecuci\u00f3n y la aplicaci\u00f3n de regulaciones de privacidad en c\u00f3digo. La aplicaci\u00f3n web de Fides permite cargar una integraci\u00f3n personalizada como un archivo ZIP que contiene definiciones de configuraci\u00f3n y conjuntos de datos en formato YAML. Se descubri\u00f3 que el conjunto de datos y los archivos de configuraci\u00f3n YAML especialmente manipulados permiten a un usuario malintencionado realizar solicitudes arbitrarias a sistemas internos y extraer datos fuera del entorno (tambi\u00e9n conocido como Server-Side Request Forgery). La aplicaci\u00f3n no realiza una validaci\u00f3n adecuada para bloquear los intentos de conectarse a recursos internos (incluido el host local). La vulnerabilidad ha sido parcheada en la versi\u00f3n `2.22.1` de Fides."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 5.3
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/ethyca/fides/commit/cd344d016b1441662a61d0759e7913e8228ed1ee",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/ethyca/fides/releases/tag/2.22.1",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/ethyca/fides/security/advisories/GHSA-jq3w-9mgf-43m4",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46125.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46125.json
new file mode 100644
index 00000000000..979c49dc6f3
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46125.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46125",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:36.470",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in a runtime environment, and the enforcement of privacy regulations in code. The Fides webserver API allows users to retrieve its configuration using the `GET api/v1/config` endpoint. The configuration data is filtered to suppress most sensitive configuration information before it is returned to the user, but even the filtered data contains information about the internals and the backend infrastructure, such as various settings, servers\u2019 addresses and ports and database username. This information is useful for administrative users as well as attackers, thus it should not be revealed to low-privileged users. This vulnerability allows Admin UI users with roles lower than the owner role e.g. the viewer role to retrieve the config information using the API. The vulnerability has been patched in Fides version `2.22.1`. "
+ },
+ {
+ "lang": "es",
+ "value": "Fides es una plataforma de ingenier\u00eda de privacidad de c\u00f3digo abierto para gestionar el cumplimiento de solicitudes de privacidad de datos en un entorno de ejecuci\u00f3n y la aplicaci\u00f3n de regulaciones de privacidad en c\u00f3digo. La API del servidor web de Fides permite a los usuarios recuperar su configuraci\u00f3n utilizando el endpoint `GET api/v1/config`. Los datos de configuraci\u00f3n se filtran para suprimir la informaci\u00f3n de configuraci\u00f3n m\u00e1s confidencial antes de devolverla al usuario, pero incluso los datos filtrados contienen informaci\u00f3n sobre los componentes internos y la infraestructura de backend, como diversas configuraciones, direcciones y puertos de servidores y nombre de usuario de la base de datos. Esta informaci\u00f3n es \u00fatil tanto para usuarios administrativos como para atacantes, por lo que no debe revelarse a usuarios con pocos privilegios. Esta vulnerabilidad permite a los usuarios de la interfaz de usuario de administraci\u00f3n con roles inferiores al rol de propietario, por ejemplo, el rol de espectador, recuperar la informaci\u00f3n de configuraci\u00f3n mediante la API. La vulnerabilidad ha sido parcheada en la versi\u00f3n `2.22.1` de Fides."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/ethyca/fides/commit/c9f3a620a4b4c1916e0941cb5624dcd636f06d06",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/ethyca/fides/releases/tag/2.22.1",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/ethyca/fides/security/advisories/GHSA-rjxg-rpg3-9r89",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46126.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46126.json
new file mode 100644
index 00000000000..2f3a7b83d58
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46126.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46126",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:36.537",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in runtime environments, helping enforce privacy regulations in code. The Fides web application allows users to edit consent and privacy notices such as cookie banners. The vulnerability makes it possible to craft a payload in the privacy policy URL which triggers JavaScript execution when the privacy notice is served by an integrated website. The domain scope of the executed JavaScript is that of the integrated website. Exploitation is limited to Admin UI users with the contributor role or higher. The vulnerability has been patched in Fides version `2.22.1`. "
+ },
+ {
+ "lang": "es",
+ "value": "Fides es una plataforma de ingenier\u00eda de privacidad de c\u00f3digo abierto para gestionar el cumplimiento de solicitudes de privacidad de datos en entornos de ejecuci\u00f3n, ayudando a hacer cumplir las regulaciones de privacidad en el c\u00f3digo. La aplicaci\u00f3n web de Fides permite a los usuarios editar los avisos de consentimiento y privacidad, como los banners de cookies. La vulnerabilidad permite manipular un payload en la URL de la pol\u00edtica de privacidad que activa la ejecuci\u00f3n de JavaScript cuando el aviso de privacidad es entregado por un sitio web integrado. El alcance del dominio del JavaScript ejecutado es el del sitio web integrado. La explotaci\u00f3n est\u00e1 limitada a los usuarios de la interfaz de usuario de administrador con el rol de colaborador o superior. La vulnerabilidad ha sido parcheada en la versi\u00f3n `2.22.1` de Fides."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 3.9,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 0.5,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/ethyca/fides/commit/3231d19699f9c895c986f6a967a64d882769c506",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/ethyca/fides/releases/tag/2.22.1",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/ethyca/fides/security/advisories/GHSA-fgjj-5jmr-gh83",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46127.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46127.json
new file mode 100644
index 00000000000..b1131d5d4e4
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46127.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46127",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-23T15:15:09.313",
+ "lastModified": "2023-10-23T16:07:50.927",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Frappe is a full-stack web application framework that uses Python and MariaDB on the server side and an integrated client side library. A malicious Frappe user with desk access could create documents containing HTML payloads allowing HTML Injection. This vulnerability has been patched in version 14.49.0."
+ },
+ {
+ "lang": "es",
+ "value": "Frappe es un framework de aplicaci\u00f3n web completo que utiliza Python y MariaDB en el lado del servidor y una librer\u00eda integrada en el lado del cliente. Un usuario malicioso de Frappe con acceso al escritorio podr\u00eda crear documentos que contengan cargas HTML que permitan la inyecci\u00f3n de HTML. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 14.49.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/frappe/frappe/commit/3dc5d2fcc7561dde181ba953009fe6e39d64e900",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/frappe/frappe/pull/22339",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/frappe/frappe/security/advisories/GHSA-j2w9-8xrr-7g98",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46128.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46128.json
new file mode 100644
index 00000000000..787088c5c7b
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46128.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46128",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:36.607",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Nautobot is a Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. The passwords are not exposed in plaintext. This vulnerability has been patched in version 2.0.3.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Nautobot es una plataforma de automatizaci\u00f3n de redes construida como una aplicaci\u00f3n web sobre el framework Django Python con una base de datos PostgreSQL o MySQL. En Nautobot 2.0.x, ciertos endpoints de la API REST, en combinaci\u00f3n con el par\u00e1metro de consulta `? Depth=`, pueden exponer contrase\u00f1as de usuario con hash almacenadas en la base de datos a cualquier usuario autenticado con acceso a estos endpoints. Las contrase\u00f1as no est\u00e1n expuestas en texto plano. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 2.0.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/nautobot/nautobot/commit/1ce8e5c658a075c29554d517cd453675e5d40d71",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/nautobot/nautobot/pull/4692",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hw-74xv-4gqp",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46133.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46133.json
new file mode 100644
index 00000000000..6bff0096000
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46133.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46133",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T21:15:10.093",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "CryptoES is a cryptography algorithms library compatible with ES6 and TypeScript. Prior to version 2.1.0, CryptoES PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 2.1.0 contains a patch for this issue. As a workaround, configure CryptoES to use SHA256 with at least 250,000 iterations."
+ },
+ {
+ "lang": "es",
+ "value": "CryptoES es una librer\u00eda de algoritmos de criptograf\u00eda compatible con ES6 y TypeScript. Antes de la versi\u00f3n 2.1.0, CryptoES PBKDF2 es 1000 veces m\u00e1s d\u00e9bil de lo especificado originalmente en 1993, y al menos 1.300.000 veces m\u00e1s d\u00e9bil que el est\u00e1ndar actual de la industria. Esto se debe a que su valor predeterminado es SHA1, un algoritmo hash criptogr\u00e1fico considerado inseguro desde al menos 2005, y su valor predeterminado es una sola iteraci\u00f3n, un valor de \"fuerza\" o \"dificultad\" especificado en 1000 cuando se especific\u00f3 en 1993. PBKDF2 se basa en el recuento de iteraciones como una contramedida a los ataques de preimagen y colisi\u00f3n. Si se utiliza para proteger contrase\u00f1as, el impacto es alto. Si se utiliza para generar firmas, el impacto es alto. La versi\u00f3n 2.1.0 contiene un parche para este problema. Como workaround, configure CryptoES para usar SHA256 con al menos 250 000 iteraciones."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-328"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-916"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/entronad/crypto-es/commit/d506677fae3d03a454b37ad126e0c119d416b757",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/entronad/crypto-es/security/advisories/GHSA-mpj8-q39x-wq5h",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46134.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46134.json
new file mode 100644
index 00000000000..ff67cdc39dd
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46134.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-46134",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T21:15:10.167",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to version 3.7.0, users hosting D-Tale publicly can be vulnerable to remote code execution, allowing attackers to run malicious code on the server. This issue has been patched in version 3.7.0 by turning off \"Custom Filter\" input by default. The only workaround for versions earlier than 3.7.0 is to only host D-Tale to trusted users.\n"
+ },
+ {
+ "lang": "es",
+ "value": "D-Tale es la combinaci\u00f3n de un back-end de Flask y un front-end de React para ver y analizar las estructuras de datos de Pandas. Antes de la versi\u00f3n 3.7.0, los usuarios que alojaban D-Tale p\u00fablicamente pod\u00edan ser vulnerables a la ejecuci\u00f3n remota de c\u00f3digo, lo que permit\u00eda a los atacantes ejecutar c\u00f3digo malicioso en el servidor. Este problema se solucion\u00f3 en la versi\u00f3n 3.7.0 desactivando la entrada \"Filtro personalizado\" de forma predeterminada. El \u00fanico workaround para versiones anteriores a la 3.7.0 es alojar D-Tale \u00fanicamente para usuarios confiables."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/man-group/dtale/commit/bf8c54ab2490803f45f0652a9a0e221a94d39668",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/man-group/dtale/security/advisories/GHSA-jq6c-r9xf-qxjm",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46135.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46135.json
new file mode 100644
index 00000000000..2588becf547
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46135.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-46135",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:36.673",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "rs-stellar-strkey is a Rust lib for encode/decode of Stellar Strkeys. A panic vulnerability occurs when a specially crafted payload is used.`inner_payload_len` should not above 64. This vulnerability has been patched in version 0.0.8."
+ },
+ {
+ "lang": "es",
+ "value": "rs-stellar-strkey es una librer\u00eda de Rust para codificar/decodificar Stellar Strkeys. Se produce una vulnerabilidad de p\u00e1nico cuando se utiliza un payload especialmente manipulado. `inner_payload_len` no debe ser superior a 64. Esta vulnerabilidad se ha parcheado en la versi\u00f3n 0.0.8."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-248"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/stellar/rs-stellar-strkey/issues/58",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/stellar/rs-stellar-strkey/security/advisories/GHSA-5873-6fwq-463f",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46136.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46136.json
new file mode 100644
index 00000000000..406f99a825e
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46136.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46136",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T18:17:36.753",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1."
+ },
+ {
+ "lang": "es",
+ "value": "Werkzeug es una librer\u00eda completa de aplicaciones web WSGI. Si se carga un archivo que comienza con CR o LF y luego va seguido de megabytes de datos sin estos caracteres: todos estos bytes se agregan fragmento a fragmento en una matriz de bytes interna y la b\u00fasqueda de los l\u00edmites se realiza en un b\u00fafer en crecimiento. Esto permite a un atacante provocar una denegaci\u00f3n de servicio enviando datos multiparte manipulados a un endpoint que los analizar\u00e1. La cantidad de tiempo de CPU necesaria puede impedir que los procesos de trabajo manejen solicitudes leg\u00edtimas. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 3.0.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.0,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-400"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-407"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/pallets/werkzeug/commit/f3c803b3ade485a45f12b6d6617595350c0f03e2",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-hrfv-mqp8-q5rw",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46137.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46137.json
new file mode 100644
index 00000000000..4844abaf16e
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46137.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46137",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T21:15:10.237",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc1, when sending multiple HTTP requests in one TCP packet, twisted.web will process the requests asynchronously without guaranteeing the response order. If one of the endpoints is controlled by an attacker, the attacker can delay the response on purpose to manipulate the response of the second request when a victim launched two requests using HTTP pipeline. Version 23.10.0rc1 contains a patch for this issue."
+ },
+ {
+ "lang": "es",
+ "value": "Twisted es un framework basado en eventos para aplicaciones de Internet. Antes de la versi\u00f3n 23.10.0rc1, al enviar m\u00faltiples solicitudes HTTP en un paquete TCP, twisted.web procesar\u00e1 las solicitudes de forma asincr\u00f3nica sin garantizar el orden de respuesta. Si uno de los endpoints est\u00e1 controlado por un atacante, el atacante puede retrasar la respuesta a prop\u00f3sito para manipular la respuesta de la segunda solicitud cuando una v\u00edctima lanz\u00f3 dos solicitudes utilizando una canalizaci\u00f3n HTTP. La versi\u00f3n 23.10.0rc1 contiene un parche para este problema."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-444"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/twisted/twisted/security/advisories/GHSA-xc8x-vp79-p3wm",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46150.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46150.json
new file mode 100644
index 00000000000..db2923d9f8a
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46150.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46150",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:36.830",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in WP Military WP Radio plugin <=\u00a03.1.9 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento WP Military WP Radio en versiones <= 3.1.9."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/wp-radio/wordpress-wp-radio-worldwide-online-radio-stations-directory-for-wordpress-plugin-3-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46151.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46151.json
new file mode 100644
index 00000000000..d734450c39c
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46151.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46151",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:36.897",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in AWESOME TOGI Product Category Tree plugin <=\u00a02.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento AWESOME TOGI Product Category Tree en versiones <= 2.5."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/product-category-tree/wordpress-product-category-tree-plugin-2-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46152.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46152.json
new file mode 100644
index 00000000000..83980f7a9ec
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46152.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46152",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:36.967",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF \u2013 WordPress Posts Bulk Editor and Manager Professional plugin <=\u00a01.0.7.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en realmag777 WOLF: complemento Posts Bulk Editor y Manager Professional de WordPress en versiones <= 1.0.7.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-plugin-1-0-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46153.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46153.json
new file mode 100644
index 00000000000..1f53cf20db5
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46153.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46153",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T08:15:31.457",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Stored Cross-Site Scripting (XSS) vulnerability in UserFeedback Team User Feedback plugin <=\u00a01.0.9 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS)Almacenada No Autenticada en el complemento UserFeedback Team User Feedback en versiones <= 1.0.9."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/userfeedback-lite/wordpress-user-feedback-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46158.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46158.json
new file mode 100644
index 00000000000..10cb290de82
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46158.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-46158",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2023-10-25T18:17:37.037",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM WebSphere Application Server Liberty 23.0.0.9 through 23.0.0.10 could provide weaker than expected security due to improper resource expiration handling. IBM X-Force ID: 268775."
+ },
+ {
+ "lang": "es",
+ "value": "IBM WebSphere Application Server Liberty 23.0.0.9 a 23.0.0.10 podr\u00eda proporcionar una seguridad m\u00e1s d\u00e9bil de lo esperado debido a un manejo inadecuado de la caducidad de recursos. ID de IBM X-Force: 268775."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.4,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-613"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268775",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7058356",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46189.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46189.json
new file mode 100644
index 00000000000..9e186f2f81d
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46189.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46189",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:37.107",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Simple Calendar \u2013 Google Calendar Plugin <=\u00a03.2.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Simple Calendar de Google Calendar en versiones <= 3.2.5."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/google-calendar-events/wordpress-google-calendar-events-plugin-3-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46190.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46190.json
new file mode 100644
index 00000000000..4253d792fe6
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46190.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46190",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:37.177",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Novo-media Novo-Map : your WP posts on custom google maps plugin <=\u00a01.1.2 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Novo-media Novo-Map: sus publicaciones de WP en el complemento personalizado de Google Maps en versiones <= 1.1.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/novo-map/wordpress-novo-map-your-wp-posts-on-custom-google-maps-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46191.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46191.json
new file mode 100644
index 00000000000..f36e042a3ac
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46191.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46191",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:37.247",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Niels van Renselaar Open Graph Metabox plugin <=\u00a01.4.4 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Niels van Renselaar Open Graph Metabox en versiones <= 1.4.4."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/open-graph-metabox/wordpress-open-graph-metabox-plugin-1-4-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46192.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46192.json
new file mode 100644
index 00000000000..eb7d9d648df
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46192.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46192",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T08:15:31.533",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Internet Marketing Ninjas Internal Link Building plugin <=\u00a01.2.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Internet Marketing Ninjas Internal Link Building en versiones <= 1.2.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/internal-link-building-plugin/wordpress-internal-link-building-plugin-1-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46193.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46193.json
new file mode 100644
index 00000000000..fd0cfcc3800
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46193.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46193",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:37.320",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Internet Marketing Ninjas Internal Link Building plugin <=\u00a01.2.3 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Internet Marketing Ninjas Internal Link Building en versiones <= 1.2.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/internal-link-building-plugin/wordpress-internal-link-building-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46194.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46194.json
new file mode 100644
index 00000000000..06ca04f3ed0
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46194.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46194",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T08:15:31.607",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Eric Teubert Archivist \u2013 Custom Archive Templates plugin <=\u00a01.7.5 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Reflejada No Autenticada en el complemento Eric Teubert Archivist de Custom Archive Templates en versiones <= 1.7.5."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/archivist-custom-archive-templates/wordpress-archivist-custom-archive-templates-plugin-1-7-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46198.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46198.json
new file mode 100644
index 00000000000..4c93355f007
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46198.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46198",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:37.393",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Scientech It Solution Appointment Calendar plugin <=\u00a02.9.6 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Scientech It Solution Appointment Calendar en versiones <= 2.9.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/appointment-calendar/wordpress-appointment-calendar-plugin-2-9-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46199.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46199.json
new file mode 100644
index 00000000000..424d014e710
--- /dev/null
+++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46199.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46199",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T08:15:31.683",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Triberr plugin <=\u00a04.1.1 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en el complemento Triberr en versiones <= 4.1.1."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/triberr-wordpress-plugin/wordpress-triberr-plugin-4-1-1-cross-site-scripting-xss?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46200.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46200.json
new file mode 100644
index 00000000000..0009e5673ff
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46200.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46200",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T21:15:09.617",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Stephen Darlington, Wandle Software Limited Smart App Banner plugin <=\u00a01.1.3 versions."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/smart-app-banner/wordpress-smart-app-banner-plugin-1-1-3-cross-site-scripting-xss?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46202.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46202.json
new file mode 100644
index 00000000000..18cb4c8bb56
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46202.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46202",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:37.467",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jeff Sherk Auto Login New User After Registration plugin <=\u00a01.9.6 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Jeff Sherk Auto Login New User After Registration en versiones <= 1.9.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/auto-login-new-user-after-registration/wordpress-auto-login-new-user-after-registration-plugin-1-9-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46204.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46204.json
new file mode 100644
index 00000000000..eb137a9d939
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46204.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46204",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-25T18:17:37.537",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Muller Digital Inc. Duplicate Theme plugin <=\u00a00.1.6 versions."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Muller Digital Inc. Duplicate Theme en versiones <= 0.1.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/duplicate-theme/wordpress-duplicate-theme-plugin-0-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46208.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46208.json
new file mode 100644
index 00000000000..62815d0b56b
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46208.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46208",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T21:15:09.683",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in StylemixThemes Motors \u2013 Car Dealer, Classifieds & Listing plugin <=\u00a01.4.6 versions."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/motors-car-dealership-classified-listings/wordpress-motors-car-dealer-classifieds-listing-plugin-1-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46209.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46209.json
new file mode 100644
index 00000000000..fabd2838068
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46209.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46209",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T21:15:09.760",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in G5Theme Grid Plus \u2013 Unlimited grid plugin <=\u00a01.3.2 versions."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/grid-plus/wordpress-grid-plus-plugin-1-3-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46211.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46211.json
new file mode 100644
index 00000000000..a1f43b415a3
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46211.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46211",
+ "sourceIdentifier": "audit@patchstack.com",
+ "published": "2023-10-27T21:15:09.827",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Brainstorm Force Ultimate Addons for WPBakery Page Builder plugin <=\u00a03.19.14 versions."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 3.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "audit@patchstack.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://patchstack.com/database/vulnerability/ultimate_vc_addons/wordpress-ultimate-addons-for-wpbakery-page-builder-plugin-3-19-14-cross-site-scripting-xss-vulnerability?_s_id=cve",
+ "source": "audit@patchstack.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46215.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46215.json
new file mode 100644
index 00000000000..a1d0ede89c1
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46215.json
@@ -0,0 +1,40 @@
+{
+ "id": "CVE-2023-46215",
+ "sourceIdentifier": "security@apache.org",
+ "published": "2023-10-28T08:15:07.553",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Insertion of Sensitive Information into Log File vulnerability in Apache Airflow Celery provider, Apache Airflow.\n\nSensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend\nNote: the\u00a0vulnerability is about the information exposed in the logs not about accessing the logs.\n\nThis issue affects Apache Airflow Celery provider: from 3.3.0 through 3.4.0; Apache Airflow: from 1.10.0 through 2.6.3.\n\nUsers are recommended to upgrade Airflow Celery provider to version 3.4.1\u00a0and Apache Airlfow to version 2.7.0 which fixes the issue.\n\n"
+ }
+ ],
+ "metrics": {},
+ "weaknesses": [
+ {
+ "source": "security@apache.org",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/28/1",
+ "source": "security@apache.org"
+ },
+ {
+ "url": "https://github.com/apache/airflow/pull/34954",
+ "source": "security@apache.org"
+ },
+ {
+ "url": "https://lists.apache.org/thread/wm1jfmks7r6m7bj0mq4lmw3998svn46n",
+ "source": "security@apache.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46227.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46227.json
new file mode 100644
index 00000000000..d11673e20a4
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46227.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-46227",
+ "sourceIdentifier": "security@apache.org",
+ "published": "2023-10-19T10:15:10.090",
+ "lastModified": "2023-10-25T16:13:36.540",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nDeserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.\n\nThis issue affects Apache InLong: from 1.4.0 through 1.8.0, the attacker can use \\t to bypass.\u00a0Users are advised to upgrade to Apache InLong's 1.9.0 or cherry-pick [1] to solve it.\n\n[1] https://github.com/apache/inlong/pull/8814 \n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Deserializaci\u00f3n de la vulnerabilidad de datos no confiables en Apache Software Foundation Apache InLong. Este problema afecta a Apache InLong: desde 1.4.0 hasta 1.8.0, el atacante puede usar \\t para evitarlo. Se recomienda a los usuarios actualizar a Apache InLong 1.9.0 o seleccionar [1] para resolverlo. [1] https://github.com/apache/inlong/pull/8814"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@apache.org",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.4.0",
+ "versionEndExcluding": "1.9.0",
+ "matchCriteriaId": "364B4649-1197-4452-A489-4CB1C8CADB9D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://lists.apache.org/thread/m8txor4f76tmrxksrmc87tw42g57nz33",
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46228.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46228.json
new file mode 100644
index 00000000000..c3feb4d7d6a
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46228.json
@@ -0,0 +1,96 @@
+{
+ "id": "CVE-2023-46228",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T05:15:58.663",
+ "lastModified": "2023-10-25T14:51:06.557",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "zchunk before 1.3.2 has multiple integer overflows via malformed zchunk files to lib/comp/comp.c, lib/comp/zstd/zstd.c, lib/dl/multipart.c, or lib/header.c."
+ },
+ {
+ "lang": "es",
+ "value": "zchunk anterior a 1.3.2 tiene m\u00faltiples desbordamientos de enteros a trav\u00e9s de archivos zchunk con formato incorrecto a lib/comp/comp.c, lib/comp/zstd/zstd.c, lib/dl/multipart.c o lib/header.c."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zchunk:zchunk:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.3.2",
+ "matchCriteriaId": "98C5913A-9F71-4F81-97DA-6093D1CBBBAA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://bugzilla.suse.com/show_bug.cgi?id=1216268",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Patch",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/zchunk/zchunk/commit/08aec2b4dfd7f709b6e3d511411ffcc83ed4efbe",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/zchunk/zchunk/compare/1.3.1...1.3.2",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46229.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46229.json
new file mode 100644
index 00000000000..cf649406935
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46229.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-46229",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-19T05:15:58.737",
+ "lastModified": "2023-10-25T14:56:07.537",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "LangChain before 0.0.317 allows SSRF via document_loaders/recursive_url_loader.py because crawling can proceed from an external server to an internal server."
+ },
+ {
+ "lang": "es",
+ "value": "LangChain anterior a 0.0.317 permite SSRF a trav\u00e9s de document_loaders/recursive_url_loader.py porque el rastreo puede proceder desde un servidor externo a un servidor interno."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "0.0.317",
+ "matchCriteriaId": "96BF88B4-C2B7-476C-8270-73C2DA83CD95"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/langchain-ai/langchain/commit/9ecb7240a480720ec9d739b3877a52f76098a2b8",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/langchain-ai/langchain/pull/11925",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46232.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46232.json
new file mode 100644
index 00000000000..0230a7d3336
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46232.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46232",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T22:15:09.477",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "era-compiler-vyper is the EraVM Vyper compiler for zkSync Era, a layer 2 rollup that uses zero-knowledge proofs to scale Ethereum. Prior to era-compiler-vype version 1.3.10, a bug prevented the initialization of the first immutable variable for Vyper contracts meeting certain criteria. The problem arises when there is a String or Array with more 256-bit words allocated than initialized. It results in the second word\u2019s index unset, that is effectively set to 0, so the first immutable value with the actual 0 index is overwritten in the ImmutableSimulator. Version 1.3.10 fixes this issue by setting all indexes in advance. The problem will go away, but it will get more expensive if the user allocates a lot of uninitialized space, e.g. `String[4096]`. Upgrading and redeploying affected contracts is the only way of working around the issue.\n"
+ },
+ {
+ "lang": "es",
+ "value": "era-compiler-vyper es el compilador EraVM Vyper para zkSync Era, un paquete acumulativo de capa 2 que utiliza pruebas de conocimiento cero para escalar Ethereum. Antes de la versi\u00f3n 1.3.10 de era-compiler-vype, un error imped\u00eda la inicializaci\u00f3n de la primera variable inmutable para los contratos de Vyper que cumpl\u00edan ciertos criterios. El problema surge cuando hay un String o Array con m\u00e1s palabras de 256 bits asignadas que inicializadas. Esto da como resultado que el \u00edndice de la segunda palabra no est\u00e9 configurado, que efectivamente se establece en 0, por lo que el primer valor inmutable con el \u00edndice 0 real se sobrescribe en ImmutableSimulator. La versi\u00f3n 1.3.10 soluciona este problema configurando todos los \u00edndices por adelantado. El problema desaparecer\u00e1, pero ser\u00e1 m\u00e1s costoso si el usuario asigna una gran cantidad de espacio no inicializado, por ejemplo, `String[4096]`. Actualizar y redistribuir los contratos afectados es la \u00fanica forma de solucionar el problema."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-471"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/matter-labs/era-compiler-vyper/commit/8be305a1b9c68d0fd47dad3434224ed85944ca25",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/matter-labs/era-compiler-vyper/security/advisories/GHSA-h8jv-969m-94r4",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/matter-labs/era-system-contracts/blob/main/contracts/ImmutableSimulator.sol#L37",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46233.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46233.json
new file mode 100644
index 00000000000..2430b9b7512
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46233.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46233",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-25T21:15:10.307",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations."
+ },
+ {
+ "lang": "es",
+ "value": "crypto-js es una librer\u00eda JavaScript de est\u00e1ndares criptogr\u00e1ficos. Antes de la versi\u00f3n 4.2.0, crypto-js PBKDF2 era 1000 veces m\u00e1s d\u00e9bil de lo especificado originalmente en 1993 y al menos 1.300.000 veces m\u00e1s d\u00e9bil que el est\u00e1ndar actual de la industria. Esto se debe a que su valor predeterminado es SHA1, un algoritmo hash criptogr\u00e1fico considerado inseguro desde al menos 2005, y su valor predeterminado es una \u00fanica iteraci\u00f3n, un valor de \"fuerza\" o \"dificultad\" especificado en 1000 cuando se especific\u00f3 en 1993. PBKDF2 se basa en el recuento de iteraciones como una contramedida a los ataques de preimagen y colisi\u00f3n. Si se utiliza para proteger contrase\u00f1as, el impacto es alto. Si se utiliza para generar firmas, el impacto es alto. La versi\u00f3n 4.2.0 contiene un parche para este problema. Como workaround, configure crypto-js para usar SHA256 con al menos 250 000 iteraciones."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 9.1,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-328"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-916"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/brix/crypto-js/commit/421dd538b2d34e7c24a5b72cc64dc2b9167db40a",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/brix/crypto-js/security/advisories/GHSA-xwcq-pm8m-c4vf",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46234.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46234.json
new file mode 100644
index 00000000000..5963d2479f4
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46234.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46234",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-26T15:15:09.087",
+ "lastModified": "2023-10-29T07:15:38.860",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.\n"
+ },
+ {
+ "lang": "es",
+ "value": "browserify-sign es un paquete para duplicar la funcionalidad de las funciones de clave p\u00fablica criptogr\u00e1fica del nodo, gran parte de esto se basa en el trabajo de Fedor Indutny en indutny/tls.js. Un problema de verificaci\u00f3n de l\u00edmite superior en la funci\u00f3n `dsaVerify` permite a un atacante construir firmas que pueden verificarse con \u00e9xito mediante cualquier clave p\u00fablica, lo que lleva a un ataque de falsificaci\u00f3n de firmas. Todos los lugares de este proyecto que implican la verificaci\u00f3n DSA de las firmas ingresadas por los usuarios se ver\u00e1n afectados por esta vulnerabilidad. Este problema se solucion\u00f3 en la versi\u00f3n 4.2.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-347"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/browserify/browserify-sign/commit/85994cd6348b50f2fd1b73c54e20881416f44a30",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/browserify/browserify-sign/security/advisories/GHSA-x9w5-v3q2-3rhw",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00040.html",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46238.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46238.json
new file mode 100644
index 00000000000..18dbb553ba8
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46238.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-46238",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-26T15:15:09.173",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "ZITADEL is an identity infrastructure management system. ZITADEL users can upload their own avatar image using various image types including SVG. SVG can include scripts, such as javascript, which can be executed during rendering. Due to a missing security header, an attacker could inject code to an SVG to gain access to the victim\u2019s account in certain scenarios. A victim would need to directly open the malicious image in the browser, where a single session in ZITADEL needs to be active for this exploit to work. If the possible victim had multiple or no active sessions in ZITADEL, the attack would not succeed. This issue has been patched in version 2.39.2 and 2.38.2."
+ },
+ {
+ "lang": "es",
+ "value": "ZITADEL es un sistema de gesti\u00f3n de infraestructura de identidad. Los usuarios de ZITADEL pueden cargar su propia imagen de avatar utilizando varios tipos de im\u00e1genes, incluido SVG. SVG puede incluir scripts, como javascript, que se pueden ejecutar durante el renderizado. Debido a la falta de un encabezado de seguridad, un atacante podr\u00eda inyectar c\u00f3digo en un SVG para obtener acceso a la cuenta de la v\u00edctima en ciertos escenarios. Una v\u00edctima necesitar\u00eda abrir directamente la imagen maliciosa en el navegador, donde debe haber una \u00fanica sesi\u00f3n activa en ZITADEL para que este exploit funcione. Si la posible v\u00edctima tuviera varias sesiones activas o ninguna en ZITADEL, el ataque no tendr\u00eda \u00e9xito. Este problema se solucion\u00f3 en las versiones 2.39.2 y 2.38.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.7,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 5.8
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/zitadel/zitadel/releases/tag/v2.38.2",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/zitadel/zitadel/releases/tag/v2.39.2",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-954h-jrpm-72pm",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46246.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46246.json
new file mode 100644
index 00000000000..584de27a91f
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46246.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-46246",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2023-10-27T19:15:41.417",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.0,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-190"
+ },
+ {
+ "lang": "en",
+ "value": "CWE-416"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/vim/vim/commit/9198c1f2b1ddecde22af918541e0de2a32f0f45a",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46267.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46267.json
new file mode 100644
index 00000000000..c12da991f3d
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46267.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2023-46267",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T04:15:10.777",
+ "lastModified": "2023-10-21T21:15:08.247",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-5631. Reason: This candidate is a duplicate of CVE-2023-5631. Notes: All CVE users should reference CVE-2023-5631 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46277.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46277.json
new file mode 100644
index 00000000000..6d457d01276
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46277.json
@@ -0,0 +1,104 @@
+{
+ "id": "CVE-2023-46277",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T05:15:08.487",
+ "lastModified": "2023-10-26T17:45:23.253",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)"
+ },
+ {
+ "lang": "es",
+ "value": "please (tambi\u00e9n conocido como pleaser) hasta 0.5.4 permite la escalada de privilegios a trav\u00e9s de TIOCSTI y/o TIOCLINUX ioctl. (Si tanto TIOCSTI como TIOCLINUX est\u00e1n deshabilitados, esto no se puede explotar)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:edneville:please:*:*:*:*:*:rust:*:*",
+ "versionEndIncluding": "0.5.4",
+ "matchCriteriaId": "25DE38C2-FCD1-4F1E-92A4-21ABEECD3F4B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/rustsec/advisory-db/pull/1798",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://gitlab.com/edneville/please/-/issues/13",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking"
+ ]
+ },
+ {
+ "url": "https://gitlab.com/edneville/please/-/merge_requests/69#note_1594254575",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://rustsec.org/advisories/RUSTSEC-2023-0066.html",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46287.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46287.json
new file mode 100644
index 00000000000..38ed4a16e83
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46287.json
@@ -0,0 +1,95 @@
+{
+ "id": "CVE-2023-46287",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-20T14:15:12.613",
+ "lastModified": "2023-10-26T17:05:56.627",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "XSS exists in NagVis before 1.9.38 via the select function in share/server/core/functions/html.php."
+ },
+ {
+ "lang": "es",
+ "value": "XSS existe en NagVis antes de 1.9.38 a trav\u00e9s de la funci\u00f3n de selecci\u00f3n en share/server/core/functions/html.php."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:nagvis:nagvis:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.9.38",
+ "matchCriteriaId": "E6C8B56C-E7E7-431B-98D4-BAF402C049E6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/NagVis/nagvis/compare/nagvis-1.9.37...nagvis-1.9.38",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/NagVis/nagvis/pull/356",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/NagVis/nagvis/pull/356/commits/d660591b23e5cfea4d1be2d3fb8f3855aa6020fb",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46288.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46288.json
new file mode 100644
index 00000000000..7425279c74c
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46288.json
@@ -0,0 +1,100 @@
+{
+ "id": "CVE-2023-46288",
+ "sourceIdentifier": "security@apache.org",
+ "published": "2023-10-23T19:15:11.143",
+ "lastModified": "2023-10-28T03:24:55.857",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Airflow.This issue affects Apache Airflow from 2.4.0 to 2.7.0.\n\nSensitive configuration information has been exposed to authenticated users with the ability to read configuration via Airflow REST API for configuration even when the expose_config\u00a0option is set to non-sensitive-only. The expose_config option is False by default. It is recommended to upgrade to a version that is not affected if you set expose_config\u00a0to non-sensitive-only\u00a0configuration. This is a different error than CVE-2023-45348\u00a0which allows authenticated user to retrieve individual configuration values in 2.7.* by specially crafting their request (solved in 2.7.2).\n\nUsers are recommended to upgrade to version 2.7.2, which fixes the issue and additionally fixes\u00a0CVE-2023-45348.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado en Apache Airflow. Este problema afecta a Apache Airflow desde la versi\u00f3n 2.4.0 a la 2.7.0. La informaci\u00f3n de configuraci\u00f3n confidencial se ha expuesto a usuarios autenticados con la capacidad de leer la configuraci\u00f3n a trav\u00e9s de la API REST de Airflow para la configuraci\u00f3n incluso cuando la opci\u00f3n Expon_config est\u00e1 configurada como no confidencial. La opci\u00f3n exponen_config es False de forma predeterminada. Se recomienda actualizar a una versi\u00f3n que no se vea afectada si configura Expon_config en una configuraci\u00f3n no confidencial. Este es un error diferente a CVE-2023-45348 que permite a un usuario autenticado recuperar valores de configuraci\u00f3n individuales en 2.7.* manipulando especialmente su solicitud (resuelto en 2.7.2). Se recomienda a los usuarios actualizar a la versi\u00f3n 2.7.2, que soluciona el problema y adem\u00e1s corrige CVE-2023-45348."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security@apache.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "2.4.0",
+ "versionEndExcluding": "2.7.0",
+ "matchCriteriaId": "E0F2268E-426E-482E-9EDB-D410698925C8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/apache/airflow/pull/32261",
+ "source": "security@apache.org",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://lists.apache.org/thread/yw4vzm0c5lqkwm0bxv6qy03yfd1od4nw",
+ "source": "security@apache.org",
+ "tags": [
+ "Mailing List",
+ "Patch",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46289.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46289.json
new file mode 100644
index 00000000000..8c6b2b36168
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46289.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46289",
+ "sourceIdentifier": "PSIRT@rockwellautomation.com",
+ "published": "2023-10-27T19:15:41.493",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nRockwell Automation FactoryTalk View Site Edition insufficiently validates user input, which could potentially allow threat actors to send malicious data bringing the product offline. If exploited, the product would become unavailable and require a restart to recover resulting in a denial-of-service condition.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "PSIRT@rockwellautomation.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "PSIRT@rockwellautomation.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141167",
+ "source": "PSIRT@rockwellautomation.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46290.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46290.json
new file mode 100644
index 00000000000..f1fd32a8a9b
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46290.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46290",
+ "sourceIdentifier": "PSIRT@rockwellautomation.com",
+ "published": "2023-10-27T19:15:41.560",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nDue to inadequate code logic, a previously unauthenticated threat actor could potentially obtain a local Windows OS user token through the FactoryTalk\u00ae Services Platform web service and then use the token to log in into FactoryTalk\u00ae Services Platform . This vulnerability can only be exploited if the authorized user did not previously log in into the FactoryTalk\u00ae Services Platform web service.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "PSIRT@rockwellautomation.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "PSIRT@rockwellautomation.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141165",
+ "source": "PSIRT@rockwellautomation.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46298.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46298.json
new file mode 100644
index 00000000000..df4e7769409
--- /dev/null
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46298.json
@@ -0,0 +1,162 @@
+{
+ "id": "CVE-2023-46298",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-22T03:15:07.630",
+ "lastModified": "2023-10-28T03:30:11.740",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Next.js before 13.4.20-canary.13 lacks a cache-control header and thus empty prefetch responses may sometimes be cached by a CDN, causing a denial of service to all users requesting the same URL via that CDN."
+ },
+ {
+ "lang": "es",
+ "value": "Next.js anterior a 13.4.20-canary.13 carece de un encabezado de control de cach\u00e9 y, por lo tanto, a veces una CDN puede almacenar en cach\u00e9 respuestas de captaci\u00f3n previa vac\u00edas, lo que provoca una denegaci\u00f3n de servicio a todos los usuarios que solicitan la misma URL a trav\u00e9s de esa CDN."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
+ "versionEndExcluding": "13.4.20",
+ "matchCriteriaId": "925A4215-3FFD-4A31-912D-6A017816BAD7"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary0:*:*:*:node.js:*:*",
+ "matchCriteriaId": "C3C8121C-0E9A-4603-BC95-D8587787D49B"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary1:*:*:*:node.js:*:*",
+ "matchCriteriaId": "38F01C08-9C2E-43AF-8DC2-151EB55CB359"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary10:*:*:*:node.js:*:*",
+ "matchCriteriaId": "2E022A19-C372-4115-B6A0-DD6142AAF0FE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary11:*:*:*:node.js:*:*",
+ "matchCriteriaId": "D54FE66E-F8A0-4E25-ADC1-EB8EF28C9D8C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary12:*:*:*:node.js:*:*",
+ "matchCriteriaId": "3779A063-878E-4144-9D9C-23BB0682BE3D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary2:*:*:*:node.js:*:*",
+ "matchCriteriaId": "1AE0F73C-E100-442E-BCFE-78883EC85159"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary3:*:*:*:node.js:*:*",
+ "matchCriteriaId": "F8598C69-A77F-489F-93D6-FD0C8147EE35"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary4:*:*:*:node.js:*:*",
+ "matchCriteriaId": "908890B1-AE61-4254-97C8-B20348E79ACC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary5:*:*:*:node.js:*:*",
+ "matchCriteriaId": "7F8A969A-0ADC-4356-8AEC-72E5BEF4A9BB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary6:*:*:*:node.js:*:*",
+ "matchCriteriaId": "D3C4F0AF-9456-4F0C-85BB-81B4F7E010E9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary7:*:*:*:node.js:*:*",
+ "matchCriteriaId": "2D8432F9-8641-4EE5-A6A5-E2E79E4F7CB9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary8:*:*:*:node.js:*:*",
+ "matchCriteriaId": "E94322EE-AF5F-40BC-82F0-8CD783D59B3C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:vercel:next.js:13.4.20:canary9:*:*:*:node.js:*:*",
+ "matchCriteriaId": "A5A00595-2393-41CF-8D1A-9237BC5A8CD3"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/vercel/next.js/compare/v13.4.20-canary.12...v13.4.20-canary.13",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://github.com/vercel/next.js/issues/45301",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/vercel/next.js/pull/54732",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Issue Tracking",
+ "Patch"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46300.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46300.json
new file mode 100644
index 00000000000..a3969558034
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46300.json
@@ -0,0 +1,36 @@
+{
+ "id": "CVE-2023-46300",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-22T04:15:09.740",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration."
+ },
+ {
+ "lang": "es",
+ "value": "iTerm2 anterior a 3.4.20 permite la ejecuci\u00f3n de c\u00f3digo (potencialmente remota) debido al mal manejo de ciertas secuencias de escape relacionadas con la integraci\u00f3n de tmux."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/gnachman/iTerm2/commit/ae8192522661c34d1cbe57f6f9ef2ff0a337c2a5",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://iterm2.com/news.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46301.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46301.json
new file mode 100644
index 00000000000..c8f78ab5c51
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46301.json
@@ -0,0 +1,36 @@
+{
+ "id": "CVE-2023-46301",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-22T04:15:09.797",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload."
+ },
+ {
+ "lang": "es",
+ "value": "iTerm2 anterior a 3.4.20 permite la ejecuci\u00f3n de c\u00f3digo (potencialmente remota) debido al mal manejo de ciertas secuencias de escape relacionadas con la carga."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/gnachman/iTerm2/commit/85cbf5ebda472c9ec295887e99c2b6f1b5867f1b",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://iterm2.com/news.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46303.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46303.json
new file mode 100644
index 00000000000..ba6d56af917
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46303.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-46303",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-22T18:15:08.577",
+ "lastModified": "2023-10-28T03:29:56.570",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "link_to_local_path in ebooks/conversion/plugins/html_input.py in calibre before 6.19.0 can, by default, add resources outside of the document root."
+ },
+ {
+ "lang": "es",
+ "value": "link_to_local_path en ebooks/conversion/plugins/html_input.py en calibre anterior a 6.19.0 puede, de forma predeterminada, agregar recursos fuera del root del documento."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-918"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "6.19.0",
+ "matchCriteriaId": "3B89B1C3-CAE3-4CAF-B90B-9CACF59F4523"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/0x1717/ssrf-via-img",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/kovidgoyal/calibre/compare/v6.18.1...v6.19.0",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46306.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46306.json
new file mode 100644
index 00000000000..213f3c018fa
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46306.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-46306",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-22T21:15:07.930",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105."
+ },
+ {
+ "lang": "es",
+ "value": "La interfaz de administraci\u00f3n web en NetModule Router Software (NRSW) 4.6 anterior a 4.6.0.106 y 4.8 anterior a 4.8.0.101 ejecuta un comando del sistema operativo construido con entrada de usuario no sanitizada: metacaracteres de shell en el par\u00e1metro /admin/gnssAutoAlign.php device_id. Esto ocurre porque se puede iniciar otro subproceso antes de la captura que activa la funci\u00f3n de limpieza. Un exploit exitoso podr\u00eda permitir a un usuario autenticado ejecutar comandos arbitrarios con privilegios elevados. NOTA: esto es diferente de CVE-2023-0861 y CVE-2023-0862, que se corrigieron en la versi\u00f3n 4.6.0.105."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cve@mitre.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.4,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46315.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46315.json
new file mode 100644
index 00000000000..946a3112b74
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46315.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46315",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-22T22:15:08.797",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The zanllp sd-webui-infinite-image-browsing (aka Infinite Image Browsing) extension before 977815a for stable-diffusion-webui (aka Stable Diffusion web UI), if Gradio authentication is enabled without secret key configuration, allows remote attackers to read any local file via /file?path= in the URL, as demonstrated by reading /proc/self/environ to discover credentials."
+ },
+ {
+ "lang": "es",
+ "value": "La extensi\u00f3n zanllp sd-webui-infinite-image-browsing (tambi\u00e9n conocida como Infinite Image Browsing) anterior a 977815a para stable-diffusion-webui (tambi\u00e9n conocida como Stable Diffusion web UI), si la autenticaci\u00f3n Gradio est\u00e1 habilitada sin configuraci\u00f3n de clave secreta, permite a atacantes remotos leer cualquier archivo local a trav\u00e9s de /file?path= en la URL, como se demuestra al leer /proc/self/environ para descubrir las credenciales."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/zanllp/sd-webui-infinite-image-browsing/issues/387",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/zanllp/sd-webui-infinite-image-browsing/pull/368/commits/977815a2b28ad953c10ef0114c365f698c4b8f19",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46316.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46316.json
new file mode 100644
index 00000000000..cf59fa14d36
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46316.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46316",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:37.610",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines."
+ },
+ {
+ "lang": "es",
+ "value": "En buc Traceroute 2.0.12 a 2.1.2 anterior a 2.1.3, los scripts contenedores no analizan correctamente las l\u00edneas de comando."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://security-tracker.debian.org/tracker/CVE-2023-46316",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://sourceforge.net/projects/traceroute/files/traceroute/traceroute-2.1.3/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46317.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46317.json
new file mode 100644
index 00000000000..eab8046ae15
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46317.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46317",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-22T23:15:08.020",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Knot Resolver before 5.7.0 performs many TCP reconnections upon receiving certain nonsensical responses from servers."
+ },
+ {
+ "lang": "es",
+ "value": "Knot Resolver anterior a 5.7.0 realiza muchas reconexiones TCP al recibir ciertas respuestas sin sentido de los servidores."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gitlab.nic.cz/knot/knot-resolver/-/merge_requests/1448",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.knot-resolver.cz/2023-08-22-knot-resolver-5.7.0.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46319.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46319.json
new file mode 100644
index 00000000000..b182ecfa0b4
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46319.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-46319",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T00:15:08.467",
+ "lastModified": "2023-10-28T03:24:08.903",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "WALLIX Bastion 9.x before 9.0.9 and 10.x before 10.0.5 allows unauthenticated access to sensitive information by bypassing access control on a network access administration web interface."
+ },
+ {
+ "lang": "es",
+ "value": "WALLIX Bastion 9.x anterior a 9.0.9 y 10.x anterior a 10.0.5 permite el acceso no autenticado a informaci\u00f3n confidencial omitiendo el control de acceso en una interfaz web de administraci\u00f3n de acceso a la red."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wallix:bastion:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "9.0.9",
+ "matchCriteriaId": "8DE2034C-94C1-425D-BB29-4018423A3635"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wallix:bastion:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "10.0",
+ "versionEndExcluding": "10.0.5",
+ "matchCriteriaId": "A62799DC-7AF0-4D7B-BFB2-0222C4A08F6A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.wallix.com/support/alerts/",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Mitigation",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46321.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46321.json
new file mode 100644
index 00000000000..ce8c008f230
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46321.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46321",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T00:15:08.517",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line."
+ },
+ {
+ "lang": "es",
+ "value": "iTermSessionLauncher.m en iTerm2 anterior a 3.5.0beta12 no sanitiza las rutas en las URL de la p\u00e1gina de manual x. Pueden tener metacaracteres de shell para una l\u00ednea de comando /usr/bin/man."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gitlab.com/gnachman/iterm2/-/commit/de3d351e1bd3bc1c1a4f85fe976c592e497dd071",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://iterm2.com/downloads.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46322.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46322.json
new file mode 100644
index 00000000000..fc5b3a6aa4c
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46322.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46322",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T00:15:08.560",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname's initial character may be non-alphanumeric. The hostname's other characters may be outside the set of alphanumeric characters, dash, and period."
+ },
+ {
+ "lang": "es",
+ "value": "iTermSessionLauncher.m en iTerm2 anterior a 3.5.0beta12 no sanitiza los nombres de host ssh en las URL. El car\u00e1cter inicial del nombre de host puede no ser alfanum\u00e9rico. Los dem\u00e1s caracteres del nombre de host pueden estar fuera del conjunto de caracteres alfanum\u00e9ricos, guiones y puntos."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gitlab.com/gnachman/iterm2/-/commit/ef7bb84520013b2524df9787d4aa9f2c96746c01",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://iterm2.com/downloads.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46324.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46324.json
new file mode 100644
index 00000000000..302f9b4e7dc
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46324.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46324",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T01:15:07.637",
+ "lastModified": "2023-10-23T11:35:01.280",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "pkg/suci/suci.go in free5GC udm before 1.2.0, when Go before 1.19 is used, allows an Invalid Curve Attack because it may compute a shared secret via an uncompressed public key that has not been validated. An attacker can send arbitrary SUCIs to the UDM, which tries to decrypt them via both its private key and the attacker's public key."
+ },
+ {
+ "lang": "es",
+ "value": "pkg/suci/suci.go en free5GC udm anterior a 1.2.0, cuando se usa Go anterior a 1.19, permite un Ataque de Curva no v\u00e1lida porque puede calcular un secreto compartido a trav\u00e9s de una clave p\u00fablica sin comprimir que no ha sido validada. Un atacante puede enviar SUCI arbitrarias a la UDM, que intenta descifrarlas tanto a trav\u00e9s de su clave privada como de la clave p\u00fablica del atacante."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/free5gc/udm/compare/v1.1.1...v1.2.0",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/free5gc/udm/pull/20",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46331.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46331.json
new file mode 100644
index 00000000000..84fb7c2e696
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46331.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46331",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T17:15:08.590",
+ "lastModified": "2023-10-23T18:18:33.750",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in DataSegment::IsValidRange(), which lead to segmentation fault."
+ },
+ {
+ "lang": "es",
+ "value": "WebAssembly wabt 1.0.33 tiene una lectura de memoria fuera de l\u00edmites en DataSegment::IsValidRange(), lo que provoca un error de segmentaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/WebAssembly/wabt/issues/2310",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46332.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46332.json
new file mode 100644
index 00000000000..8596713db71
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46332.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46332",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T16:15:09.457",
+ "lastModified": "2023-10-23T18:18:33.750",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "WebAssembly wabt 1.0.33 contains an Out-of-Bound Memory Write in DataSegment::Drop(), which lead to segmentation fault."
+ },
+ {
+ "lang": "es",
+ "value": "WebAssembly wabt 1.0.33 contiene una escritura de memoria fuera de l\u00edmites en DataSegment::Drop(), lo que provoca un error de segmentaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/WebAssembly/wabt/issues/2311",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46345.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46345.json
new file mode 100644
index 00000000000..1f42944a762
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46345.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46345",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T00:15:12.107",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Catdoc v0.95 was discovered to contain a NULL pointer dereference via the component xls2csv at src/xlsparse.c."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Catdoc v0.95 conten\u00eda una desreferencia de puntero NULL a trav\u00e9s del componente xls2csv en src/xlsparse.c."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/rycbar77/d747b2c37b544ece30b2353a65ab41f9",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46346.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46346.json
new file mode 100644
index 00000000000..6c033bf9e23
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46346.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46346",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:37.650",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In the module \"Product Catalog (CSV, Excel, XML) Export PRO\" (exportproducts) in versions up to 4.1.1 from MyPrestaModules for PrestaShop, a guest can download personal information without restriction by performing a path traversal attack. Due to a lack of permissions control and a lack of control in the path name construction, a guest can perform a path traversal to view all files on the information system."
+ },
+ {
+ "lang": "es",
+ "value": "En el m\u00f3dulo \"Product Catalog (CSV, Excel, XML) Export PRO\" (exportar productos) en versiones hasta 4.1.1 de MyPrestaModules para PrestaShop, un invitado puede descargar informaci\u00f3n personal sin restricciones realizando un ataque de path traversal. Debido a la falta de control de permisos y a la falta de control en la construcci\u00f3n del nombre de la ruta, un invitado puede realizar un path traversal para ver todos los archivos en el sistema de informaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://security.friendsofpresta.org/modules/2023/10/24/exportproducts.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46347.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46347.json
new file mode 100644
index 00000000000..8a6f72b59fe
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46347.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46347",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:37.697",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In the module \"Step by Step products Pack\" (ndk_steppingpack) version 1.5.6 and before from NDK Design for PrestaShop, a guest can perform SQL injection. The method `NdkSpack::getPacks()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection."
+ },
+ {
+ "lang": "es",
+ "value": "En el m\u00f3dulo \"Step by Step products Pack\" (ndk_steppingpack) versi\u00f3n 1.5.6 y anteriores de NDK Design para PrestaShop, un invitado puede realizar inyecci\u00f3n SQL. El m\u00e9todo `NdkSpack::getPacks()` tiene llamadas SQL sensibles que pueden ejecutarse con una llamada http trivial y explotarse para falsificar una inyecci\u00f3n SQL."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46358.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46358.json
new file mode 100644
index 00000000000..3518ee67e1c
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46358.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46358",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:37.747",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In the module \"Referral and Affiliation Program\" (referralbyphone) version 3.5.1 and before from Snegurka for PrestaShop, a guest can perform SQL injection. Method `ReferralByPhoneDefaultModuleFrontController::ajaxProcessCartRuleValidate` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection."
+ },
+ {
+ "lang": "es",
+ "value": "En el m\u00f3dulo \"Referral and Affiliation Program\" (referralbyphone) versi\u00f3n 3.5.1 y anteriores de Snegurka para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL. El m\u00e9todo `ReferralByPhoneDefaultModuleFrontController::ajaxProcessCartRuleValidate` tiene llamadas SQL sensibles que pueden ejecutarse con una llamada http trivial y explotarse para falsificar una inyecci\u00f3n SQL."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://security.friendsofpresta.org/modules/2023/10/24/referralbyphone.html",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46369.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46369.json
new file mode 100644
index 00000000000..89ab5b71b8d
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46369.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46369",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:37.790",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Tenda W18E V16.01.0.8(1576) contains a stack overflow vulnerability via the portMirrorMirroredPorts parameter in the formSetNetCheckTools function."
+ },
+ {
+ "lang": "es",
+ "value": "Tenda W18E V16.01.0.8(1576) contiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s del par\u00e1metro portMirrorMirroredPorts en la funci\u00f3n formSetNetCheckTools."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/Archerber/bug_submit/blob/main/Tenda/W18E/bug1.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46370.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46370.json
new file mode 100644
index 00000000000..a02963c1ab0
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46370.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46370",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:37.830",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Tenda W18E V16.01.0.8(1576) has a command injection vulnerability via the hostName parameter in the formSetNetCheckTools function."
+ },
+ {
+ "lang": "es",
+ "value": "Tenda W18E V16.01.0.8(1576) tiene una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro hostName en la funci\u00f3n formSetNetCheckTools."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/Archerber/bug_submit/blob/main/Tenda/W18E/bug2.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46371.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46371.json
new file mode 100644
index 00000000000..b22423badea
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46371.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46371",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:37.877",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-Link device TL-WDR7660 2.0.30 has a stack overflow vulnerability via the function upgradeInfoJsonToBin."
+ },
+ {
+ "lang": "es",
+ "value": "El dispositivo TP-Link TL-WDR7660 2.0.30 tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s de la funci\u00f3n UpgradeInfoJsonToBin."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/Archerber/bug_submit/blob/main/TP-Link/TL-WDR7660/2.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46373.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46373.json
new file mode 100644
index 00000000000..f92e7692be4
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46373.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46373",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:37.917",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-Link TL-WDR7660 2.0.30 has a stack overflow vulnerability via the function deviceInfoJsonToBincauses."
+ },
+ {
+ "lang": "es",
+ "value": "TP-Link TL-WDR7660 2.0.30 tiene una vulnerabilidad de desbordamiento de pila a trav\u00e9s de la funci\u00f3n deviceInfoJsonToBincauses."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/Archerber/bug_submit/blob/main/TP-Link/TL-WDR7660/3.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46374.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46374.json
new file mode 100644
index 00000000000..0cd42105830
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46374.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46374",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T00:15:09.327",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "ZenTao Enterprise Edition version 4.1.3 and before is vulnerable to Cross Site Scripting (XSS)."
+ },
+ {
+ "lang": "es",
+ "value": "ZenTao Enterprise Edition versi\u00f3n 4.1.3 y anteriores es vulnerable a Cross Site Scripting (XSS)."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://narrow-payment-2cd.notion.site/ZenTao-4-1-3-is-vulnerable-to-Cross-Site-Scripting-xss-CVE-2023-46374-ebdc61e7a88443b481b649764ba66dee",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46375.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46375.json
new file mode 100644
index 00000000000..cfc175faa12
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46375.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46375",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T01:15:32.173",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "ZenTao Biz version 4.1.3 and before is vulnerable to Cross Site Request Forgery (CSRF)."
+ },
+ {
+ "lang": "es",
+ "value": "ZenTao Biz versi\u00f3n 4.1.3 y anteriores es vulnerable a Cross Site Request Forgery (CSRF)."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://narrow-payment-2cd.notion.site/zentao-4-1-3-is-vulnerable-to-csrf-CVE-2023-46375-2d9d9fc2371f483eb436af20508df915",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46376.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46376.json
new file mode 100644
index 00000000000..6a015f76986
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46376.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46376",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T01:15:32.220",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Zentao Biz version 8.7 and before is vulnerable to Information Disclosure."
+ },
+ {
+ "lang": "es",
+ "value": "Zentao Biz versi\u00f3n 8.7 y anteriores es vulnerable a la divulgaci\u00f3n de informaci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://narrow-payment-2cd.notion.site/zentao-8-7-has-information-disclosure-vulnerability-CVE-2023-46376-537fae3936b84af583b51b74e6010dd7",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46393.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46393.json
new file mode 100644
index 00000000000..26b9c303306
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46393.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-46393",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T14:15:08.567",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "gougucms v4.08.18 was discovered to contain a password reset poisoning vulnerability which allows attackers to arbitrarily reset users' passwords via a crafted packet."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gitee.com/gouguopen/gougucms/issues/I88TKH",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46394.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46394.json
new file mode 100644
index 00000000000..339a2e111d7
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46394.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-46394",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T14:15:08.627",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A stored cross-site scripting (XSS) vulnerability in /home/user/edit_submit of gougucms v4.08.18 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the headimgurl parameter."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gitee.com/gouguopen/gougucms/issues/I88TC0",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46396.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46396.json
new file mode 100644
index 00000000000..df6c79a26c0
--- /dev/null
+++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46396.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46396",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:37.957",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Audimex 15.0.0 is vulnerable to Cross Site Scripting (XSS) in /audimex/cgi-bin/wal.fcgi via company parameter search filters."
+ },
+ {
+ "lang": "es",
+ "value": "Audimex 15.0.0 es vulnerable a Cross Site Scripting (XSS) en /audimex/cgi-bin/wal.fcgi a trav\u00e9s de filtros de b\u00fasqueda de par\u00e1metros de la empresa."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://drive.google.com/file/d/13PK6RnYdq7fJKw47ssgLEsQvzHOJttLL/view?usp=sharing",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46407.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46407.json
new file mode 100644
index 00000000000..a9312a7d19a
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46407.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46407",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T20:15:09.087",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "FFmpeg prior to commit bf814 was discovered to contain an out of bounds read via the dist->alphabet_size variable in the read_vlc_prefix() function."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/FFmpeg/FFmpeg/commit/bf814387f42e9b0dea9d75c03db4723c88e7d962",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://patchwork.ffmpeg.org/project/ffmpeg/patch/20231013014959.536776-1-leo.izen@gmail.com/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://patchwork.ffmpeg.org/project/ffmpeg/patch/20231015004924.597746-1-leo.izen@gmail.com/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46408.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46408.json
new file mode 100644
index 00000000000..5ab43932a60
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46408.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46408",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.077",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_ The 41DD80 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n sub_ The 41DD80."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/16/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46409.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46409.json
new file mode 100644
index 00000000000..3218c425b33
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46409.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46409",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.127",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_ 41CC04 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n sub_41CC04."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/13/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46410.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46410.json
new file mode 100644
index 00000000000..0a6d3c65104
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46410.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46410",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.170",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_ The 416F60 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n sub_ The 416F60."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/10/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46411.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46411.json
new file mode 100644
index 00000000000..a28de0b5abb
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46411.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46411",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.213",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_415258 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n sub_415258."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/11/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46412.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46412.json
new file mode 100644
index 00000000000..45f82d1dc2a
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46412.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46412",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.257",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_41D998 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n sub_41D998."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/15/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46413.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46413.json
new file mode 100644
index 00000000000..45c602e688b
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46413.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46413",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.307",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_4155DC function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n sub_4155DC."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/1/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46414.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46414.json
new file mode 100644
index 00000000000..f9ab7def50f
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46414.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46414",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.357",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_ 41D494 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_41D494."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/14/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46415.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46415.json
new file mode 100644
index 00000000000..725a6162784
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46415.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46415",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.400",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_41E588 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_41E588."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/17/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46416.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46416.json
new file mode 100644
index 00000000000..b493eebffbb
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46416.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46416",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.447",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_ The 41A414 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_The 41A414."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/12/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46417.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46417.json
new file mode 100644
index 00000000000..73b8649a9f3
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46417.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46417",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.490",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_415498 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_415498."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/2/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46418.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46418.json
new file mode 100644
index 00000000000..0cd3ebe27af
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46418.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46418",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.540",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_412688 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_412688."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/7/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46419.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46419.json
new file mode 100644
index 00000000000..e33f70db505
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46419.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46419",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.600",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_415730 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_415730."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/6/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46420.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46420.json
new file mode 100644
index 00000000000..688a400140f
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46420.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46420",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.670",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_41590C function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_41590C."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/5/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46421.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46421.json
new file mode 100644
index 00000000000..1cdc9036ce5
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46421.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46421",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.740",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_411D00 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_411D00."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/8/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46422.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46422.json
new file mode 100644
index 00000000000..ff5973e9ca4
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46422.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46422",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.803",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_411994 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_411994."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/9/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46423.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46423.json
new file mode 100644
index 00000000000..5b7a93f087f
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46423.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46423",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.863",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_417094 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_417094."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/4/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46424.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46424.json
new file mode 100644
index 00000000000..99e81e764b1
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46424.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46424",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T20:15:12.927",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_422BD4 function."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X6000R v9.4.0cu.652_B20230116 contiene una vulnerabilidad de ejecuci\u00f3n remota de comandos (RCE) a trav\u00e9s de la funci\u00f3n sub_422BD4."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/3/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46435.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46435.json
new file mode 100644
index 00000000000..93dd65e8d05
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46435.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46435",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T18:15:08.767",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sourcecodester Packers and Movers Management System v1.0 is vulnerable to SQL Injection via mpms/?p=services/view_service&id."
+ },
+ {
+ "lang": "es",
+ "value": "Sourcecodester Packers and Movers Management System v1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de mpms/?p=services/view_service&id."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/kirra-max/bug_reports/blob/main/packers-and-movers-management-system-phpoop-free-source-code/SQL-1.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46449.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46449.json
new file mode 100644
index 00000000000..463632faebc
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46449.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46449",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T15:15:09.257",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sourcecodester Free and Open Source inventory management system v1.0 is vulnerable to Incorrect Access Control. An arbitrary user can change the password of another user and takeover the account via IDOR in the password change function."
+ },
+ {
+ "lang": "es",
+ "value": "El sistema de gesti\u00f3n de inventario Gratuito y de C\u00f3digo Abierto Sourcecodester v1.0 es vulnerable a un control de acceso incorrecto. Un usuario arbitrario puede cambiar la contrase\u00f1a de otro usuario y hacerse cargo de la cuenta a trav\u00e9s de IDOR en la funci\u00f3n de cambio de contrase\u00f1a."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/sajaljat/CVE-2023-46449/tree/main",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.youtube.com/watch?v=H5QnsOKjs3s",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46450.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46450.json
new file mode 100644
index 00000000000..af36db93854
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46450.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46450",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T15:15:09.317",
+ "lastModified": "2023-10-26T15:32:23.920",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Sourcecodester Free and Open Source inventory management system 1.0 is vulnerable to Cross Site Scripting (XSS) via the Add supplier function."
+ },
+ {
+ "lang": "es",
+ "value": "El sistema de gesti\u00f3n de inventario Gratuito y de C\u00f3digo Abierto Sourcecodester v1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de la funci\u00f3n Agregar proveedor."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/yte121/-CVE-2023-46450/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://youtu.be/LQy0_xIK2q0",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46467.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46467.json
new file mode 100644
index 00000000000..1fa1855bbcd
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46467.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-46467",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-28T01:15:51.707",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in juzawebCMS v.3.4 and before allows a remote attacker to execute arbitrary code via a crafted payload to the username parameter of the registration page."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.sumor.top/index.php/archives/872/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46468.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46468.json
new file mode 100644
index 00000000000..05f5e660ed9
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46468.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-46468",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-28T01:15:51.747",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in juzawebCMS v.3.4 and before allows a remote attacker to execute arbitrary code via a crafted file to the custom plugin function."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.sumor.top/index.php/archives/875/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46490.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46490.json
new file mode 100644
index 00000000000..7ce5b38038b
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46490.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46490",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T22:15:09.100",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SQL Injection vulnerability in Cacti v1.2.25 allows a remote attacker to obtain sensitive information via the form_actions() function in the managers.php function."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/ISHGARD-2/a95632111138fcd7ccf7432ccb145b53",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-f4r3-53jr-654c",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46491.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46491.json
new file mode 100644
index 00000000000..2d98ee9c221
--- /dev/null
+++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46491.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46491",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T00:15:09.363",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "ZenTao Biz version 4.1.3 and before has a Cross Site Scripting (XSS) vulnerability in the Version Library."
+ },
+ {
+ "lang": "es",
+ "value": "ZenTao Biz versi\u00f3n 4.1.3 y anteriores tiene una vulnerabilidad de Cross Site Scripting (XSS) en la librer\u00eda de versiones."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://foremost-smash-52a.notion.site/Zentao-Authorized-XSS-Vulnerability-CVE-2023-46491-eea8cbfe2fab4ea78a174e5275309759",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46503.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46503.json
new file mode 100644
index 00000000000..f14aa8407ab
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46503.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46503",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T04:15:10.673",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a remote attacker to execute arbitrary code via the reader management and book input modules."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en PwnCYN YXBOOKCMS v.1.0.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de los m\u00f3dulos de administraci\u00f3n de lectores y de entrada de libros."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/PwnCYN/YXBOOKCMS/issues/2",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46504.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46504.json
new file mode 100644
index 00000000000..6c2640b7850
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46504.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46504",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T04:15:10.723",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a physically proximate attacker to execute arbitrary code via the library name function in the general settings component."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en PwnCYN YXBOOKCMS v.1.0.2 permite que un atacante f\u00edsicamente cercano ejecute c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de nombre de librer\u00eda en el componente de configuraci\u00f3n general."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/PwnCYN/YXBOOKCMS/issues/1",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46505.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46505.json
new file mode 100644
index 00000000000..70ac6853ba2
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46505.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46505",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T01:15:32.267",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting vulnerability in FanCMS v.1.0.0 allows an attacker to execute arbitrary code via the content1 parameter in the demo.php file."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Cross Site Scripting en FanCMS v.1.0.0 permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro content1 en el archivo demo.php."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/PwnCYN/FanCMS/issues/1",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46509.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46509.json
new file mode 100644
index 00000000000..27c8395d831
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46509.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-46509",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T21:15:09.897",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in Contec SolarView Compact v.6.0 and before allows an attacker to execute arbitrary code via the texteditor.php component."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/ATonysan/d6f72e9eb90407d64bed4566aa80afb1#file-cve-2023-46509",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46510.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46510.json
new file mode 100644
index 00000000000..7ff022d0eb0
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46510.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-46510",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T21:15:09.947",
+ "lastModified": "2023-10-29T01:44:22.497",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in ZIONCOM (Hong Kong) Technology Limited A7000R v.4.1cu.4154 allows an attacker to execute arbitrary code via the cig-bin/cstecgi.cgi to the settings/setPasswordCfg function."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/ATonysan/58ace23d539981441bca16ce0f7585e2",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46518.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46518.json
new file mode 100644
index 00000000000..31be4dc1c22
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46518.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-46518",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.003",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Mercury A15 V1.0 20230818_1.0.3 was discovered to contain a command execution vulnerability via the component cloudDeviceTokenSuccCB."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que Mercury A15 V1.0 20230818_1.0.3 contiene una vulnerabilidad de ejecuci\u00f3n de comandos a trav\u00e9s del componente cloudDeviceTokenSuccCB."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/MERCURY/A15/1/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://service.mercurycom.com.cn/download-2341.html",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.mercurycom.com.cn/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46520.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46520.json
new file mode 100644
index 00000000000..b32b90b1e15
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46520.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46520",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.053",
+ "lastModified": "2023-10-26T22:18:36.137",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function uninstallPluginReqHandle."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila mediante la funci\u00f3n uninstallPluginReqHandle."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/1/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46521.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46521.json
new file mode 100644
index 00000000000..c0daa6e35b1
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46521.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46521",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.100",
+ "lastModified": "2023-10-26T22:41:06.530",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function RegisterRegister."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n RegisterRegister."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/11/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46522.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46522.json
new file mode 100644
index 00000000000..05b20d196a8
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46522.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46522",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.147",
+ "lastModified": "2023-10-26T22:41:11.743",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function deviceInfoRegister."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n deviceInfoRegister."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/2/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46523.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46523.json
new file mode 100644
index 00000000000..1d9f625c5f7
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46523.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46523",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.193",
+ "lastModified": "2023-10-26T22:41:16.507",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function upgradeInfoRegister."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n UpgradeInfoRegister."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/3/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46525.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46525.json
new file mode 100644
index 00000000000..894ab87273d
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46525.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46525",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.237",
+ "lastModified": "2023-10-26T22:41:25.257",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function loginRegister."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n loginRegister."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/12/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46526.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46526.json
new file mode 100644
index 00000000000..4d6f16caa8d
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46526.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46526",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.283",
+ "lastModified": "2023-10-26T22:41:40.603",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function resetCloudPwdRegister."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n resetCloudPwdRegister."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/10/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46527.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46527.json
new file mode 100644
index 00000000000..5a6b57fca4c
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46527.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46527",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.323",
+ "lastModified": "2023-10-26T22:41:32.283",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function bindRequestHandle."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n bindRequestHandle."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/13/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46534.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46534.json
new file mode 100644
index 00000000000..9586345eea3
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46534.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46534",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.373",
+ "lastModified": "2023-10-26T22:41:48.037",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function modifyAccPwdRegister."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n modificarAccPwdRegister."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/9/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46535.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46535.json
new file mode 100644
index 00000000000..45bbc932f87
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46535.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46535",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.420",
+ "lastModified": "2023-10-26T22:41:55.033",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function getResetVeriRegister."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n getResetVeriRegister."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/6/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46536.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46536.json
new file mode 100644
index 00000000000..75013d5ef2a
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46536.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46536",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.463",
+ "lastModified": "2023-10-26T22:42:01.013",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function chkRegVeriRegister."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n chkRegVeriRegister."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/5/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46537.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46537.json
new file mode 100644
index 00000000000..15196c1cfbe
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46537.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46537",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.503",
+ "lastModified": "2023-10-26T22:42:07.053",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function getRegVeriRegister."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n getRegVeriRegister."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/7/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46538.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46538.json
new file mode 100644
index 00000000000..018a9aaf8ae
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46538.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46538",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.550",
+ "lastModified": "2023-10-26T22:42:13.817",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function chkResetVeriRegister."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n chkResetVeriRegister."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/4/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46539.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46539.json
new file mode 100644
index 00000000000..f6cd5c6d4ab
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46539.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46539",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.593",
+ "lastModified": "2023-10-26T22:42:20.953",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function registerRequestHandle."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n RegisterRequestHandle."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:tp-link:tl-wr886n_firmware:3.0.14:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A944D5C3-9666-46E8-A4B9-091EC4D0B64D"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:tp-link:tl-wr886n:7.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F4BA5CF8-3A41-4188-BB96-92C907445266"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/8/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46540.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46540.json
new file mode 100644
index 00000000000..cbee5860001
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46540.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46540",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.637",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formNtp."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formNtp."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/11/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46541.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46541.json
new file mode 100644
index 00000000000..f4101b3f339
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46541.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46541",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.683",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formIpv6Setup."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formIpv6Setup."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/10/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46542.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46542.json
new file mode 100644
index 00000000000..45b5af66fcf
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46542.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46542",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.727",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMeshUploadConfig."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formMeshUploadConfig."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/13/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46543.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46543.json
new file mode 100644
index 00000000000..1e9fba64d32
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46543.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46543",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.780",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formWlSiteSurvey."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formWlSiteSurvey."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/16/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46544.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46544.json
new file mode 100644
index 00000000000..369703495f7
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46544.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46544",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.827",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formWirelessTbl."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formWirelessTbl."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/14/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46545.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46545.json
new file mode 100644
index 00000000000..5f7d27c547e
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46545.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46545",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.873",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formWsc."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formWsc."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/17/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46546.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46546.json
new file mode 100644
index 00000000000..ba544804481
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46546.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46546",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.917",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formStats."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formStats."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/15/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46547.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46547.json
new file mode 100644
index 00000000000..b587aa5fb49
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46547.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46547",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:38.960",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formSysLog."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formSysLog."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/12/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46548.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46548.json
new file mode 100644
index 00000000000..5924ecaef2e
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46548.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46548",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.020",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formWlanRedirect."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formWlanRedirect."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/1/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46549.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46549.json
new file mode 100644
index 00000000000..1c34211de89
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46549.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46549",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.080",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formSetLg."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formSetLg."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/18/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46550.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46550.json
new file mode 100644
index 00000000000..2ad306896a5
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46550.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46550",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.127",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMapDelDevice."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formMapDelDevice."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/21/1.md#2firmware-download-address",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46551.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46551.json
new file mode 100644
index 00000000000..d3455d07dd3
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46551.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46551",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.177",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formReflashClientTbl."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formReflashClientTbl."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/2/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46552.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46552.json
new file mode 100644
index 00000000000..26f7ba035c1
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46552.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46552",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.227",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMultiAP."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formMultiAP."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/19/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46553.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46553.json
new file mode 100644
index 00000000000..11f7f961326
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46553.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46553",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.273",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formParentControl."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formParentControl."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/5/1.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46554.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46554.json
new file mode 100644
index 00000000000..046b1de80a8
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46554.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46554",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.317",
+ "lastModified": "2023-10-27T22:01:03.050",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMapDel."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formMapDel."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65D639C6-D133-46D4-9492-0FC53E83BA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/20/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46555.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46555.json
new file mode 100644
index 00000000000..54d08a5d14c
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46555.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46555",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.363",
+ "lastModified": "2023-10-27T22:00:56.397",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formPortFw."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formPortFw."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65D639C6-D133-46D4-9492-0FC53E83BA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/3/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46556.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46556.json
new file mode 100644
index 00000000000..f5bf3d3f530
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46556.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46556",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.410",
+ "lastModified": "2023-10-27T22:00:49.937",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formFilter."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formFilter."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65D639C6-D133-46D4-9492-0FC53E83BA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/4/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46557.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46557.json
new file mode 100644
index 00000000000..e41aa565163
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46557.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46557",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.450",
+ "lastModified": "2023-10-27T22:00:41.117",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMultiAPVLAN."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formMultiAPVLAN."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65D639C6-D133-46D4-9492-0FC53E83BA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/22/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46558.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46558.json
new file mode 100644
index 00000000000..40643c0217e
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46558.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46558",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.497",
+ "lastModified": "2023-10-27T22:00:33.390",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formMapDelDevice."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formMapDelDevice."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65D639C6-D133-46D4-9492-0FC53E83BA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/25/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46559.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46559.json
new file mode 100644
index 00000000000..9e9cb167403
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46559.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46559",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.547",
+ "lastModified": "2023-10-27T22:00:25.797",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formIPv6Addr."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formIPv6Addr."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65D639C6-D133-46D4-9492-0FC53E83BA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/9/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46560.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46560.json
new file mode 100644
index 00000000000..7c41ce07564
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46560.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46560",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.593",
+ "lastModified": "2023-10-27T22:00:15.483",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formTcpipSetup."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formTcpipSetup."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65D639C6-D133-46D4-9492-0FC53E83BA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/23/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46562.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46562.json
new file mode 100644
index 00000000000..2944e1af1e5
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46562.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46562",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.637",
+ "lastModified": "2023-10-27T22:00:06.663",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formDosCfg."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formDosCfg."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65D639C6-D133-46D4-9492-0FC53E83BA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/8/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46563.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46563.json
new file mode 100644
index 00000000000..7ad5508dacb
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46563.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46563",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.683",
+ "lastModified": "2023-10-27T22:00:00.013",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formIpQoS."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formIpQoS."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65D639C6-D133-46D4-9492-0FC53E83BA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/7/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46564.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46564.json
new file mode 100644
index 00000000000..f697a375c92
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46564.json
@@ -0,0 +1,99 @@
+{
+ "id": "CVE-2023-46564",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.723",
+ "lastModified": "2023-10-27T21:59:51.473",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formDMZ."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 que TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n formDMZ."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
+ "matchCriteriaId": "65D639C6-D133-46D4-9492-0FC53E83BA9E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "299F34FB-4D53-4846-B6F0-4431D61B5154"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/6/1.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Product"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46569.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46569.json
new file mode 100644
index 00000000000..35b7cd303af
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46569.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46569",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-28T02:15:07.583",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32_fpu function of libr/arch/p/nds32/nds32-dis.h."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/radareorg/radare2/issues/22334",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46570.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46570.json
new file mode 100644
index 00000000000..c2c510d9f20
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46570.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46570",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-28T02:15:07.637",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/radareorg/radare2/issues/22333",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46574.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46574.json
new file mode 100644
index 00000000000..e8f61b938bd
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46574.json
@@ -0,0 +1,92 @@
+{
+ "id": "CVE-2023-46574",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T18:17:39.780",
+ "lastModified": "2023-10-27T21:59:44.067",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in TOTOLINK A3700R v.9.1.2u.6165_20211012 allows a remote attacker to execute arbitrary code via the FileName parameter of the UploadFirmwareFile function."
+ },
+ {
+ "lang": "es",
+ "value": "Un problema en TOTOLINK A3700R v.9.1.2u.6165_20211012 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro FileName de la funci\u00f3n UploadFirmwareFile."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-77"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.6165_20211012:*:*:*:*:*:*:*",
+ "matchCriteriaId": "31E7D154-802D-4419-A506-B945525BC33E"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "05777EB4-0963-4317-AB0B-287A2140915D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/OraclePi/repo/blob/main/totolink%20A3700R/1/A3700R%20%20V9.1.2u.6165_20211012%20vuln.md",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46583.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46583.json
new file mode 100644
index 00000000000..5fa4ce63ca4
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46583.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46583",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T22:15:09.547",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Scripting (XSS) vulnerability in PHPGurukul Nipah virus (NiV) \" Testing Management System v.1.0 allows attackers to execute arbitrary code via a crafted payload injected into the State field."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de Cross-Site Scripting (XSS) en PHPGurukul Nipah virus (NiV) \" Testing Management System v.1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo Estado."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/rumble773/sec-research/blob/main/NiV/CVE-2023-46583.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46584.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46584.json
new file mode 100644
index 00000000000..b8f82a37663
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46584.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46584",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-25T22:15:09.590",
+ "lastModified": "2023-10-25T23:05:15.713",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SQL Injection vulnerability in PHPGurukul Nipah virus (NiV) \" Testing Management System v.1.0 allows a remote attacker to escalate privileges via a crafted request to the new-user-testing.php endpoint."
+ },
+ {
+ "lang": "es",
+ "value": "Vulnerabilidad de inyecci\u00f3n SQL en PHPGurukul Nipah virus (NiV) \" Testing Management System v.1.0 permite a un atacante remoto escalar privilegios a trav\u00e9s de una solicitud manipulada al endpoint new-user-testing.php."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/rumble773/sec-research/blob/main/NiV/CVE-2023-46584.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46587.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46587.json
new file mode 100644
index 00000000000..b67806f100e
--- /dev/null
+++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46587.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-46587",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T23:15:07.777",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Buffer Overflow vulnerability in XnView Classic v.2.51.5 allows a local attacker to execute arbitrary code via a crafted TIF file."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/nasroabd/vulns/tree/main/XnView/2.51.5",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46602.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46602.json
new file mode 100644
index 00000000000..39e7c0abd5e
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46602.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-46602",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T20:15:09.137",
+ "lastModified": "2023-10-28T03:26:05.320",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In International Color Consortium DemoIccMAX 79ecb74, there is a stack-based buffer overflow in the icFixXml function in IccXML/IccLibXML/IccUtilXml.cpp in libIccXML.a."
+ },
+ {
+ "lang": "es",
+ "value": "En International Color Consortium DemoIccMAX 79ecb74, hay un desbordamiento del b\u00fafer basado en pila en la funci\u00f3n icFixXml en IccXML/IccLibXML/IccUtilXml.cpp en libIccXML.a."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:color:demoiccmax:2022-06-21:*:*:*:*:*:*:*",
+ "matchCriteriaId": "10975878-B3F5-48A0-80B1-2AC1EBD0298D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46603.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46603.json
new file mode 100644
index 00000000000..37685aa039e
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46603.json
@@ -0,0 +1,81 @@
+{
+ "id": "CVE-2023-46603",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-23T20:15:09.180",
+ "lastModified": "2023-10-28T03:25:08.277",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In International Color Consortium DemoIccMAX 79ecb74, there is an out-of-bounds read in the CIccPRMG::GetChroma function in IccProfLib/IccPrmg.cpp in libSampleICC.a."
+ },
+ {
+ "lang": "es",
+ "value": "En International Color Consortium DemoIccMAX 79ecb74, hay una lectura fuera de l\u00edmites en la funci\u00f3n CIccPRMG::GetChroma en IccProfLib/IccPrmg.cpp en libSampleICC.a."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:color:demoiccmax:2022-06-21:*:*:*:*:*:*:*",
+ "matchCriteriaId": "10975878-B3F5-48A0-80B1-2AC1EBD0298D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53",
+ "source": "cve@mitre.org",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json
new file mode 100644
index 00000000000..261329f8fa3
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46604",
+ "sourceIdentifier": "security@apache.org",
+ "published": "2023-10-27T15:15:14.017",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate\u00a0any class on the classpath.\u00a0\n\nUsers are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@apache.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 10.0,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@apache.org",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/27/5",
+ "source": "security@apache.org"
+ },
+ {
+ "url": "https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt",
+ "source": "security@apache.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46650.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46650.json
new file mode 100644
index 00000000000..7afe3978a65
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46650.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46650",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:39.943",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Jenkins GitHub Plugin 1.37.3 and earlier does not escape the GitHub project URL on the build page when showing changes, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Jenkins GitHub 1.37.3 y versiones anteriores no escapa a la URL del proyecto GitHub en la p\u00e1gina de compilaci\u00f3n cuando muestra cambios, lo que genera una vulnerabilidad de Cross-Site Scripting (XSS) que pueden explotar los atacantes con permiso de elemento/configuraci\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3246",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46651.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46651.json
new file mode 100644
index 00000000000..5e9f401aece
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46651.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46651",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:39.990",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. This fix has been backported to 10.4.1."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Jenkins Warnings 10.5.0 y versiones anteriores no establece el contexto apropiado para la b\u00fasqueda de credenciales, lo que permite a los atacantes con permiso Elemento/Configurar acceder y capturar credenciales a las que no tienen derecho. Esta soluci\u00f3n se ha actualizado a 10.4.1."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3265",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46652.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46652.json
new file mode 100644
index 00000000000..24c1f678cb8
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46652.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46652",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:40.037",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A missing permission check in Jenkins lambdatest-automation Plugin 1.20.9 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of LAMBDATEST credentials stored in Jenkins."
+ },
+ {
+ "lang": "es",
+ "value": "Una verificaci\u00f3n de permiso faltante en el complemento Jenkins lambdatest-automation 1.20.9 y versiones anteriores permite a atacantes con permiso general/lectura enumerar los ID de las credenciales LAMBDATEST almacenadas en Jenkins."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3222",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46653.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46653.json
new file mode 100644
index 00000000000..ee01cd44c2d
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46653.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46653",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:40.083",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Jenkins lambdatest-automation Plugin 1.20.10 and earlier logs LAMBDATEST Credentials access token at the INFO level, potentially resulting in its exposure."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Jenkins lambdatest-automation 1.20.10 y versiones anteriores registran el token de acceso a las credenciales LAMBDATEST en el nivel INFO, lo que podr\u00eda provocar su exposici\u00f3n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3202",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46654.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46654.json
new file mode 100644
index 00000000000..8b4bb6cec4f
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46654.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46654",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:40.130",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the expected directory during the cleanup process of the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to delete arbitrary files on the Jenkins controller file system."
+ },
+ {
+ "lang": "es",
+ "value": "Jenkins CloudBees CD Plugin 1.1.32 y versiones anteriores siguen enlaces simb\u00f3licos a ubicaciones fuera del directorio esperado durante el proceso de limpieza del paso posterior a la compilaci\u00f3n 'CloudBees CD - Publish Artifact', lo que permite a los atacantes configurar trabajos para eliminar archivos arbitrarios en Jenkins controlador del sistema de archivos."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3237",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46655.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46655.json
new file mode 100644
index 00000000000..f2c5a72c7a9
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46655.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46655",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:40.173",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Jenkins CloudBees CD Plugin 1.1.32 and earlier follows symbolic links to locations outside of the directory from which artifacts are published during the 'CloudBees CD - Publish Artifact' post-build step, allowing attackers able to configure jobs to publish arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server."
+ },
+ {
+ "lang": "es",
+ "value": "Jenkins CloudBees CD Plugin 1.1.32 y versiones anteriores siguen enlaces simb\u00f3licos a ubicaciones fuera del directorio desde el cual se publican los artefactos durante el paso posterior a la compilaci\u00f3n 'CloudBees CD - Publish Artifact', lo que permite a los atacantes configurar trabajos para publicar archivos arbitrarios desde Jenkins del controlador sistema de archivos al servidor de CD CloudBees previamente configurado."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3238",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46656.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46656.json
new file mode 100644
index 00000000000..0db4fa53707
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46656.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46656",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:40.223",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Jenkins Multibranch Scan Webhook Trigger Plugin 1.0.9 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Jenkins Multibranch Scan Webhook Trigger 1.0.9 y versiones anteriores utiliza una funci\u00f3n de comparaci\u00f3n de tiempo no constante al comprobar si el token de webhook proporcionado y el esperado son iguales, lo que potencialmente permite a los atacantes utilizar m\u00e9todos estad\u00edsticos para obtener un token de webhook v\u00e1lido."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-2875",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46657.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46657.json
new file mode 100644
index 00000000000..8e3eb84db36
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46657.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46657",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:40.263",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Jenkins Gogs Plugin 1.0.15 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Jenkins Gogs 1.0.15 y versiones anteriores utiliza una funci\u00f3n de comparaci\u00f3n de tiempo no constante al verificar si el token de webhook proporcionado y el esperado son iguales, lo que potencialmente permite a los atacantes usar m\u00e9todos estad\u00edsticos para obtener un token de webhook v\u00e1lido."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-2896",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46658.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46658.json
new file mode 100644
index 00000000000..19c9b152c9e
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46658.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46658",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:40.307",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Jenkins MSTeams Webhook Trigger Plugin 0.1.1 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token."
+ },
+ {
+ "lang": "es",
+ "value": "Jenkins MSTeams Webhook Trigger Plugin 0.1.1 y versiones anteriores utilizan una funci\u00f3n de comparaci\u00f3n de tiempo no constante al comprobar si el token de webhook proporcionado y el esperado son iguales, lo que potencialmente permite a los atacantes utilizar m\u00e9todos estad\u00edsticos para obtener un token de webhook v\u00e1lido."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-2876",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46659.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46659.json
new file mode 100644
index 00000000000..6d26a21aac9
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46659.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46659",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:40.353",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Jenkins Edgewall Trac Plugin 1.13 and earlier does not escape the Trac website URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission."
+ },
+ {
+ "lang": "es",
+ "value": "Jenkins Edgewall Trac Plugin 1.13 y versiones anteriores no escapan de la URL del sitio web de Trac en la p\u00e1gina de compilaci\u00f3n, lo que genera una vulnerabilidad de cross-site scripting (XSS) almacenada que pueden explotar los atacantes con permiso Item/Configure."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3247",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46660.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46660.json
new file mode 100644
index 00000000000..a8e34be4e38
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46660.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-46660",
+ "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
+ "published": "2023-10-25T18:17:40.403",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Jenkins Zanata Plugin 0.6 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token hashes are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token."
+ },
+ {
+ "lang": "es",
+ "value": "Jenkins Zanata Plugin 0.6 y versiones anteriores utilizan una funci\u00f3n de comparaci\u00f3n de tiempo no constante al comprobar si los hashes del token de webhook proporcionado y esperado son iguales, lo que potencialmente permite a los atacantes utilizar m\u00e9todos estad\u00edsticos para obtener un token de webhook v\u00e1lido."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/2",
+ "source": "jenkinsci-cert@googlegroups.com"
+ },
+ {
+ "url": "https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-2879",
+ "source": "jenkinsci-cert@googlegroups.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46661.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46661.json
new file mode 100644
index 00000000000..e532122b72d
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46661.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46661",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T20:15:08.717",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nSielco PolyEco1000 is vulnerable to an attacker escalating their privileges by modifying passwords in POST requests.\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Sielco PolyEco1000 es vulnerable a que un atacante incremente sus privilegios modificando contrase\u00f1as en solicitudes POST."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46662.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46662.json
new file mode 100644
index 00000000000..43b76ff03f1
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46662.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46662",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T20:15:08.780",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\nSielco PolyEco1000 is vulnerable to an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this via a specially crafted request to gain access to sensitive information.\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Sielco PolyEco1000 es afectada por una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n debido a una aplicaci\u00f3n inadecuada del control de acceso. Un atacante remoto no autenticado puede aprovechar esto mediante una solicitud especialmente manipulada para obtener acceso a informaci\u00f3n confidencial."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46663.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46663.json
new file mode 100644
index 00000000000..ac6963a28f3
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46663.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46663",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T21:15:07.903",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\n\n\n\n\nSielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Sielco PolyEco1000 es vulnerable a que un atacante omita la autorizaci\u00f3n y acceda a recursos detr\u00e1s de p\u00e1ginas protegidas. La interfaz de la aplicaci\u00f3n permite a los usuarios realizar ciertas acciones a trav\u00e9s de solicitudes HTTP sin realizar ninguna verificaci\u00f3n de validez para verificar las solicitudes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46664.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46664.json
new file mode 100644
index 00000000000..2abc121e2d7
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46664.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46664",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T21:15:07.967",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\n\n\n\n\n\n\n\n\nSielco PolyEco1000 is vulnerable to an improper access control vulnerability when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources behind protected pages.\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Sielco PolyEco1000 es afectada por una vulnerabilidad de control de acceso inadecuado cuando la aplicaci\u00f3n proporciona acceso directo a objetos bas\u00e1ndose en la entrada proporcionada por el usuario. Como resultado de esta vulnerabilidad, los atacantes pueden eludir la autorizaci\u00f3n y acceder a recursos detr\u00e1s de p\u00e1ginas protegidas."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46665.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46665.json
new file mode 100644
index 00000000000..a616387b886
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46665.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46665",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-26T21:15:08.033",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nSielco PolyEco1000 is vulnerable to an authentication bypass vulnerability due to an attacker modifying passwords in a POST request and gain unauthorized access to the affected device with administrative privileges.\n\n\n\n\n\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Sielco PolyEco1000 es afectada por una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n debido a que un atacante modifica las contrase\u00f1as en una solicitud POST y obtiene acceso no autorizado al dispositivo afectado con privilegios administrativos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07",
+ "source": "ics-cert@hq.dhs.gov"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46666.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46666.json
new file mode 100644
index 00000000000..07989d40867
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46666.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-46666",
+ "sourceIdentifier": "bressers@elastic.co",
+ "published": "2023-10-26T17:15:09.270",
+ "lastModified": "2023-10-26T17:33:34.980",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered when using Document Level Security and the SPO \"Limited Access\" functionality in Elastic Sharepoint Online Python Connector. If a user is assigned limited access permissions to an item on a Sharepoint site then that user would have read permissions to all content on the Sharepoint site through Elasticsearch."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema al utilizar la seguridad a nivel de documento y la funcionalidad de \"acceso limitado\" de SPO en Elastic Sharepoint Online Python Connector. Si a un usuario se le asignan permisos de acceso limitado a un elemento en un sitio de Sharepoint, ese usuario tendr\u00eda permisos de lectura para todo el contenido del sitio de Sharepoint a trav\u00e9s de Elasticsearch."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-284"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://discuss.elastic.co/t/elastic-sharepoint-online-python-connector-v8-10-3-0-security-update/344732",
+ "source": "bressers@elastic.co"
+ },
+ {
+ "url": "https://www.elastic.co/community/security",
+ "source": "bressers@elastic.co"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46667.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46667.json
new file mode 100644
index 00000000000..610004eefc1
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46667.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-46667",
+ "sourceIdentifier": "bressers@elastic.co",
+ "published": "2023-10-26T01:15:07.987",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Fleet Server >= v8.10.0 and < v8.10.3 where Agent enrolment tokens are being inserted into the Fleet Server\u2019s log file in plain text. These enrolment tokens could allow someone to enrol an agent into an agent policy, and potentially use that to retrieve other secrets in the policy including for Elasticsearch and third-party services. Alternatively a threat actor could potentially enrol agents to the clusters and send arbitrary events to Elasticsearch."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en Fleet Server en versiones >= v8.10.0 y < v8.10.3 donde los tokens de inscripci\u00f3n del agente se insertan en el archivo de registro del Fleet Server en texto plano. Estos tokens de inscripci\u00f3n podr\u00edan permitir que alguien inscriba a un agente en una pol\u00edtica de agente y potencialmente usarlo para recuperar otros secretos en la pol\u00edtica, incluso para Elasticsearch y servicios de terceros. Alternativamente, un actor de amenazas podr\u00eda potencialmente inscribir agentes en los cl\u00fasteres y enviar eventos arbitrarios a Elasticsearch."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://discuss.elastic.co/t/fleet-server-v8-10-3-security-update/344737",
+ "source": "bressers@elastic.co"
+ },
+ {
+ "url": "https://www.elastic.co/community/security",
+ "source": "bressers@elastic.co"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46668.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46668.json
new file mode 100644
index 00000000000..de0eff70300
--- /dev/null
+++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46668.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-46668",
+ "sourceIdentifier": "bressers@elastic.co",
+ "published": "2023-10-26T00:15:12.150",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "If Elastic Endpoint (v7.9.0 - v8.10.3) is configured to use a non-default option in which the logging level is explicitly set to debug, and when Elastic Agent is simultaneously configured to collect and send those logs to Elasticsearch, then Elastic Agent API keys can be viewed in Elasticsearch in plaintext. These API keys could be used to write arbitrary data and read Elastic Endpoint user artifacts."
+ },
+ {
+ "lang": "es",
+ "value": "Si Elastic Endpoint (v7.9.0 - v8.10.3) est\u00e1 configurado para usar una opci\u00f3n no predeterminada en la que el nivel de log est\u00e1 configurado expl\u00edcitamente en debug, y cuando Elastic Agent est\u00e1 configurado simult\u00e1neamente para recopilar y enviar esos registros a Elasticsearch, entonces las claves de API del Agente Elastic se pueden ver en Elasticsearch en texto plano. Estas claves API podr\u00edan usarse para escribir datos arbitrarios y leer artefactos de usuario de Elastic Endpoint."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.6,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "bressers@elastic.co",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-532"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://discuss.elastic.co/t/endpoint-v8-10-4-security-update/345203",
+ "source": "bressers@elastic.co"
+ },
+ {
+ "url": "https://www.elastic.co/community/security",
+ "source": "bressers@elastic.co"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json
new file mode 100644
index 00000000000..7ed9a97041d
--- /dev/null
+++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46747.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46747",
+ "sourceIdentifier": "f5sirt@f5.com",
+ "published": "2023-10-26T21:15:08.097",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\nUndisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Las solicitudes no divulgadas pueden omitir la autenticaci\u00f3n de la utilidad de configuraci\u00f3n, lo que permite a un atacante con acceso de red al sistema BIG-IP a trav\u00e9s del puerto de administraci\u00f3n y/o direcciones IP propias ejecutar comandos arbitrarios del sistema. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "f5sirt@f5.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "f5sirt@f5.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-288"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://my.f5.com/manage/s/article/K000137353",
+ "source": "f5sirt@f5.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json
new file mode 100644
index 00000000000..1b1c15bfd88
--- /dev/null
+++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46748.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-46748",
+ "sourceIdentifier": "f5sirt@f5.com",
+ "published": "2023-10-26T21:15:08.177",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An authenticated SQL injection vulnerability exists in the BIG-IP Configuration utility which \n\nmay allow an authenticated attacker with network access to the Configuration utility through the BIG-IP management port and/or self IP addresses to execute arbitrary system commands.\n\n\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL autenticada en la utilidad de configuraci\u00f3n BIG-IP que puede permitir que un atacante autenticado con acceso de red a la utilidad de configuraci\u00f3n a trav\u00e9s del puerto de administraci\u00f3n BIG-IP y/o direcciones IP propias ejecute comandos arbitrarios del sistema. Nota: Las versiones de software que han llegado al End of Technical Support (EoTS) no se eval\u00faan"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "f5sirt@f5.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "f5sirt@f5.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://my.f5.com/manage/s/article/K000137365",
+ "source": "f5sirt@f5.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46752.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46752.json
new file mode 100644
index 00000000000..6f9a1c60cbd
--- /dev/null
+++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46752.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46752",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T05:15:26.067",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en FRRouting FRR hasta la versi\u00f3n 9.0.1. Maneja mal los datos MP_REACH_NLRI con formato incorrecto, lo que provoca un bloqueo."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46753.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46753.json
new file mode 100644
index 00000000000..132b76e2e98
--- /dev/null
+++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46753.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46753",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T05:15:26.127",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en FRRouting FRR hasta la versi\u00f3n 9.0.1. Puede ocurrir una falla para un mensaje de ACTUALIZACI\u00d3N BGP manipulado sin atributos obligatorios, por ejemplo, uno con solo un atributo de tr\u00e1nsito desconocido."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46754.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46754.json
new file mode 100644
index 00000000000..571f1aae4ca
--- /dev/null
+++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46754.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46754",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-26T05:15:26.173",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The admin panel for Obl.ong before 1.1.2 allows authorization bypass because the email OTP feature accepts arbitrary numerical values."
+ },
+ {
+ "lang": "es",
+ "value": "El panel de administraci\u00f3n de Obl.ong anterior a la versi\u00f3n 1.1.2 permite omitir la autorizaci\u00f3n porque la funci\u00f3n OTP de correo electr\u00f3nico acepta valores num\u00e9ricos arbitrarios."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/obl-ong/admin/releases/tag/v1.1.2",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46813.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46813.json
new file mode 100644
index 00000000000..95d2ddb9cc8
--- /dev/null
+++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46813.json
@@ -0,0 +1,40 @@
+{
+ "id": "CVE-2023-46813",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T03:15:08.270",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en el kernel de Linux anterior a 6.5.9, explotable por usuarios locales con acceso al espacio de usuario de los registros MMIO. La verificaci\u00f3n de acceso incorrecta en el controlador #VC y la emulaci\u00f3n de instrucciones de la emulaci\u00f3n SEV-ES de accesos MMIO podr\u00edan provocar un acceso de escritura arbitrario a la memoria del kernel (y, por lo tanto, una escalada de privilegios). Esto depende de una condici\u00f3n de ejecuci\u00f3n mediante la cual el espacio de usuario puede reemplazar una instrucci\u00f3n antes de que el controlador #VC la lea."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://bugzilla.suse.com/show_bug.cgi?id=1212649",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46815.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46815.json
new file mode 100644
index 00000000000..dc47508f328
--- /dev/null
+++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46815.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46815",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T04:15:10.777",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in SugarCRM 12 before 12.0.4 and 13 before 13.0.2. An Unrestricted File Upload vulnerability has been identified in the Notes module. By using a crafted request, custom PHP code can be injected via the Notes module because of missing input validation. An attacker with regular user privileges can exploit this."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en SugarCRM 12 anterior a 12.0.4 y 13 anterior a 13.0.2. Se ha identificado una vulnerabilidad de carga de archivos sin restricciones en el m\u00f3dulo de Notas. Al utilizar una solicitud manipulada, se puede inyectar c\u00f3digo PHP personalizado a trav\u00e9s del m\u00f3dulo de Notas debido a la falta de validaci\u00f3n de entrada. Un atacante con privilegios de usuario habituales puede aprovechar esto."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://support.sugarcrm.com/resources/security/sugarcrm-sa-2023-011/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46816.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46816.json
new file mode 100644
index 00000000000..fdf9f6942cf
--- /dev/null
+++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46816.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46816",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T04:15:10.847",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in SugarCRM 12 before 12.0.4 and 13 before 13.0.2. A Server Site Template Injection (SSTI) vulnerability has been identified in the GecControl action. By using a crafted request, custom PHP code can be injected via the GetControl action because of missing input validation. An attacker with regular user privileges can exploit this."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en SugarCRM 12 anterior a 12.0.4 y 13 anterior a 13.0.2. Se ha identificado una vulnerabilidad de inyecci\u00f3n de plantilla de sitio de servidor (SSTI) en la acci\u00f3n GecControl. Al utilizar una solicitud manipulada, se puede inyectar c\u00f3digo PHP personalizado a trav\u00e9s de la acci\u00f3n GetControl debido a la falta de validaci\u00f3n de entrada. Un atacante con privilegios de usuario habituales puede aprovechar esto."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://support.sugarcrm.com/resources/security/sugarcrm-sa-2023-010/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46818.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46818.json
new file mode 100644
index 00000000000..16984f85508
--- /dev/null
+++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46818.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46818",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T04:15:10.907",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in ISPConfig before 3.2.11p1. PHP code injection can be achieved in the language file editor by an admin if admin_allow_langedit is enabled."
+ },
+ {
+ "lang": "es",
+ "value": "Se descubri\u00f3 un problema en ISPConfig antes de 3.2.11p1. Un administrador puede lograr la inyecci\u00f3n de c\u00f3digo PHP en el editor de archivos de idioma si admin_allow_langedit est\u00e1 habilitado."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.ispconfig.org/blog/ispconfig-3-2-11p1-released/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46852.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46852.json
new file mode 100644
index 00000000000..2eaf58c8744
--- /dev/null
+++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46852.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46852",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T20:15:09.133",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the \"get\" substring."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/memcached/memcached/commit/76a6c363c18cfe7b6a1524ae64202ac9db330767",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/memcached/memcached/compare/1.6.21...1.6.22",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46853.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46853.json
new file mode 100644
index 00000000000..847a1d39fae
--- /dev/null
+++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46853.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46853",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-27T20:15:09.177",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In Memcached before 1.6.22, an off-by-one error exists when processing proxy requests in proxy mode, if \\n is used instead of \\r\\n."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/memcached/memcached/commit/6987918e9a3094ec4fc8976f01f769f624d790fa",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/memcached/memcached/compare/1.6.21...1.6.22",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46854.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46854.json
new file mode 100644
index 00000000000..19e4c280e03
--- /dev/null
+++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46854.json
@@ -0,0 +1,51 @@
+{
+ "id": "CVE-2023-46854",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-28T22:15:08.467",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Proxmox proxmox-widget-toolkit before 4.0.9, as used in multiple Proxmox products, allows XSS via the edit notes feature."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cve@mitre.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://git.proxmox.com/?p=proxmox-widget-toolkit.git;a=commit;h=1326f771b959e576d140da2249c8b5424da6c80d",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://git.proxmox.com/?p=proxmox-widget-toolkit.git;a=commit;h=89699c6466cfd9cc3a81fbc926b62f122c33c23c",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://pve.proxmox.com/wiki/Package_Repositories#sysadmin_test_repo",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46858.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46858.json
new file mode 100644
index 00000000000..666bbd6e583
--- /dev/null
+++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46858.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46858",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-29T01:15:41.087",
+ "lastModified": "2023-10-29T01:44:12.570",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** DISPUTED ** Moodle 4.3 allows /grade/report/grader/index.php?searchvalue= reflected XSS when logged in as a teacher. NOTE: the Moodle Security FAQ link states \"Some forms of rich content [are] used by teachers to enhance their courses ... admins and teachers can post XSS-capable content, but students can not.\""
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://docs.moodle.org/403/en/Security_FAQ#I_have_discovered_Cross_Site_Scripting_.28XSS.29_is_possible_with_Moodle",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://gist.github.com/Abid-Ahmad/12d2b4878eb731e8871b96b7d55125cd",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46862.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46862.json
new file mode 100644
index 00000000000..aee9cafeffd
--- /dev/null
+++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46862.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-46862",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2023-10-29T04:15:11.363",
+ "lastModified": "2023-10-29T04:15:11.363",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://bugzilla.kernel.org/show_bug.cgi?id=218032#c4",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/torvalds/linux/commit/7644b1a1c9a7ae8ab99175989bfc8676055edb46",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4601.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4601.json
new file mode 100644
index 00000000000..ce0989cca01
--- /dev/null
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4601.json
@@ -0,0 +1,133 @@
+{
+ "id": "CVE-2023-4601",
+ "sourceIdentifier": "security@ni.com",
+ "published": "2023-10-18T20:15:09.340",
+ "lastModified": "2023-10-28T03:47:10.133",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A stack-based buffer overflow vulnerability exists in NI System Configuration that could result in information disclosure and/or arbitrary code execution. Successful exploitation requires that an attacker can provide a specially crafted response. This affects NI System Configuration 2023 Q3 and all previous versions.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad de desbordamiento del b\u00fafer basada en pila en NI System Configuration que podr\u00eda resultar en la divulgaci\u00f3n de informaci\u00f3n y/o la ejecuci\u00f3n de c\u00f3digo arbitrario. La explotaci\u00f3n exitosa requiere que un atacante pueda proporcionar una respuesta especialmente manipulada. Esto afecta a NI System Configuration 2023 Q3 y todas las versiones anteriores."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@ni.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "security@ni.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-121"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ni:system_configuration:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2023",
+ "matchCriteriaId": "03D265BD-D3D1-4A7E-A634-8B462670C606"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ni:system_configuration:2023:q2:*:*:*:*:*:*",
+ "matchCriteriaId": "7C6610AD-ED02-499E-AC1F-40B84C024ABC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ni:system_configuration:2023:q3:*:*:*:*:*:*",
+ "matchCriteriaId": "0C706BE1-391C-4452-90CC-D2B69619ABB3"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.ni.com/en/support/documentation/supplemental/23/stack-based-buffer-overflow-in-ni-system-configuration.html",
+ "source": "security@ni.com",
+ "tags": [
+ "Mitigation",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4606.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4606.json
new file mode 100644
index 00000000000..50c1e12e2e7
--- /dev/null
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4606.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-4606",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-25T18:17:41.487",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An authenticated XCC user with Read-Only permission can change a different user\u2019s password through a crafted API command.\u00a0\u00a0\n\nThis affects ThinkSystem v2 and v3 servers with XCC; ThinkSystem v1 servers are not affected."
+ },
+ {
+ "lang": "es",
+ "value": "Un usuario XCC autenticado con permiso de solo lectura puede cambiar la contrase\u00f1a de un usuario diferente mediante un comando API manipulado. Esto afecta a los servidores ThinkSystem v2 y v3 con XCC; Los servidores ThinkSystem v1 no se ven afectados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-140960",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4607.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4607.json
new file mode 100644
index 00000000000..701962be92e
--- /dev/null
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4607.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-4607",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-25T18:17:41.560",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An authenticated XCC user can change permissions for any user through a crafted API command."
+ },
+ {
+ "lang": "es",
+ "value": "Un usuario XCC autenticado puede cambiar los permisos de cualquier usuario mediante un comando API manipulado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-269"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-140960",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4608.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4608.json
new file mode 100644
index 00000000000..60a5a0a7a03
--- /dev/null
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4608.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-4608",
+ "sourceIdentifier": "psirt@lenovo.com",
+ "published": "2023-10-25T18:17:41.670",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An authenticated XCC user with elevated privileges can perform blind SQL injection in limited cases through a crafted API command.\u00a0\n\nThis affects ThinkSystem v2 and v3 servers with XCC; ThinkSystem v1 servers are not affected."
+ },
+ {
+ "lang": "es",
+ "value": "Un usuario de XCC autenticado con privilegios elevados puede realizar una inyecci\u00f3n blind SQL en casos limitados a trav\u00e9s de un comando API manipulado. Esto afecta a los servidores ThinkSystem v2 y v3 con XCC; Los servidores ThinkSystem v1 no se ven afectados."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.7,
+ "impactScore": 3.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@lenovo.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.lenovo.com/us/en/product_security/LEN-140960",
+ "source": "psirt@lenovo.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4620.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4620.json
index 2624fd269ef..dbe39ddbd47 100644
--- a/CVE-2023/CVE-2023-46xx/CVE-2023-4620.json
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4620.json
@@ -2,15 +2,42 @@
"id": "CVE-2023-4620",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T09:15:11.627",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T18:25:27.040",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Booking Calendar WordPress plugin before 9.7.3.1 does not sanitize and escape some of its booking from data, allowing unauthenticated users to perform Stored Cross-Site Scripting attacks against administrators"
+ },
+ {
+ "lang": "es",
+ "value": "El complemento de WordPress Booking Calendar anterior a la versi\u00f3n 9.7.3.1 no sanitiza ni escapa algunas de sus reservas de los datos, lo que permite a usuarios no autenticados realizar ataques de Cross-Site Scripting (XSS) Almacenado contra administradores."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -23,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpbookingcalendar:booking_calendar:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "9.7.3.1",
+ "matchCriteriaId": "64B57519-F785-4B96-9AB7-E7C67C397254"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/084e9494-2f9e-4420-9bf7-78a1a41433d7",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4622.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4622.json
index 61323dd5503..b69ff04db62 100644
--- a/CVE-2023/CVE-2023-46xx/CVE-2023-4622.json
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4622.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4622",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-09-06T14:15:12.193",
- "lastModified": "2023-09-11T18:15:11.493",
+ "lastModified": "2023-10-29T02:43:44.230",
"vulnStatus": "Analyzed",
"descriptions": [
{
@@ -86,8 +86,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "6.4.15",
- "matchCriteriaId": "AE02A61A-E8BA-45B0-BA09-833FBAB89E71"
+ "versionStartIncluding": "4.2",
+ "versionEndExcluding": "6.1.47",
+ "matchCriteriaId": "E2B663A2-B1DE-4295-920F-3DEB478483C2"
}
]
}
@@ -99,6 +100,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
@@ -128,6 +134,14 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
{
"url": "https://www.debian.org/security/2023/dsa-5492",
"source": "cve-coordination@google.com",
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4623.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4623.json
index d3a98095ec5..eb8ac0221dc 100644
--- a/CVE-2023/CVE-2023-46xx/CVE-2023-4623.json
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4623.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4623",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-09-06T14:15:12.357",
- "lastModified": "2023-09-11T18:15:48.930",
+ "lastModified": "2023-10-29T02:40:35.057",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de Use After Free en el componente net/sched: sch_hfsc (HFSC qdisc traffic control) del kernel de Linux puede ser explotada para conseguir una escalada local de privilegios. Si una clase con una curva de compartici\u00f3n de enlaces (es decir, con la flag HFSC_FSC establecida) tiene un padre sin una curva de compartici\u00f3n de enlaces, entonces init_vf() llamar\u00e1 a vttree_insert() en el padre, pero vttree_remove() se omitir\u00e1 en update_vf(). Esto deja un puntero colgando que puede causar un Use-After-Free. Recomendamos actualizar desde el commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f. "
}
],
"metrics": {
@@ -86,13 +90,24 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
- "versionEndIncluding": "2.5.75",
- "matchCriteriaId": "D5893A86-1141-4D63-AC5A-819A556D79D8"
- },
+ "versionStartIncluding": "2.6.12",
+ "versionEndExcluding": "6.6",
+ "matchCriteriaId": "61BB9C3D-67A1-4EDE-AEDD-6460508C0A7E"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
{
"vulnerable": true,
- "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
- "matchCriteriaId": "169446DE-67F8-4738-91FE-ED8058118F80"
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@@ -117,6 +132,14 @@
"Patch",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4635.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4635.json
new file mode 100644
index 00000000000..389182ba6f5
--- /dev/null
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4635.json
@@ -0,0 +1,119 @@
+{
+ "id": "CVE-2023-4635",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-21T08:15:08.897",
+ "lastModified": "2023-10-27T19:42:48.070",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The EventON plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento EventON para WordPress es vulnerable a Cross-Site Scripting reflejado a trav\u00e9s del par\u00e1metro 'tab' en versiones hasta la 2.2.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:myeventon:eventon-lite:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.2.2",
+ "matchCriteriaId": "077DF211-FA27-4DD1-9AE1-8D616F91AD8D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/xsn1210/vul/blob/main/xss%5BEventON%5D%20.md",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/115ad0b2-febe-485a-8fb5-9bd6edc37ef7?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4643.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4643.json
index 0efadfbfce0..be027690553 100644
--- a/CVE-2023/CVE-2023-46xx/CVE-2023-4643.json
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4643.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4643",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:15.743",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T16:25:09.403",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Enable Media Replace de WordPress anterior a 4.1.3 deserializa la entrada del usuario a trav\u00e9s de la funci\u00f3n Remove Background, lo que podr\u00eda permitir a los usuarios con permisos de autor o superiores realizar inyecci\u00f3n de objetos PHP cuando hay un gadget adecuado presente en el blog"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:shortpixel:enable_media_replace:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.1.3",
+ "matchCriteriaId": "86C7EE6D-B245-41E7-9227-2E2E2CA4D5E5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/d9125604-2236-435c-a67c-07951a1fc5b1",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4645.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4645.json
new file mode 100644
index 00000000000..38a584a5916
--- /dev/null
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4645.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4645",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-19T02:15:07.740",
+ "lastModified": "2023-10-25T15:30:49.483",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Ad Inserter for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.7.30 via the ai_ajax function. This can allow unauthenticated attackers to extract sensitive data such as post titles and slugs (including those of protected posts along with their passwords), usernames, available roles, the plugin license key provided the remote debugging option is enabled. In the default state it is disabled."
+ },
+ {
+ "lang": "es",
+ "value": "Ad Inserter para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en versiones hasta la 2.7.30 incluida a trav\u00e9s de la funci\u00f3n ai_ajax. Esto puede permitir a atacantes no autenticados extraer datos confidenciales, como t\u00edtulos de publicaciones y slugs (incluidos los de publicaciones protegidas junto con sus contrase\u00f1as), nombres de usuario, roles disponibles y la clave de licencia del complemento, siempre que la opci\u00f3n de depuraci\u00f3n remota est\u00e9 habilitada. En el estado predeterminado est\u00e1 deshabilitado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:igorfuna:ad_inserter:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.7.30",
+ "matchCriteriaId": "6074113F-CFDC-4053-9D2B-199B6891F5D0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/ad-inserter/trunk/ad-inserter.php#L6529",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2969942%40ad-inserter%2Ftags%2F2.7.31&old=2922718%40ad-inserter%2Ftrunk",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/57b3eef3-e165-45ac-89d7-2a2a6529b310?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4646.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4646.json
index 1ecf72d3443..4b8efa6cf93 100644
--- a/CVE-2023/CVE-2023-46xx/CVE-2023-4646.json
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4646.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4646",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:15.830",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T16:23:03.313",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Simple Posts Ticker de WordPress anterior a 1.1.6 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior para realizar ataques Cross-Site Scripting almacenados."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:sayandatta:simple_posts_ticker:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.1.6",
+ "matchCriteriaId": "D14F3F27-F240-4AE0-8428-A757BDF3EE8F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/c34f8dcc-3be6-44ad-91a4-7c3a0ce2f9d7",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4648.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4648.json
new file mode 100644
index 00000000000..12a8128a873
--- /dev/null
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4648.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-4648",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.410",
+ "lastModified": "2023-10-27T18:47:09.933",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The WP Customer Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 3.6.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WP Customer Reviews para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s de la configuraci\u00f3n de administrador en versiones hasta la 3.6.6 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gowebsolutions:wp_customer_reviews:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.6.7",
+ "matchCriteriaId": "F626C567-20D8-4DD3-87F7-3C856AD6346F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2965658/wp-customer-reviews/trunk?contextall=1&old=2882143&old_path=%2Fwp-customer-reviews%2Ftrunk",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f81950be-de32-4fa1-94fe-42667414fe2d?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4666.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4666.json
index 9eb85edffe1..5cde3c57f96 100644
--- a/CVE-2023/CVE-2023-46xx/CVE-2023-4666.json
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4666.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4666",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:15.927",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T16:53:48.423",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Form Maker by 10Web WordPress anterior al 15.1.20 no valida las firmas cuando las crea en el servidor a partir de la entrada del usuario, lo que permite a usuarios no autenticados crear archivos arbitrarios y conducir a RCE"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.15.20",
+ "matchCriteriaId": "BC0EA9F1-E6B1-4ACB-984A-2D4CAE5319A9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/c6597e36-02d6-46b4-89db-52c160f418be",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4668.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4668.json
new file mode 100644
index 00000000000..c67c37c7afa
--- /dev/null
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4668.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-4668",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.477",
+ "lastModified": "2023-10-27T18:46:59.783",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Ad Inserter for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.7.30 via the ai-debug-processing-fe URL parameter. This can allow unauthenticated attackers to extract sensitive data including installed plugins (present and active), active theme, various plugin settings, WordPress version, as well as some server settings such as memory limit, installation paths."
+ },
+ {
+ "lang": "es",
+ "value": "Ad Inserter para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en versiones hasta la 2.7.30 incluida a trav\u00e9s del par\u00e1metro de URL ai-debug-processing-fe. Esto puede permitir a atacantes no autenticados extraer datos confidenciales, incluidos complementos instalados (presentes y activos), tema activo, varias configuraciones de complementos, versi\u00f3n de WordPress, as\u00ed como algunas configuraciones del servidor, como l\u00edmite de memoria y rutas de instalaci\u00f3n."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ad_inserter_project:ad_inserter:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.7.31",
+ "matchCriteriaId": "45694BCA-476F-4C75-BB05-59D7F6560056"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2969942%40ad-inserter%2Ftags%2F2.7.31&old=2922718%40ad-inserter%2Ftrunk",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce457c98-c55b-4b71-a80b-393eceb9effd?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4687.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4687.json
index 4c348769b24..9727eec59fb 100644
--- a/CVE-2023/CVE-2023-46xx/CVE-2023-4687.json
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4687.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4687",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.013",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T14:04:51.140",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Page Builder: Pagelayer de WordPress anterior a 1.7.7 no impide que atacantes no autenticados actualicen el c\u00f3digo del encabezado o pie de p\u00e1gina de una publicaci\u00f3n en publicaciones programadas."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.7.7",
+ "matchCriteriaId": "F79036E6-42A4-497F-9653-B159E9507969"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/31596fc5-4203-40c4-9b0a-e8a37faafddd",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4691.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4691.json
index 898e9a94ca0..116233a3450 100644
--- a/CVE-2023/CVE-2023-46xx/CVE-2023-4691.json
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4691.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4691",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.093",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T13:37:23.997",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Online Booking and Scheduling Plugin de WordPress anterior a la versi\u00f3n 22.4 no sanitiza ni escapa adecuadamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que genera una inyecci\u00f3n de SQL explotable por usuarios con privilegios elevados, como el administrador"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:booking-wp-plugin:bookly:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "22.4",
+ "matchCriteriaId": "93C4990A-9A85-4BE3-BD6F-4FA4E81E12A1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/5085ec75-0795-4004-955d-e71b3d2c26c6",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json
new file mode 100644
index 00000000000..3c7c935ef29
--- /dev/null
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-4692",
+ "sourceIdentifier": "secalert@redhat.com",
+ "published": "2023-10-25T18:17:41.743",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una falla de escritura fuera de los l\u00edmites en el controlador del sistema de archivos NTFS de grub2. Este problema puede permitir que un atacante presente una imagen del sistema de archivos NTFS especialmente manipulada, lo que provoca la corrupci\u00f3n de los metadatos del mont\u00f3n de grub. En algunas circunstancias, el ataque tambi\u00e9n puede da\u00f1ar los metadatos del mont\u00f3n del firmware UEFI. Como resultado, se puede lograr la ejecuci\u00f3n de c\u00f3digo arbitrario y eludir la protecci\u00f3n de arranque seguro."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert@redhat.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://access.redhat.com/security/cve/CVE-2023-4692",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236613",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://dfir.ru/2023/10/03/cve-2023-4692-cve-2023-4693-vulnerabilities-in-the-grub-boot-manager/",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://lists.gnu.org/archive/html/grub-devel/2023-10/msg00028.html",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://seclists.org/oss-sec/2023/q4/37",
+ "source": "secalert@redhat.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json
new file mode 100644
index 00000000000..d5b65dafe7d
--- /dev/null
+++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-4693",
+ "sourceIdentifier": "secalert@redhat.com",
+ "published": "2023-10-25T18:17:41.817",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una falla de lectura fuera de los l\u00edmites en el controlador del sistema de archivos NTFS de grub2. Este problema puede permitir que un atacante f\u00edsicamente presente presente una imagen del sistema de archivos NTFS especialmente manipulada para leer ubicaciones de memoria arbitrarias. Un ataque exitoso permite que se filtren datos confidenciales almacenados en cach\u00e9 en la memoria o valores de variables EFI, lo que presenta un alto riesgo de confidencialidad."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert@redhat.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 0.8,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://access.redhat.com/security/cve/CVE-2023-4693",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238343",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://dfir.ru/2023/10/03/cve-2023-4692-cve-2023-4693-vulnerabilities-in-the-grub-boot-manager/",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://lists.gnu.org/archive/html/grub-devel/2023-10/msg00028.html",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://seclists.org/oss-sec/2023/q4/37",
+ "source": "secalert@redhat.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4725.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4725.json
index bf289ec0b90..261fc6425e5 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4725.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4725.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4725",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.170",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T11:43:44.547",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Simple Posts Ticker de WordPress anterior a 1.1.6 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting almacenados incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:sayandatta:simple_posts_ticker:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.1.6",
+ "matchCriteriaId": "D14F3F27-F240-4AE0-8428-A757BDF3EE8F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/e9b9a594-c960-4692-823e-23fc60cca7e7",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json
index 81688e1abe1..69d09c30882 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4733",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-04T14:15:07.563",
- "lastModified": "2023-10-16T19:13:04.597",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T00:15:12.223",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -116,6 +116,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "security@huntr.dev"
+ },
{
"url": "https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c",
"source": "security@huntr.dev",
@@ -152,6 +156,10 @@
"tags": [
"Mailing List"
]
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "security@huntr.dev"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4734.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4734.json
index 41f70f649ef..3663ce86c7e 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4734.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4734.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4734",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-02T18:15:17.127",
- "lastModified": "2023-09-08T15:22:57.160",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T00:15:12.297",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846."
+ },
+ {
+ "lang": "es",
+ "value": "Un Desbordamiento de Enteros o Wraparound en el repositorio de GitHub vim/vim version anterior a 9.0.1846."
}
],
"metrics": {
@@ -87,6 +91,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "security@huntr.dev"
+ },
{
"url": "https://github.com/vim/vim/commit/4c6fe2e2ea62469642ed1d80b16d39e616b25cf5",
"source": "security@huntr.dev",
@@ -102,6 +110,10 @@
"Patch",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "security@huntr.dev"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4735.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4735.json
index 6af6da112b3..46b18f7e551 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4735.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4735.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4735",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-02T18:15:20.637",
- "lastModified": "2023-09-08T15:28:23.527",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T00:15:12.990",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847."
+ },
+ {
+ "lang": "es",
+ "value": "Escritura fuera de l\u00edmites en el repositorio de GitHub vim/vim en versiones anteriores a la 9.0.1847."
}
],
"metrics": {
@@ -87,6 +91,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "security@huntr.dev"
+ },
{
"url": "https://github.com/vim/vim/commit/889f6af37164775192e33b233a90e86fd3df0f57",
"source": "security@huntr.dev",
@@ -102,6 +110,10 @@
"Patch",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "security@huntr.dev"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4736.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4736.json
index 25abae392d6..5737f9c131b 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4736.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4736.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4736",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-02T19:15:44.863",
- "lastModified": "2023-09-08T16:37:59.583",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T00:15:13.057",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Untrusted Search Path in GitHub repository vim/vim prior to 9.0.1833."
+ },
+ {
+ "lang": "es",
+ "value": "Ruta de b\u00fasqueda no fiable en el repositorio de GitHub vim/vim anterior a la versi\u00f3n 9.0.1833."
}
],
"metrics": {
@@ -87,6 +91,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "security@huntr.dev"
+ },
{
"url": "https://github.com/vim/vim/commit/816fbcc262687b81fc46f82f7bbeb1453addfe0c",
"source": "security@huntr.dev",
@@ -102,6 +110,10 @@
"Patch",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "security@huntr.dev"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4738.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4738.json
index 9d5cafb59c2..e79d17c8e84 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4738.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4738.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4738",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-02T20:15:07.413",
- "lastModified": "2023-09-08T14:46:27.187",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T00:15:13.850",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848."
+ },
+ {
+ "lang": "es",
+ "value": "Desbordamiento de b\u00fafer basado en el heap en el repositorio de GitHub vim/vim versi\u00f3 anterior a 9.0.1848."
}
],
"metrics": {
@@ -87,6 +91,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "security@huntr.dev"
+ },
{
"url": "https://github.com/vim/vim/commit/ced2c7394aafdc90fb7845e09b3a3fee23d48cb1",
"source": "security@huntr.dev",
@@ -102,6 +110,10 @@
"Patch",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "security@huntr.dev"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4746.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4746.json
index 772380693c3..2f0b0a0afd1 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4746.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4746.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4746",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-04T01:15:07.437",
- "lastModified": "2023-09-06T20:32:05.507",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:41.993",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability classified as critical has been found in TOTOLINK N200RE V5 9.3.5u.6437_B20230519. This affects the function Validity_check. The manipulation leads to format string. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238635."
+ "value": "A vulnerability classified as critical has been found in TOTOLINK N200RE V5 9.3.5u.6437_B20230519. This affects the function Validity_check. The manipulation leads to format string. It is possible to initiate the attack remotely. The root-cause of the vulnerability is a format string issue. But the impact is to bypass the validation which leads to to OS command injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238635."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como cr\u00edtica se ha encontrado en TOTOLINK N200RE V5 9.3.5u.6437_B20230519. Esto afecta a la comprobaci\u00f3n de validez. La manipulaci\u00f3n conduce a formatear la cadena. Es posible iniciar el ataque de forma remota. La causa principal de la vulnerabilidad es un problema de cadena de formato. Pero el impacto es eludir la validaci\u00f3n que conduce a la inyecci\u00f3n de comandos del sistema operativo. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-238635."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json
index a1cf6a1f6a5..7c2ab835f0a 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4750",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-04T14:15:08.263",
- "lastModified": "2023-10-16T19:13:09.647",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T00:15:13.937",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -116,6 +116,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "security@huntr.dev"
+ },
{
"url": "https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed",
"source": "security@huntr.dev",
@@ -152,6 +156,10 @@
"tags": [
"Mailing List"
]
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "security@huntr.dev"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4751.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4751.json
index 75069976fc0..2447adfa762 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4751.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4751.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4751",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-03T19:15:43.677",
- "lastModified": "2023-09-08T12:58:23.437",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T00:15:14.770",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331."
+ },
+ {
+ "lang": "es",
+ "value": "Desbordamiento de b\u00fafer del mont\u00edculo en el repositorio de GitHub vim/vim anterior a la versi\u00f3n 9.0.1331. "
}
],
"metrics": {
@@ -58,22 +62,22 @@
},
"weaknesses": [
{
- "source": "nvd@nist.gov",
+ "source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
- "value": "CWE-787"
+ "value": "CWE-122"
}
]
},
{
- "source": "security@huntr.dev",
+ "source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
- "value": "CWE-122"
+ "value": "CWE-787"
}
]
}
@@ -97,6 +101,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "security@huntr.dev"
+ },
{
"url": "https://github.com/vim/vim/commit/e1121b139480f53d1b06f84f3e4574048108fa0b",
"source": "security@huntr.dev",
@@ -112,6 +120,10 @@
"Patch",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "security@huntr.dev"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json
index b88a87a81ec..9e8752f6b06 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4752",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-04T14:15:08.450",
- "lastModified": "2023-10-16T19:13:58.133",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T00:15:14.847",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -131,6 +131,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "security@huntr.dev"
+ },
{
"url": "https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139",
"source": "security@huntr.dev",
@@ -176,6 +180,10 @@
"tags": [
"Mailing List"
]
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "security@huntr.dev"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4753.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4753.json
index 98a7954bad9..adc0a18689d 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4753.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4753.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-4753",
"sourceIdentifier": "scy@openharmony.io",
"published": "2023-09-21T10:15:09.597",
- "lastModified": "2023-09-22T13:50:21.603",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T08:15:07.527",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
- "value": "OpenHarmony v3.2.1 and prior version has a liteos-a kernel may crash caused by mqueue undetected entries vulnerability. Local attackers can crash liteos-a kernel by the error input\u00a0"
+ "value": "OpenHarmony v3.2.1 and prior version has a system call function usage error. Local attackers can crash kernel by the error input."
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4776.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4776.json
index 47eed440845..5508ca645ea 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4776.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4776.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4776",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.250",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:35:17.487",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,10 +14,33 @@
"value": "El complemento School Management System de WordPress anterior a 2.2.5 utiliza la funci\u00f3n WordPress esc_sql() en un campo no delimitado por comillas y no prepar\u00f3 primero la consulta, lo que lleva a una inyecci\u00f3n de SQL explotable por usuarios con privilegios relativamente bajos, como los Profesores."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
- "source": "contact@wpscan.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -25,12 +48,44 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "contact@wpscan.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:igexsolutions:wpschoolpress:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.2.5",
+ "matchCriteriaId": "A92AF61E-9711-4ABE-BA78-32F89469072F"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/59dd3917-01cb-479f-a557-021b2a5147df",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4781.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4781.json
index 96ac024acb7..68a71b43406 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4781.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4781.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4781",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-05T19:15:49.207",
- "lastModified": "2023-10-16T19:13:49.960",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-26T00:15:15.570",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873."
+ },
+ {
+ "lang": "es",
+ "value": "Desbordamiento de b\u00fafer basado en el heap en el repositorio de GitHub vim/vim anterior a la versi\u00f3n 9.0.1873. "
}
],
"metrics": {
@@ -102,6 +106,10 @@
}
],
"references": [
+ {
+ "url": "http://seclists.org/fulldisclosure/2023/Oct/24",
+ "source": "security@huntr.dev"
+ },
{
"url": "https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93",
"source": "security@huntr.dev",
@@ -126,6 +134,10 @@
"Mailing List",
"Third Party Advisory"
]
+ },
+ {
+ "url": "https://support.apple.com/kb/HT213984",
+ "source": "security@huntr.dev"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4783.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4783.json
index 0a7a75b42cd..c6ea2f57ada 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4783.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4783.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4783",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.333",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:38:47.053",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Magee Shortcodes de WordPress hasta la versi\u00f3n 2.1.1 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el shortcode, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior para realizar ataques Cross-Site Scripting almacenados."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:hoosoft:magee_shortcodes:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.1.1",
+ "matchCriteriaId": "7274ADAA-9DA9-47C7-B225-BBAF4145D958"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/02928db8-ceb3-471a-b626-ca661d073e4f",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4795.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4795.json
index f426ae8173e..19c149f3de7 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4795.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4795.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4795",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.413",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:41:25.017",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Testimonial Slider Shortcode de WordPress anterior a 1.1.9 no valida ni escapa algunos de sus atributos de shortcode antes de devolverlos a la p\u00e1gina, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como colaborador realizar ataques de Cross-Site Scripting almacenados que podr\u00edan ser utilizado contra usuarios con altos privilegios como el administrador"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:sazzadh:testimonial_slider_shortcode:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.1.9",
+ "matchCriteriaId": "BAA08745-AB60-443C-ABE5-06C9ED1D466C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/b8390b4a-b43f-4bf6-a61b-dfcbc7b2e7a0",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4796.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4796.json
new file mode 100644
index 00000000000..9f52342d6e8
--- /dev/null
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4796.json
@@ -0,0 +1,125 @@
+{
+ "id": "CVE-2023-4796",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.540",
+ "lastModified": "2023-10-27T18:46:47.060",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Booster for WooCommerce for WordPress is vulnerable to Information Disclosure via the 'wcj_wp_option' shortcode in versions up to, and including, 7.1.0 due to insufficient controls on the information retrievable via the shortcode. This makes it possible for authenticated attackers, with subscriber-level capabilities or above, to retrieve arbitrary sensitive site options."
+ },
+ {
+ "lang": "es",
+ "value": "El Booster for WooCommerce para WordPress es vulnerable a la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del shortcode 'wcj_wp_option' en versiones hasta la 7.1.0 incluida debido a controles insuficientes sobre la informaci\u00f3n recuperable a trav\u00e9s del shortcode. Esto hace posible que atacantes autenticados, con capacidades de nivel de suscriptor o superior, recuperen opciones confidenciales arbitrarias del sitio."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "7.1.1",
+ "matchCriteriaId": "A4A54A07-D727-4280-B32E-C6FE557ED125"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/tags/7.1.0/includes/shortcodes/class-wcj-general-shortcodes.php#L450",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2966325/woocommerce-jetpack#file1",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a4cd49b2-ff93-4582-906b-b690d8472c38?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4798.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4798.json
index f3a1c9d6319..53bed538830 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4798.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4798.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4798",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.500",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-23T14:05:48.180",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento User Avatar de WordPress anterior a 1.2.2 no sanitiza ni escapa adecuadamente a algunos de sus atributos de shortcodes, lo que podr\u00eda permitir a usuarios con privilegios relativamente bajos, como los contribuyentes, realizar ataques XSS almacenados."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpexperts:user_avatar-reloaded:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.2.2",
+ "matchCriteriaId": "5FF0EC19-45C4-4033-9544-A47EB2B350C5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/273a95bf-39fe-4ba7-bc14-9527acfd9f42",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4800.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4800.json
index a43c3f83f18..c6908bfc98f 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4800.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4800.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4800",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.583",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:48:00.807",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento DoLogin Security de WordPress anterior a 3.7.1 no restringe el acceso a un widget que muestra las IP de inicios de sesi\u00f3n fallidos a usuarios con pocos privilegios."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpdo:dologin_security:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.7.1",
+ "matchCriteriaId": "8EE7CD6C-0178-4F2F-997C-151679471E44"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/7eae1434-8c7a-4291-912d-a4a07b73ee56",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4805.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4805.json
index 42437e9a226..0ab809fe12c 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4805.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4805.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4805",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.670",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:40:46.200",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Tutor LMS de WordPress anterior a 2.3.0 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios como suscriptores realizar ataques de Cross-Site Scripting almacenados incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en configuraci\u00f3n multisitio)."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.3.0",
+ "matchCriteriaId": "0529B052-121B-4D65-8F6B-CA71881F4FBC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/1049e940-49b1-4236-bea2-c636f35c5647",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json
index 830c1379a27..94a9d02c481 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4806",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-18T17:15:55.813",
- "lastModified": "2023-10-05T16:15:12.443",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T17:59:57.000",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -92,6 +92,41 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "936B046D-ADEB-4701-8957-AC28CFA9C5C9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "98638583-9933-42F2-964E-7F8E7CF36918"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "056DABF5-0C1D-4EBA-B02B-443BACB20D6F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "910C9542-26FC-4635-9351-128727971830"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09AAD850-019A-46B8-A5A1-845DE048D30A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA3C5EAE-267F-410F-8AFA-8F5B68A9E617"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86034E5B-BCDD-4AFD-A460-38E790F608F5"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
@@ -106,6 +141,106 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F7DAD7C-9369-4A87-A1D0-4208D3AF0CDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "9A879F9F-F087-45D4-BD65-2990276477D2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32AF225E-94C0-4D07-900C-DD868C05F554"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22C65F53-D624-48A9-A9B7-4C78A31E19F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AA1F902F-1AD5-489F-B420-A3574D1880B9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_s390x:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "EEAC443B-622E-49FB-8C0F-2864B7EF5F80"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "23D471AC-7DCA-4425-AD91-E5D928753A8C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.2_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "ED521457-498F-4E43-B714-9A3F2C3CD09A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F91F9255-4EE1-43C7-8831-D2B6C228BFD9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99952557-C766-4B9E-8BF5-DBBA194349FF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC6A25CB-907A-4D05-8460-A2488938A8BE"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22D28543-C7C5-46B0-B909-20435AF7A501"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
@@ -115,27 +250,45 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/4",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/5",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/6",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/8",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5453",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5455",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4806",
@@ -154,19 +307,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202310-03",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4811.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4811.json
index 3d20010c551..e8293869a33 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4811.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4811.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4811",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.747",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T21:08:11.530",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento WordPress File Upload de WordPress anterior a 4.23.3 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como los contribuyentes, realizar ataques de Cross-Site Scripting almacenados."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.23.3",
+ "matchCriteriaId": "B3E86BFF-F54B-404B-802D-BA1870BE1A53"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/7f9271f2-4de4-4be3-8746-2a3f149eb1d1",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4819.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4819.json
index 20ef8e5f2f3..a0bc44c4102 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4819.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4819.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4819",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.830",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:40:29.413",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Shared Files de WordPress anterior a 1.7.6 no devuelve el encabezado de tipo de contenido correcto para el archivo cargado especificado. Por lo tanto, un atacante puede cargar una extensi\u00f3n de archivo permitida inyectada con scripts maliciosos."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tammersoft:shared_files:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.7.6",
+ "matchCriteriaId": "AFF83EF2-1F14-4AC7-9092-0392BF071A87"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/4423b023-cf4a-46cb-b314-7a09ac08b29a",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4820.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4820.json
index fe6c8de6ad7..917f8aa7af7 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4820.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4820.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4820",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.913",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:37:53.280",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento PowerPress Podcasting por el complemento Blubrry WordPress anterior a 11.0.12 no sanitiza ni escapa del campo de URL de medios en las publicaciones, lo que podr\u00eda permitir a los usuarios con privilegios tan bajos como colaborador inyectar scripts web arbitrarios que podr\u00edan apuntar a un administrador o s\u00faper administrador del sitio."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:blubrry:powerpress:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "11.0.12",
+ "matchCriteriaId": "7463AB7A-4418-4360-97EF-2DF859362287"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/e866a214-a142-43c7-b93d-ff2301a3e432",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4821.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4821.json
index 43c7416f220..b1ac9ad95d4 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4821.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4821.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4821",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:16.990",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:36:41.173",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Drag and Drop Multiple File Upload para WooCommerce de WordPress anterior a 1.1.1 no filtra todas las extensiones de archivos potencialmente peligrosas. Por lo tanto, un atacante puede cargar archivos .shtml o .svg no seguros que contengan scripts maliciosos."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:codedropz:drag_and_drop_multiple_file_uploader:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.1.1",
+ "matchCriteriaId": "EAD32F5A-3043-4E25-9905-5257A2E4C978"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/3ac0853b-03f7-44b9-aa9b-72df3e01a9b5",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4822.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4822.json
index b6983a44d92..b63e19d833f 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4822.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4822.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4822",
"sourceIdentifier": "security@grafana.com",
"published": "2023-10-16T09:15:11.687",
- "lastModified": "2023-10-17T10:15:10.193",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:30:55.880",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ },
{
"source": "security@grafana.com",
"type": "Secondary",
@@ -39,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "security@grafana.com",
"type": "Secondary",
@@ -50,10 +80,53 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "8.0.0",
+ "versionEndExcluding": "9.4.16",
+ "matchCriteriaId": "8CFCC7A6-6B10-4D58-943A-B06CC89E7CC3"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "9.5.0",
+ "versionEndExcluding": "9.5.11",
+ "matchCriteriaId": "C9F3F5A1-5ADC-4EAC-A5A7-45AC526CC1AA"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "10.0.0",
+ "versionEndExcluding": "10.0.7",
+ "matchCriteriaId": "BF4F5EE8-DF8D-4D2E-B5DD-A6B07B5D38D0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:enterprise:*:*:*",
+ "versionStartIncluding": "10.1.0",
+ "versionEndExcluding": "10.1.3",
+ "matchCriteriaId": "690FA2F5-C60D-48C6-9440-49D67FFEC735"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://grafana.com/security/security-advisories/cve-2023-4822",
- "source": "security@grafana.com"
+ "source": "security@grafana.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4827.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4827.json
index 059139b6488..eb7601ce809 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4827.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4827.json
@@ -2,15 +2,42 @@
"id": "CVE-2023-4827",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T09:15:11.767",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T20:11:32.780",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The File Manager Pro WordPress plugin before 1.8 does not properly check the CSRF nonce in the `fs_connector` AJAX action. This allows attackers to make highly privileged users perform unwanted file system actions via CSRF attacks by using GET requests, such as uploading a web shell."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento File Manager Pro de WordPress anterior a la versi\u00f3n 1.8 no verifica correctamente el nonce de CSRF en la acci\u00f3n AJAX `fs_connector`. Esto permite a los atacantes hacer que usuarios con privilegios elevados realicen acciones no deseadas en el sistema de archivos mediante ataques CSRF mediante solicitudes GET, como cargar una shell web."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -23,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ninjateam:filester:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.8",
+ "matchCriteriaId": "5B2E68E3-2AFE-4427-B27A-214ACDFA4906"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/d4daf0e1-8018-448a-964c-427a355e005f",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4829.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4829.json
index 04e5a2041f3..f71202a8169 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4829.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4829.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-4829",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-13T13:15:12.523",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T16:10:31.727",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository froxlor/froxlor prior to 2.0.22."
+ },
+ {
+ "lang": "es",
+ "value": "Cross-Site Scripting (XSS) Almacenado en el repositorio de GitHub froxlor/froxlor anterior a 2.0.22."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@@ -46,14 +72,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.0.22",
+ "matchCriteriaId": "3A1F0C8D-0EC2-4AEF-8800-3FCE3B9D9240"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/froxlor/froxlor/commit/4711a414360782fe4fc94f7c25027077cbcdf73d",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/babd73ca-6c80-4145-8c7d-33a883fe606b",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4834.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4834.json
index 0fbbb745b62..23a197a1e05 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4834.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4834.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4834",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-10-16T09:15:11.830",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-24T14:52:35.443",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In Red Lion Europe\u00a0mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an\u00a0improperly implemented access validation allows an authenticated, low privileged\u00a0attacker to gain read access to limited, non-critical device information in his account he should not have access to.\n\n\n\n\t\t\t\t\t\n\n\n\t\t\t\t\n\n\n\t\t\t\n\n\n\t\t\n\n\n\t\n"
+ },
+ {
+ "lang": "es",
+ "value": "En Red Lion Europe mbCONNECT24 y mymbCONNECT24 y Helmholz myREX24 y myREX24.virtual hasta la versi\u00f3n 2.14.2 incluida, una validaci\u00f3n de acceso implementada incorrectamente permite a un atacante autenticado y con pocos privilegios obtener acceso de lectura a informaci\u00f3n limitada y no cr\u00edtica del dispositivo a la que no deber\u00eda tener acceso en su cuenta."
}
],
"metrics": {
@@ -46,14 +50,86 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:helmholz:myrex24:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.14.2",
+ "matchCriteriaId": "6B75F1E4-3DFA-4163-A9C7-8CF5C9A78562"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:helmholz:myrex24.virtual:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.14.2",
+ "matchCriteriaId": "885E9E11-89FE-468F-8160-EC3B21E6CA77"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.14.2",
+ "matchCriteriaId": "2029F9FB-397A-490D-A86F-B2B39C516A79"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.14.2",
+ "matchCriteriaId": "0F77AC2B-5B57-4CFF-A4F1-AA8E6B1B8C3B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-041",
- "source": "info@cert.vde.com"
+ "source": "info@cert.vde.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-043",
- "source": "info@cert.vde.com"
+ "source": "info@cert.vde.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4853.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4853.json
index 3852697bf9d..00b108931ba 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4853.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4853.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4853",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-20T10:15:14.947",
- "lastModified": "2023-10-13T01:23:33.670",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-25T18:17:42.163",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -208,6 +208,14 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://access.redhat.com/errata/RHSA-2023:6107",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://access.redhat.com/errata/RHSA-2023:6112",
+ "source": "secalert@redhat.com"
+ },
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4853",
"source": "secalert@redhat.com",
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4861.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4861.json
index 4d48927c84a..539babba31a 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4861.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4861.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4861",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.067",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:32:40.190",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento File Manager Pro de WordPress anterior a 1.8.1 permite a los usuarios administradores cargar archivos arbitrarios, incluso en entornos donde dicho usuario no deber\u00eda poder obtener el control total del servidor, como una instalaci\u00f3n multisitio. Esto conduce a la ejecuci\u00f3n remota de c\u00f3digo."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ninjateam:filester:*:*:*:*:wordpress:*:*:*",
+ "versionEndExcluding": "1.8.1",
+ "matchCriteriaId": "78AAA1D7-6536-45D4-9D02-16837D6FE671"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/7fa03f00-25c7-4e40-8592-bb4001ce019d",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4862.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4862.json
index c7fb0bf6670..87c11d53a69 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4862.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4862.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4862",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.153",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:29:33.090",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento File Manager Pro de WordPress anterior a 1.8.1 no valida ni escapa adecuadamente algunas entradas, lo que genera XSS por parte de usuarios con altos privilegios."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ninjateam:filester:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.8.1",
+ "matchCriteriaId": "645F11B5-27E9-4229-B2CE-E912E1743E10"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/81821bf5-69e1-4005-b3eb-d541490909cc",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json
index 732397291ec..1e46d4613e7 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4863",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T15:15:24.327",
- "lastModified": "2023-10-02T02:15:44.943",
+ "lastModified": "2023-10-28T19:15:38.643",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-09-13",
"cisaActionDue": "2023-10-04",
@@ -414,6 +414,10 @@
"url": "https://security.netapp.com/advisory/ntap-20230929-0011/",
"source": "chrome-cve-admin@google.com"
},
+ {
+ "url": "https://sethmlarson.dev/security-developer-in-residence-weekly-report-16",
+ "source": "chrome-cve-admin@google.com"
+ },
{
"url": "https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/",
"source": "chrome-cve-admin@google.com",
@@ -422,6 +426,10 @@
"Third Party Advisory"
]
},
+ {
+ "url": "https://www.bentley.com/advisories/be-2023-0001/",
+ "source": "chrome-cve-admin@google.com"
+ },
{
"url": "https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/",
"source": "chrome-cve-admin@google.com",
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4896.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4896.json
new file mode 100644
index 00000000000..92fa2923505
--- /dev/null
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4896.json
@@ -0,0 +1,107 @@
+{
+ "id": "CVE-2023-4896",
+ "sourceIdentifier": "security-alert@hpe.com",
+ "published": "2023-10-17T20:15:10.490",
+ "lastModified": "2023-10-24T20:53:59.203",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability exists which allows an authenticated attacker to access sensitive information on the AirWave Management Platform web-based management interface. Successful exploitation allows the attacker to gain access to some data that could be further exploited to laterally access devices managed and monitored by the AirWave server."
+ },
+ {
+ "lang": "es",
+ "value": "Existe una vulnerabilidad que permite a un atacante autenticado acceder a informaci\u00f3n confidencial en la interfaz de administraci\u00f3n basada en web de AirWave Management Platform. La explotaci\u00f3n exitosa permite al atacante obtener acceso a algunos datos que podr\u00edan explotarse a\u00fan m\u00e1s para acceder lateralmente a los dispositivos administrados y monitorizados por el servidor AirWave."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security-alert@hpe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 4.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "8.2.15.2",
+ "matchCriteriaId": "50CCD31B-43C0-4487-A2F0-0C4177C6C0B2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:arubanetworks:airwave:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "8.3.0",
+ "versionEndExcluding": "8.3.0.2",
+ "matchCriteriaId": "5867865B-AE3D-4F9F-8B28-98E0CC1CEBA9"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-015.txt",
+ "source": "security-alert@hpe.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4900.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4900.json
index 10ffdb814e2..17e9190d96b 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4900.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4900.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4900",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.537",
- "lastModified": "2023-10-02T02:15:45.110",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T20:12:54.150",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -78,6 +78,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -98,19 +143,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4901.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4901.json
index 4975cb95ef1..41a2aa4ad9f 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4901.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4901.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4901",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.603",
- "lastModified": "2023-10-02T02:15:45.183",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T20:13:09.360",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,6 +66,46 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,19 +126,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4902.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4902.json
index e306812bb50..ee857154c7d 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4902.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4902.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4902",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.657",
- "lastModified": "2023-10-02T02:15:45.250",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T20:13:29.797",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,6 +66,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,19 +131,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4903.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4903.json
index 107cddcc773..906186b9be4 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4903.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4903.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4903",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.717",
- "lastModified": "2023-10-02T02:15:45.310",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T20:14:02.777",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -78,6 +78,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -98,19 +143,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4904.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4904.json
index 26685619bc0..7592ae92ae7 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4904.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4904.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4904",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.777",
- "lastModified": "2023-10-02T02:15:45.370",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T19:51:00.467",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,6 +66,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,19 +131,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4905.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4905.json
index 678b191d8c5..f1454b6e7e8 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4905.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4905.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4905",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.837",
- "lastModified": "2023-10-02T02:15:45.430",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T19:54:42.733",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,6 +66,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,19 +131,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4906.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4906.json
index e10ee718863..f178f595c16 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4906.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4906.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4906",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.893",
- "lastModified": "2023-10-02T02:15:45.490",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T20:02:16.117",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,6 +66,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,19 +131,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4907.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4907.json
index 74526684729..e14b1ad6b78 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4907.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4907.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4907",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.950",
- "lastModified": "2023-10-02T02:15:45.550",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T20:02:45.343",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -78,6 +78,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -98,19 +143,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4908.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4908.json
index f9445fdff71..cd231c71760 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4908.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4908.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4908",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:09.010",
- "lastModified": "2023-10-02T02:15:45.627",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T20:02:51.120",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,6 +66,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,19 +131,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4909.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4909.json
index 6282e6f8e18..0289cd61c82 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4909.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4909.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4909",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:09.073",
- "lastModified": "2023-10-02T02:15:45.687",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-17T20:14:06.793",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -66,6 +66,51 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,19 +131,31 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4919.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4919.json
new file mode 100644
index 00000000000..ada663d9b60
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4919.json
@@ -0,0 +1,132 @@
+{
+ "id": "CVE-2023-4919",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:16.033",
+ "lastModified": "2023-10-27T17:16:18.990",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The iframe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `iframe` shortcode in versions up to, and including, 4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permission and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This was partially patched in version 4.6 and fully patched in version 4.7."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento iframe para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del shortcode `iframe` en versiones hasta la 4.6 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permiso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto fue parcheado parcialmente en la versi\u00f3n 4.6 y completamente parcheado en la versi\u00f3n 4.7."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:iframe_project:iframe:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.7",
+ "matchCriteriaId": "9EF9E40D-E2D5-4E14-A070-61F0EB1C41BF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/iframe/tags/4.5/iframe.php#L28",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/iframe/tags/4.5/iframe.php#L40",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970787/iframe#file4",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3706deed-55f2-4dfb-bfed-7a14872cd15a?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4920.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4920.json
new file mode 100644
index 00000000000..fff030ae598
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4920.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4920",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:16.133",
+ "lastModified": "2023-10-25T09:55:42.560",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the woobe_save_options function. This makes it possible for unauthenticated attackers to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Additionally, input sanitization and escaping is insufficient resulting in the possibility of malicious script injection."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 1.1.3.3 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n woobe_save_options. Esto hace posible que atacantes no autenticados modifiquen la configuraci\u00f3n del complemento mediante una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace. Adem\u00e1s, la sanitizaci\u00f3n y el escape de la entrada son insuficientes, lo que genera la posibilidad de inyecci\u00f3n de scripts maliciosos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/index.php#L805",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/index.php?contextall=1&old=2968292&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Findex.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58d25eeb-b12c-4850-8308-eaa30982b5a8?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4921.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4921.json
index a284b9136bb..eb037debe84 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4921.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4921.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4921",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-09-12T20:15:10.573",
- "lastModified": "2023-09-14T19:38:11.107",
+ "lastModified": "2023-10-29T02:39:14.720",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad de use-after-free en el componente net/sched: sch_qfq del kernel de Linux se puede explotar para lograr una escalada de privilegios local. Cuando el complemento qdisc se utiliza como una clase de qfq qdisc, el env\u00edo de paquetes de red activa el uso despu\u00e9s de la liberaci\u00f3n en qfq_dequeue() debido al controlador .peek incorrecto de sch_plug y la falta de verificaci\u00f3n de errores en agg_dequeue(). Recomendamos actualizar al commit anterior 8fc134fee27f2263988ae38920bc03da416b03d8."
}
],
"metrics": {
@@ -93,6 +97,21 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -114,6 +133,14 @@
"Patch",
"Vendor Advisory"
]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4923.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4923.json
new file mode 100644
index 00000000000..2f7a323aae3
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4923.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4923",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.607",
+ "lastModified": "2023-10-25T10:00:03.823",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the woobe_bulkoperations_delete function. This makes it possible for unauthenticated attackers to delete products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 1.1.3.3 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n woobe_bulk Operations_delete. Esto hace posible que atacantes no autenticados eliminen productos mediante una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php#L344",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulkoperations%2Fbulkoperations.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7a4db03d-ec40-4145-aa95-fee78bda5205?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4924.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4924.json
new file mode 100644
index 00000000000..f883093da25
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4924.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4924",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.673",
+ "lastModified": "2023-10-25T09:59:44.397",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.1.3.3. This is due to missing capability checks on the woobe_bulkoperations_delete function. This makes it possible for authenticated attackers, with subscriber access or higher, to delete products."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a la falta de autorizaci\u00f3n en versiones hasta la 1.1.3.3 incluida. Esto se debe a que faltan comprobaciones de capacidad en la funci\u00f3n woobe_bulk Operations_delete. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, eliminen productos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php#L344",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulkoperations%2Fbulkoperations.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7dfd0246-4265-4dde-8a1e-18b7042eae74?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4926.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4926.json
new file mode 100644
index 00000000000..51fb1277131
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4926.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4926",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.737",
+ "lastModified": "2023-10-25T09:59:30.113",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the woobe_bulk_delete_products function. This makes it possible for unauthenticated attackers to delete products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 1.1.3.3 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n woobe_bulk_delete_products. Esto hace posible que atacantes no autenticados eliminen productos mediante una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulk/bulk.php#L159",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulk/bulk.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulk%2Fbulk.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab633506-63a1-4be1-b402-c7f0bcc4ea7a?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4933.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4933.json
index e72be5e0213..fd60d61c1ce 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4933.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4933.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4933",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.243",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:26:05.353",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,11 +14,44 @@
"value": "El complemento WP Job Openings de WordPress anterior a 3.4.3 no bloquea la lista de contenidos de los directorios donde almacena archivos adjuntos a las solicitudes de empleo, lo que permite a los visitantes no autenticados enumerar y descargar archivos adjuntos privados si la funci\u00f3n autoindex del servidor web est\u00e1 habilitada."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
"weaknesses": [
{
- "source": "contact@wpscan.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-668"
+ }
+ ]
+ },
+ {
+ "source": "contact@wpscan.com",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -27,10 +60,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:awsm:job_openings:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.4.3",
+ "matchCriteriaId": "47FE8203-1531-480E-AC87-FE528F192FFC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/882f6c36-44c6-4273-81cd-2eaaf5e81fa7",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4935.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4935.json
new file mode 100644
index 00000000000..40de0f1f5b3
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4935.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4935",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:16.247",
+ "lastModified": "2023-10-25T09:56:29.583",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the create_profile function. This makes it possible for unauthenticated attackers to create profiles via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 1.1.3.3 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n create_profile. Esto hace posible que atacantes no autenticados creen perfiles a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/classes/models/profiles.php#L191",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/classes/models/profiles.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fclasses%2Fmodels%2Fprofiles.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/639f3941-7783-4500-aca4-5e8155db6460?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4936.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4936.json
index b9f6f9e576f..83627c4e98f 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4936.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4936.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-4936",
"sourceIdentifier": "PSIRT@synaptics.com",
"published": "2023-10-11T17:15:11.117",
- "lastModified": "2023-10-11T21:04:52.423",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T17:10:02.883",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "It is possible to sideload a compromised DLL during the installation at elevated privilege."
+ },
+ {
+ "lang": "es",
+ "value": "Es posible descargar una DLL comprometida durante la instalaci\u00f3n con privilegios elevados."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
{
"source": "PSIRT@synaptics.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-427"
+ }
+ ]
+ },
{
"source": "PSIRT@synaptics.com",
"type": "Secondary",
@@ -46,18 +80,45 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:synaptics:displaylink_usb_graphics:*:*:*:*:*:windows:*:*",
+ "versionEndExcluding": "11.2m0",
+ "matchCriteriaId": "556A4D18-8E24-49D3-B621-EC40C16431E4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.synaptics.com/",
- "source": "PSIRT@synaptics.com"
+ "source": "PSIRT@synaptics.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://www.synaptics.com/products/displaylink-graphics/downloads/windows",
- "source": "PSIRT@synaptics.com"
+ "source": "PSIRT@synaptics.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://www.synaptics.com/sites/default/files/nr-154525-tc-synaptics_displaylink_windows_driver_security_brief_-_oct2023.pdf",
- "source": "PSIRT@synaptics.com"
+ "source": "PSIRT@synaptics.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4937.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4937.json
new file mode 100644
index 00000000000..ffd7c419a03
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4937.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4937",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:16.357",
+ "lastModified": "2023-10-25T10:01:25.260",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the woobe_bulkoperations_apply_default_combination function. This makes it possible for unauthenticated attackers to manipulate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 1.1.3.3 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n woobe_bulk Operations_apply_default_combination. Esto hace posible que atacantes no autenticados manipulen productos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php#L286",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulkoperations%2Fbulkoperations.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/40bf51bf-efb2-4504-815b-4681d1078f77?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4938.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4938.json
new file mode 100644
index 00000000000..bc6c099c058
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4938.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4938",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-18T08:15:08.207",
+ "lastModified": "2023-10-25T10:00:26.250",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.1.3.3. This is due to a missing capability check on the woobe_bulkoperations_apply_default_combination function. This makes it possible for authenticated attackers (subscriber or higher) to manipulate products."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a la falta de autorizaci\u00f3n en versiones hasta la 1.1.3.3 incluida. Esto se debe a que falta una verificaci\u00f3n de capacidad en la funci\u00f3n woobe_bulk Operations_apply_default_combination. Esto hace posible que atacantes autenticados (suscriptor o superior) manipulen productos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php#L286",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulkoperations%2Fbulkoperations.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c42f56a2-b9f9-40ef-86ad-fea6cf2e29f8?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4939.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4939.json
new file mode 100644
index 00000000000..a9a5e7eb534
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4939.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-4939",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-21T08:15:08.980",
+ "lastModified": "2023-10-21T08:33:34.447",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The SALESmanago plugin for WordPress is vulnerable to Log Injection in versions up to, and including, 3.2.4. This is due to the use of a weak authentication token for the /wp-json/salesmanago/v1/callbackApiV3 API endpoint which is simply a SHA1 hash of the site URL and client ID found in the page source of the website. This makes it possible for unauthenticated attackers to inject arbitrary content into the log files, and when combined with another vulnerability this could have significant consequences."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento SALESmanago para WordPress es vulnerable a la inyecci\u00f3n de registros en versiones hasta la 3.2.4 incluida. Esto se debe al uso de un token de autenticaci\u00f3n d\u00e9bil para el endpoint API /wp-json/salesmanago/v1/callbackApiV3 que es simplemente un hash SHA1 de la URL del sitio y el ID del cliente que se encuentran en la fuente de la p\u00e1gina del sitio web. Esto hace posible que atacantes no autenticados inyecten contenido arbitrario en los archivos de registro y, cuando se combina con otra vulnerabilidad, esto podr\u00eda tener consecuencias importantes."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-305"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/salesmanago/trunk/src/Admin/Controller/CallbackController.php",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/salesmanago/trunk/src/Includes/Helper.php#L376",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de7db1d6-b352-44c7-a6cc-b21cb65a0482?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4940.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4940.json
new file mode 100644
index 00000000000..4fa6247b694
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4940.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4940",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:16.440",
+ "lastModified": "2023-10-25T10:01:14.417",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the woobe_bulkoperations_swap function. This makes it possible for unauthenticated attackers to manipulate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 1.1.3.3 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n woobe_bulk Operations_swap. Esto hace posible que atacantes no autenticados manipulen productos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php#L521",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulkoperations%2Fbulkoperations.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/31c5e524-ef4d-48c7-baa0-595f8060a167?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4941.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4941.json
new file mode 100644
index 00000000000..a9071b0eaba
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4941.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4941",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.800",
+ "lastModified": "2023-10-25T09:59:10.270",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.1.3.3. This is due to a missing capability check on the woobe_bulkoperations_swap function. This makes it possible for authenticated attackers (subscriber or higher) to manipulate products."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a la falta de autorizaci\u00f3n en versiones hasta la 1.1.3.3 incluida. Esto se debe a que falta una verificaci\u00f3n de capacidad en la funci\u00f3n woobe_bulk Operations_swap. Esto hace posible que atacantes autenticados (suscriptor o superior) manipulen productos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php#L521",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulkoperations%2Fbulkoperations.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc20f303-cac3-4517-9c45-153c410a13af?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4942.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4942.json
new file mode 100644
index 00000000000..a2139afd0a3
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4942.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4942",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:16.550",
+ "lastModified": "2023-10-25T10:00:59.927",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the woobe_bulkoperations_visibility function. This makes it possible for unauthenticated attackers to manipulate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 1.1.3.3 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n woobe_bulk Operations_visibility. Esto hace posible que atacantes no autenticados manipulen productos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php#L719",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulkoperations%2Fbulkoperations.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26d8b75b-befa-4c6a-b072-0da44e437174?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4943.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4943.json
new file mode 100644
index 00000000000..019ea50ee6a
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4943.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4943",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:16.653",
+ "lastModified": "2023-10-25T10:00:42.130",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BEAR for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.1.3.3. This is due to a missing capability check on the woobe_bulkoperations_visibility function. This makes it possible for authenticated attackers (subscriber or higher) to manipulate products."
+ },
+ {
+ "lang": "es",
+ "value": "BEAR para WordPress es vulnerable a la falta de autorizaci\u00f3n en versiones hasta la 1.1.3.3 incluida. Esto se debe a que falta una verificaci\u00f3n de capacidad en la funci\u00f3n woobe_bulk Operations_visibility. Esto hace posible que atacantes autenticados (suscriptor o superior) manipulen productos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.1.3.3",
+ "matchCriteriaId": "746A3E4C-7BC1-4BD9-8F26-4A44D6B54F3E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php#L719",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulkoperations%2Fbulkoperations.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d10475f-83dd-4e59-83e4-aeaa72a22b96?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4947.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4947.json
new file mode 100644
index 00000000000..83902a60800
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4947.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-4947",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:16.740",
+ "lastModified": "2023-10-27T16:57:10.157",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The WooCommerce EAN Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the refresh_order_ean_data AJAX action in versions up to 6.1.0. This makes it possible for authenticated attackers with contributor-level access and above, to update EAN numbers for orders."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WooCommerce EAN Payment Gateway para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la acci\u00f3n actualizar_order_ean_data AJAX en versiones hasta 6.1.0. Esto hace posible que atacantes autenticados con acceso de nivel de colaborador y superior actualicen los n\u00fameros EAN de los pedidos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpfactory:ean_for_woocommerce:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "6.1.0",
+ "matchCriteriaId": "C044AC86-0734-435F-9C68-30946167FF3F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.yanco.dk/product/woocommerce-ean-payment-gateway/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2760b183-3c15-4f0e-b72f-7c0333f9d4b6?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4950.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4950.json
index c66d7613bcc..9ee8e53a148 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4950.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4950.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4950",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.323",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:25:09.213",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Interactive Contact Form and Multi Step Form Builder de WordPress anterior a 3.4 no sanitiza ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a usuarios no autenticados realizar ataques de Cross-Site Scripting"
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:funnelforms:funnelforms:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.4",
+ "matchCriteriaId": "DF2800FC-6D7E-4FF5-92E4-2D2E2CA61763"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/73db1ee8-06a2-41b6-b287-44e25f5f2e58",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4961.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4961.json
new file mode 100644
index 00000000000..3271db90f79
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4961.json
@@ -0,0 +1,125 @@
+{
+ "id": "CVE-2023-4961",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.863",
+ "lastModified": "2023-10-27T18:46:27.947",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Poptin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'poptin-form' shortcode in versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Poptin para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del shortcode 'poptin-form' en versiones hasta la 1.3 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:poptin:popups:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.3.1",
+ "matchCriteriaId": "686079FD-94BE-420F-9BC0-AF40493D321C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/poptin/tags/1.3/poptin.php#L659",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2968210/poptin#file2",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/778af777-4c98-45cd-9704-1bdc96054aa7?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json
index 4f18c6647d9..0b8afa30dd6 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json
@@ -2,16 +2,44 @@
"id": "CVE-2023-4966",
"sourceIdentifier": "secure@citrix.com",
"published": "2023-10-10T14:15:10.977",
- "lastModified": "2023-10-10T14:58:46.263",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-25T18:17:42.337",
+ "vulnStatus": "Undergoing Analysis",
+ "cisaExploitAdd": "2023-10-18",
+ "cisaActionDue": "2023-11-08",
+ "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
+ "cisaVulnerabilityName": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA ?virtual?server.\u00a0\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Divulgaci\u00f3n de informaci\u00f3n confidencial en NetScaler ADC y NetScaler Gateway cuando se configura como Gateway (servidor virtual VPN, ICA Proxy, CVPN, RDP Proxy) o servidor \"virtual\" AAA."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "secure@citrix.com",
"type": "Secondary",
@@ -35,6 +63,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
{
"source": "secure@citrix.com",
"type": "Secondary",
@@ -46,10 +84,92 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*",
+ "versionStartIncluding": "12.1",
+ "versionEndExcluding": "12.1-55.300",
+ "matchCriteriaId": "492BEB4B-7A4B-47C2-93D1-2B0683AA3A20"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*",
+ "versionStartIncluding": "12.1",
+ "versionEndExcluding": "12.1-55.300",
+ "matchCriteriaId": "81EF12C2-4197-4C0D-BE11-556F05DAD646"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*",
+ "versionStartIncluding": "13.0",
+ "versionEndExcluding": "13.0-92.19",
+ "matchCriteriaId": "9EEC53B2-686A-4C6F-98DE-5D6AE804B0A8"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*",
+ "versionStartIncluding": "13.1",
+ "versionEndExcluding": "13.1-37.164",
+ "matchCriteriaId": "109301A8-9ADD-4A49-9C45-D21A4DA840E9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*",
+ "versionStartIncluding": "13.1",
+ "versionEndExcluding": "13.1-49.15",
+ "matchCriteriaId": "5C1739C5-48C1-46BC-A524-B4CC4C5B6436"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*",
+ "versionStartIncluding": "14.1",
+ "versionEndExcluding": "14.1-8.50",
+ "matchCriteriaId": "9148C36D-98B4-4166-8B9A-449EA86BA4B1"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.0",
+ "versionEndExcluding": "13.0-92.19",
+ "matchCriteriaId": "5FB1412D-F8D8-4592-A8A9-C1B841B93D5E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "13.1",
+ "versionEndExcluding": "13.1-49.15",
+ "matchCriteriaId": "28A08B32-D145-499F-866E-BEEEDEBB2901"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "14.1",
+ "versionEndExcluding": "14.1-8.50",
+ "matchCriteriaId": "4F1610E6-FE48-4339-8E74-765E0517E33D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
- "url": "https://support.citrix.com/article/CTX579459",
+ "url": "http://packetstormsecurity.com/files/175323/Citrix-Bleed-Session-Token-Leakage-Proof-Of-Concept.html",
"source": "secure@citrix.com"
+ },
+ {
+ "url": "https://support.citrix.com/article/CTX579459",
+ "source": "secure@citrix.com",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4967.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4967.json
new file mode 100644
index 00000000000..cb738a3cb5f
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4967.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-4967",
+ "sourceIdentifier": "secure@citrix.com",
+ "published": "2023-10-27T19:15:41.620",
+ "lastModified": "2023-10-29T01:44:42.707",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Denial of Service in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secure@citrix.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "secure@citrix.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-119"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://support.citrix.com/article/CTX579459/",
+ "source": "secure@citrix.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4968.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4968.json
new file mode 100644
index 00000000000..b69dafd348e
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4968.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4968",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:16.847",
+ "lastModified": "2023-10-26T17:28:46.953",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The WPLegalPages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wplegalpage' shortcode in versions up to, and including, 2.9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with author-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WPLegalPages para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del shortcode 'wplegalpage' en versiones hasta la 2.9.2 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de autor y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpeka:wplegalpages:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.9.2",
+ "matchCriteriaId": "27B3594A-3164-4EB2-96BC-AEAC9C8516E2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wplegalpages/tags/2.9.2/public/class-wp-legal-pages-public.php#L150",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2976774/wplegalpages/trunk/public/class-wp-legal-pages-public.php#file0",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68d7b5d0-c777-4ff9-bdef-a7762cfbdf1a?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4971.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4971.json
index aa3691180e9..e9f6fddc11e 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4971.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4971.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4971",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.403",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T12:20:22.207",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,10 +14,33 @@
"value": "El complemento Weaver Xtreme Theme Support de WordPress anterior a 6.3.1 deserializa el contenido de un archivo importado, lo que podr\u00eda provocar problemas de inyecciones de objetos PHP cuando un usuario con altos privilegios importa un archivo malicioso y hay una cadena de gadgets adecuada en el blog."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
"weaknesses": [
{
- "source": "contact@wpscan.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -25,12 +48,44 @@
"value": "CWE-502"
}
]
+ },
+ {
+ "source": "contact@wpscan.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-502"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:weavertheme:weaver_xtreme_theme_support:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "6.3.1",
+ "matchCriteriaId": "B9B80611-3B91-433B-AFA2-DBA89E9A7C71"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/421194e1-6c3f-4972-8f3c-de1b9d2bcb13",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4975.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4975.json
new file mode 100644
index 00000000000..914670c410a
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4975.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-4975",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:16.940",
+ "lastModified": "2023-10-26T17:27:53.587",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Website Builder by SeedProd plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 6.15.13.1. This is due to missing or incorrect nonce validation on functionality in the builder.php file. This makes it possible for unauthenticated attackers to change the stripe connect token via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Website Builder de SeedProd para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 6.15.13.1 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta de la funcionalidad en el archivo builder.php. Esto hace posible que atacantes no autenticados cambien el token de conexi\u00f3n de banda a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:seedprod:website_builder_by_seedprod:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "6.15.13.1",
+ "matchCriteriaId": "7E7F75BB-8A51-4A23-B54B-91E8D957B814"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/coming-soon/trunk/resources/views/builder.php#L164",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2968455/coming-soon/trunk/resources/views/builder.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2cb5370f-14aa-445d-bda3-62a0dd068fc5?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4995.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4995.json
index c14cd64d9a4..470fedd36b6 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4995.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4995.json
@@ -2,19 +2,43 @@
"id": "CVE-2023-4995",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-10-13T13:15:12.607",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T16:11:00.210",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Embed Calendly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'calendly' shortcode in versions up to, and including, 3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Embed Calendly para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del c\u00f3digo abreviado 'calendly' en versiones hasta la 3.6 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de la salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
- "source": "security@wordfence.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@@ -46,14 +70,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:embedcalendly:embed_calendly:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.6",
+ "matchCriteriaId": "659BD050-DA95-460F-9BB8-3A073D111179"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/embed-calendly-scheduling/tags/3.6/includes/embed.php#L140",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d1bf83df-7a1f-4572-9c8d-1013750d51d7?source=cve",
- "source": "security@wordfence.com"
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4999.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4999.json
new file mode 100644
index 00000000000..4c8a4627260
--- /dev/null
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4999.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-4999",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.927",
+ "lastModified": "2023-10-27T18:46:12.610",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Horizontal scrolling announcement plugin for WordPress is vulnerable to SQL Injection via the plugin's [horizontal-scrolling] shortcode in versions up to, and including, 9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Horizontal scrolling announcement para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del shortcode [desplazamiento horizontal] del complemento en versiones hasta la 9.2 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes autenticados con permisos de nivel de suscriptor y superiores agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gopiplus:horizontal_scrolling_announcement:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "9.2",
+ "matchCriteriaId": "3CD67242-2B70-4C47-94E0-6307AC0674A4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/horizontal-scrolling-announcement/trunk/horizontal-scrolling-announcement.php#L79",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bf50922a-58a6-4ca4-80b7-cafb37b87216?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5002.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5002.json
index 4ca45c4b1f9..8ace4c22805 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5002.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5002.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5002",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2023-09-22T14:15:47.213",
- "lastModified": "2023-10-04T18:15:12.097",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-26T17:59:24.913",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -86,6 +86,26 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -107,11 +127,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2S24D3S2GVNGTDNE6SF2OQSOPU3H72UW/",
- "source": "patrick@puiterwijk.org"
+ "source": "patrick@puiterwijk.org",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIRTMQZEE6K7RD37ERZ2UFYFLEUXLQU3/",
- "source": "patrick@puiterwijk.org"
+ "source": "patrick@puiterwijk.org",
+ "tags": [
+ "Mailing List"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5003.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5003.json
index 645d243a96a..4532599f923 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5003.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5003.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5003",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.490",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T18:25:33.190",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Active Directory Integration / LDAP Integration de WordPress anterior a 4.1.10 almacena registros LDAP confidenciales en un archivo de b\u00fafer cuando un administrador desea exportar dichos registros. Desafortunadamente, este archivo de registro nunca se elimina y permanece accesible para cualquier usuario que conozca la URL para hacerlo."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:miniorange:active_directory_integration_\\/_ldap_integration:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.1.10",
+ "matchCriteriaId": "1557BDB1-1E5A-499F-9A3A-E4E2A8C34B3A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/91f4e500-71f3-4ef6-9cc7-24a7c12a5748",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5009.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5009.json
index c04d67fcdfb..83747816332 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5009.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5009.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5009",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-19T08:16:07.203",
- "lastModified": "2023-10-03T10:15:10.627",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:21:07.923",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5043.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5043.json
new file mode 100644
index 00000000000..4c41d882591
--- /dev/null
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5043.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-5043",
+ "sourceIdentifier": "jordan@liggitt.net",
+ "published": "2023-10-25T20:15:18.037",
+ "lastModified": "2023-10-25T21:15:10.387",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Ingress nginx annotation injection causes arbitrary command execution.\n"
+ },
+ {
+ "lang": "es",
+ "value": "La inyecci\u00f3n de anotaciones de Ingress nginx provoca la ejecuci\u00f3n de comandos arbitrarios."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "jordan@liggitt.net",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.6,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "jordan@liggitt.net",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/4",
+ "source": "jordan@liggitt.net"
+ },
+ {
+ "url": "https://github.com/kubernetes/ingress-nginx/issues/10571",
+ "source": "jordan@liggitt.net"
+ },
+ {
+ "url": "https://groups.google.com/g/kubernetes-security-announce/c/pVsXsOpxYZo",
+ "source": "jordan@liggitt.net"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5044.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5044.json
new file mode 100644
index 00000000000..b307a98e195
--- /dev/null
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5044.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-5044",
+ "sourceIdentifier": "jordan@liggitt.net",
+ "published": "2023-10-25T20:15:18.187",
+ "lastModified": "2023-10-25T21:15:10.457",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.\n"
+ },
+ {
+ "lang": "es",
+ "value": "Inyecci\u00f3n de c\u00f3digo a trav\u00e9s de la anotaci\u00f3n nginx.ingress.kubernetes.io/permanent-redirect."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "jordan@liggitt.net",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.6,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "jordan@liggitt.net",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://www.openwall.com/lists/oss-security/2023/10/25/3",
+ "source": "jordan@liggitt.net"
+ },
+ {
+ "url": "https://github.com/kubernetes/ingress-nginx/issues/10572",
+ "source": "jordan@liggitt.net"
+ },
+ {
+ "url": "https://groups.google.com/g/kubernetes-security-announce/c/ukuYYvRNel0",
+ "source": "jordan@liggitt.net"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5045.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5045.json
index 10357a4ed0a..0af3a0e0165 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5045.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5045.json
@@ -2,19 +2,43 @@
"id": "CVE-2023-5045",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-10-12T12:15:10.777",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T18:12:19.600",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Kayisi allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Kayisi: before 1286.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Neutralizaci\u00f3n inadecuada de elementos especiales utilizados en una vulnerabilidad de comando SQL (\"Inyecci\u00f3n SQL\") en Biltay Technology Kayisi permite la inyecci\u00f3n SQL y la ejecuci\u00f3n de l\u00ednea de comando mediante inyecci\u00f3n SQL. Este problema afecta a Kayisi: antes de 1286."
}
],
"metrics": {
"cvssMetricV31": [
{
- "source": "cve@usom.gov.tr",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@usom.gov.tr",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:biltay:kayisi:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1286",
+ "matchCriteriaId": "78A3C75C-96BD-41E6-A98A-6DCF8D8F5774"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0580",
- "source": "cve@usom.gov.tr"
+ "source": "cve@usom.gov.tr",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5046.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5046.json
index 183f8372faf..69af066f5ef 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5046.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5046.json
@@ -2,19 +2,43 @@
"id": "CVE-2023-5046",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-10-12T12:15:10.867",
- "lastModified": "2023-10-12T12:59:34.797",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T18:14:03.917",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Procost allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Procost: before 1390.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La neutralizaci\u00f3n inadecuada de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Biltay Technology Procost permite la inyecci\u00f3n SQL y la ejecuci\u00f3n de l\u00ednea de comando mediante inyecci\u00f3n SQL. Este problema afecta a Procost: antes de 1390."
}
],
"metrics": {
"cvssMetricV31": [
{
- "source": "cve@usom.gov.tr",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "cve@usom.gov.tr",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
@@ -46,10 +70,31 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:biltay:procost:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1390",
+ "matchCriteriaId": "76B37521-C44A-4B79-894A-30B7A2721D05"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0581",
- "source": "cve@usom.gov.tr"
+ "source": "cve@usom.gov.tr",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5050.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5050.json
new file mode 100644
index 00000000000..4b2c4de3f53
--- /dev/null
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5050.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-5050",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:17.037",
+ "lastModified": "2023-10-20T11:27:12.763",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Leaflet Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Leaflet Map para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s de c\u00f3digos cortos en versiones hasta la 3.3.0 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/leaflet-map/tags/3.3.0/shortcodes/class.geojson-shortcode.php#L124",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2968965/leaflet-map#file12",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3084c9ab-00aa-4b8e-aa46-bd70b335ec77?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5051.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5051.json
new file mode 100644
index 00000000000..ec12eec1c29
--- /dev/null
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5051.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-5051",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-27T04:15:10.957",
+ "lastModified": "2023-10-27T12:41:08.827",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The CallRail Phone Call Tracking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'callrail_form' shortcode in versions up to, and including, 0.5.2 due to insufficient input sanitization and output escaping on the 'form_id' user supplied attribute. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento CallRail Phone Call Tracking para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del shortcode 'callrail_form' en versiones hasta la 0.5.2 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en el atributo 'form_id' proporcionado por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/callrail-phone-call-tracking/tags/0.5.2/callrail.php#L174",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2982876/callrail-phone-call-tracking#file0",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/35def866-7460-4cad-8d86-7b9e4905cbe4?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5053.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5053.json
index 5b45a37adcb..2371e05c0b5 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5053.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5053.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5053",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-28T21:15:10.447",
- "lastModified": "2023-10-06T16:15:16.057",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-20T20:21:32.440",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5057.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5057.json
index 0a095c414d8..72064913c58 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5057.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5057.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5057",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.573",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T17:07:34.887",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento ActivityPub de WordPress anterior a 1.0.0 no escapa a los metadatos del usuario antes de mostrarlos en menciones, lo que podr\u00eda permitir a los usuarios con un rol de Colaborador y superior realizar ataques XSS almacenados."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:automattic:activitypub:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.0.0",
+ "matchCriteriaId": "78ADABE4-21BE-4F20-BE6D-BB12EDBCD26F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/58a63507-f0fd-46f1-a80c-6b1c41dddcf5",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5059.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5059.json
new file mode 100644
index 00000000000..309837e382d
--- /dev/null
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5059.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-5059",
+ "sourceIdentifier": "ics-cert@hq.dhs.gov",
+ "published": "2023-10-19T18:15:09.753",
+ "lastModified": "2023-10-25T13:39:58.703",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\n\n\n\n\nSantesoft Sante FFT Imaging lacks proper validation of user-supplied data when parsing DICOM files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process."
+ },
+ {
+ "lang": "es",
+ "value": "Santesoft Sante FFT Imaging carece de una validaci\u00f3n adecuada de los datos proporcionados por el usuario al analizar archivos DICOM. Esto podr\u00eda dar lugar a una lectura fuera de l\u00edmites. Un atacante podr\u00eda aprovechar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ },
+ {
+ "source": "ics-cert@hq.dhs.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:santesoft:fft_imaging:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.4.1",
+ "matchCriteriaId": "59AE43BF-0431-4B91-BEFF-5BFA7AAB3628"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-285-02",
+ "source": "ics-cert@hq.dhs.gov",
+ "tags": [
+ "Third Party Advisory",
+ "US Government Resource"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5070.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5070.json
new file mode 100644
index 00000000000..ce25c64d1cb
--- /dev/null
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5070.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-5070",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:12.993",
+ "lastModified": "2023-10-27T18:46:01.130",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Social Media Share Buttons & Social Sharing Icons plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.8.5 via the sfsi_save_export function. This can allow subscribers to export plugin settings that include social media authentication tokens and secrets as well as app passwords."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Social Media Share Buttons & Social Sharing Icons para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en versiones hasta la 2.8.5 incluida a trav\u00e9s de la funci\u00f3n sfsi_save_export. Esto puede permitir a los suscriptores exportar configuraciones de complementos que incluyen tokens y secretos de autenticaci\u00f3n de redes sociales, as\u00ed como contrase\u00f1as de aplicaciones."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ultimatelysocial:social_media_share_buttons_\\&_social_sharing_icons:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.8.6",
+ "matchCriteriaId": "66254B71-DA5F-472F-AFD1-C66F7146BAC1"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2975574/ultimate-social-media-icons/tags/2.8.6/libs/controllers/sfsi_buttons_controller.php?old=2956446&old_path=ultimate-social-media-icons%2Ftags%2F2.8.5%2Flibs%2Fcontrollers%2Fsfsi_buttons_controller.php",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e43c5b-a094-44ab-a8a3-52d437f0e00d?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5071.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5071.json
new file mode 100644
index 00000000000..c9b0356dbec
--- /dev/null
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5071.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-5071",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:17.153",
+ "lastModified": "2023-10-26T17:26:19.030",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Sitekit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'sitekit_iframe' shortcode in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Sitekit para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del shortcode 'sitekit_iframe' en versiones hasta la 1.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:sitekit_project:sitekit:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.4",
+ "matchCriteriaId": "FE404737-0779-425A-8DBB-A0DF3F6DECA8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/sitekit/trunk/inc/sitekit-shortcode-iframe.php#L3",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2970788/sitekit",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/011c8a06-298e-4a53-9ef8-552585426d79?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5072.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5072.json
index 60da93e7b46..0651bd62475 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5072.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5072.json
@@ -2,16 +2,40 @@
"id": "CVE-2023-5072",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-10-12T17:15:10.187",
- "lastModified": "2023-10-12T20:15:12.477",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:17:47.077",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Denial of Service in JSON-Java versions up to and including 20230618. \u00a0A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used.\u00a0\n"
+ },
+ {
+ "lang": "es",
+ "value": "Denegaci\u00f3n de Servicio (DoS) en versiones JSON-Java hasta 20230618 incluida. Un error en el analizador significa que una cadena de entrada de tama\u00f1o modesto puede provocar el uso de cantidades indefinidas de memoria."
}
],
"metrics": {
"cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
{
"source": "cve-coordination@google.com",
"type": "Secondary",
@@ -35,6 +59,16 @@
]
},
"weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-770"
+ }
+ ]
+ },
{
"source": "cve-coordination@google.com",
"type": "Secondary",
@@ -46,14 +80,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:json-java_project:json-java:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "20230618",
+ "matchCriteriaId": "13919820-D849-4641-A7E6-6E01A01862F2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/stleary/JSON-java/issues/758",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Issue Tracking"
+ ]
},
{
"url": "https://github.com/stleary/JSON-java/issues/771",
- "source": "cve-coordination@google.com"
+ "source": "cve-coordination@google.com",
+ "tags": [
+ "Exploit",
+ "Issue Tracking"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5085.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5085.json
new file mode 100644
index 00000000000..eff4539087d
--- /dev/null
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5085.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-5085",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-25T18:17:42.660",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Advanced Menu Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'advMenu' shortcode in versions up to, and including, 0.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Advanced Menu Widget para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del shortcode 'advMenu' en versiones hasta la 0.4.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/advanced-menu-widget/trunk/class-advanced-menu-widget.php?rev=1471917#L74",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5da2dac6-940c-419e-853f-6cfd5d53d427?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5086.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5086.json
new file mode 100644
index 00000000000..3dd36a0ad23
--- /dev/null
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5086.json
@@ -0,0 +1,125 @@
+{
+ "id": "CVE-2023-5086",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:13.060",
+ "lastModified": "2023-10-27T18:45:40.017",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Copy Anything to Clipboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'copy' shortcode in versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Copy Anything to Clipboard para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del shortcode de 'copiar' en versiones hasta la 2.6.4 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:maheshwaghmare:copy_anything_to_clipboard:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "2.6.5",
+ "matchCriteriaId": "C9AC927C-7F52-42D8-9332-94866507DB77"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/copy-the-code/tags/2.6.4/classes/class-copy-the-code-shortcode.php#L83",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2969441/copy-the-code#file1",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e834a211-ccc8-4a30-a15d-879ba34184e9?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5087.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5087.json
index a36863867ef..16ce1f0581a 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5087.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5087.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5087",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.657",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T17:07:24.093",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Page Builder: Pagelayer de WordPress anterior a 1.7.8 no impide que atacantes con privilegios de autor y superiores inserten JavaScript malicioso dentro del c\u00f3digo de encabezado o pie de p\u00e1gina de una publicaci\u00f3n."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.7.8",
+ "matchCriteriaId": "EEC5183E-F64E-4485-A5D8-E32139AD621A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/3b45cc0b-7378-49f3-900e-d0e18cd4b878",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5089.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5089.json
index 94e6f9bc413..e47cd9a1970 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5089.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5089.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5089",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.737",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T16:40:14.353",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Defender Security para WordPress anterior a 4.1.0 no impide las redirecciones a la p\u00e1gina de inicio de sesi\u00f3n a trav\u00e9s de la funci\u00f3n auth_redirect de WordPress, lo que permite que un visitante no autenticado acceda a la p\u00e1gina de inicio de sesi\u00f3n, incluso cuando la funcionalidad de ocultar p\u00e1gina de inicio de sesi\u00f3n del complemento est\u00e1 habilitada."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,14 +50,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpmudev:defender_security:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.1.0",
+ "matchCriteriaId": "2BA78D89-AC97-4728-AB89-0DBFFC154703"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/2b547488-187b-44bc-a57d-f876a7d4c87d",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.sprocketsecurity.com/resources/discovering-wp-admin-urls-in-wordpress-with-gravityforms",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5109.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5109.json
new file mode 100644
index 00000000000..4e2c42ce1e9
--- /dev/null
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5109.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-5109",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:13.127",
+ "lastModified": "2023-10-27T18:45:31.967",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The WP Mailto Links \u2013 Protect Email Addresses plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wpml_mailto' shortcode in versions up to, and including, 3.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This was partially patched in version 3.1.3 and fully patched in version 3.1.4."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WP Mailto Links \u2013 Protect Email Addresses para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del shortcode 'wpml_mailto' en versiones hasta la 3.1.3 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto fue parcheado parcialmente en la versi\u00f3n 3.1.3 y completamente parcheado en la versi\u00f3n 3.1.4."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ironikus:wp_mailto_links:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "3.1.4",
+ "matchCriteriaId": "BD195EDB-F3F5-414C-AA47-333DCC1E3436"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-mailto-links/tags/3.1.2/core/includes/classes/class-wp-mailto-links-validate.php#L582",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec882062-0059-47ca-a007-3347e7adb70b?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5110.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5110.json
new file mode 100644
index 00000000000..c7445cec142
--- /dev/null
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5110.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-5110",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-25T18:17:42.730",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The BSK PDF Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'bsk-pdfm-category-dropdown' shortcode in versions up to, and including, 3.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento BSK PDF Manager para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del shortcode 'bsk-pdfm-category-dropdown' en versiones hasta la 3.4.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/bsk-pdf-manager/trunk/classes/shortcodes/category/category-dropdown.php?rev=2885460#L36",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/60de55c6-e4fa-453e-84bd-309f2887e3cb?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5112.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5112.json
index 1d416cdf907..e2de3aa593a 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5112.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5112.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5112",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.433",
- "lastModified": "2023-10-06T16:15:16.147",
- "vulnStatus": "Undergoing Analysis",
+ "lastModified": "2023-10-19T20:31:22.843",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5120.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5120.json
new file mode 100644
index 00000000000..547110b6a13
--- /dev/null
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5120.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-5120",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:17.243",
+ "lastModified": "2023-10-26T17:25:31.803",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Migration, Backup, Staging \u2013 WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image file path parameter in versions up to, and including, 0.9.89 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Migration, Backup, Staging \u2013 WPvivid para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro de ruta del archivo de imagen en versiones hasta la 0.9.89 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados con privilegios administrativos inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:wpvivid:migration\\,_backup\\,_staging:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "0.9.89",
+ "matchCriteriaId": "34D10B34-6A2E-43C0-8D0A-CEF6DDC345D6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/tags/0.9.89/includes/upload-cleaner/class-wpvivid-uploads-cleaner.php#L161",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/320f4260-20c2-4f27-91ba-d2488b417f62?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5121.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5121.json
new file mode 100644
index 00000000000..b5eca51e512
--- /dev/null
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5121.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-5121",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:13.187",
+ "lastModified": "2023-10-20T11:27:04.140",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Migration, Backup, Staging \u2013 WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings (the backup path parameter) in versions up to, and including, 0.9.89 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Migration, Backup, Staging \u2013 WPvivid para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s de la configuraci\u00f3n de administrador (el par\u00e1metro de ruta de respaldo) en versiones hasta la 0.9.89 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2956458%40wpvivid-backuprestore%2Ftrunk&old=2948265%40wpvivid-backuprestore%2Ftrunk&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cdcac5f9-a744-4853-8a80-ed38fec81dbb?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5126.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5126.json
new file mode 100644
index 00000000000..516c0594de0
--- /dev/null
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5126.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-5126",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-25T18:17:42.807",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Delete Me plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'plugin_delete_me' shortcode in versions up to, and including, 3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The shortcode is not displayed to administrators, so it cannot be used against administrator users."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Delete Me para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del shortcode 'plugin_delete_me' en versiones hasta la 3.0 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. El shortcode no se muestra a los administradores, por lo que no se puede utilizar contra usuarios administradores."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/delete-me/tags/3.0/inc/shortcode.php#L83",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7a5123a7-8eb4-481e-88fe-6310be37a077?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5127.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5127.json
new file mode 100644
index 00000000000..828dfdd537f
--- /dev/null
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5127.json
@@ -0,0 +1,91 @@
+{
+ "id": "CVE-2023-5127",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-25T18:17:42.887",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The WP Font Awesome plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping on 'icon' user supplied attribute. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WP Font Awesome para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de shortcodes en versiones hasta la 1.7.9 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a que la salida se escapa en el atributo \"icon\" proporcionado por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-font-awesome/trunk/wp-font-awesome.php?rev=2875119#L101",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-font-awesome/trunk/wp-font-awesome.php?rev=2875119#L53",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-font-awesome/trunk/wp-font-awesome.php?rev=2875119#L55",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-font-awesome/trunk/wp-font-awesome.php?rev=2875119#L68",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-font-awesome/trunk/wp-font-awesome.php?rev=2875119#L70",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-font-awesome/trunk/wp-font-awesome.php?rev=2875119#L83",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-font-awesome/trunk/wp-font-awesome.php?rev=2875119#L85",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/wp-font-awesome/trunk/wp-font-awesome.php?rev=2875119#L99",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/59ee0b56-c11f-4951-aac0-8344200e4484?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5132.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5132.json
new file mode 100644
index 00000000000..26cd049dc75
--- /dev/null
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5132.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-5132",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-21T02:15:07.960",
+ "lastModified": "2023-10-28T03:47:24.960",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata)."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Soisy Pagamento Rateale para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n parseRemoteRequest en versiones hasta la 6.0.1 incluida. Esto hace posible que atacantes no autenticados con conocimiento de un ID de pedido de WooCommerce existente expongan informaci\u00f3n confidencial del pedido de WooCommerce (por ejemplo, nombre, direcci\u00f3n, direcci\u00f3n de correo electr\u00f3nico y otros metadatos del pedido)."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-862"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:soisy:soisy_pagamento_rateale:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "6.0.1",
+ "matchCriteriaId": "681F1DE5-D86F-49EF-AA0F-81670E858E91"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/soisy-pagamento-rateale/trunk/public/class-soisy-pagamento-rateale-public.php#L465",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3c997cd-37b4-4b9c-b99e-397be484aa36?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5133.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5133.json
index 3991557bc25..2aba9e7db66 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5133.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5133.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5133",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.823",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T19:54:44.840",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "Este complemento user-activity-log-pro de WordPress anterior a 2.3.4 recupera direcciones IP de clientes de encabezados potencialmente no confiables, lo que permite a un atacante manipular su valor. Esto puede usarse para ocultar la fuente del tr\u00e1fico malicioso."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:solwininfotech:user_activity_log:*:*:*:*:pro:wordpress:*:*",
+ "versionEndExcluding": "2.3.4",
+ "matchCriteriaId": "EAFE880E-05FE-45C4-A9A8-F35C886A29F4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/36c30e54-75e4-4df1-b01a-60c51c0e76a3",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5139.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5139.json
new file mode 100644
index 00000000000..9b1b3088fe6
--- /dev/null
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5139.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-5139",
+ "sourceIdentifier": "vulnerabilities@zephyrproject.org",
+ "published": "2023-10-26T05:15:26.217",
+ "lastModified": "2023-10-26T11:44:17.377",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Potential buffer overflow vulnerability at the following location in the Zephyr STM32 Crypto driver"
+ },
+ {
+ "lang": "es",
+ "value": "Posible vulnerabilidad de desbordamiento del b\u00fafer en la siguiente ubicaci\u00f3n en el controlador Zephyr STM32 Crypto"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "vulnerabilities@zephyrproject.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "vulnerabilities@zephyrproject.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453",
+ "source": "vulnerabilities@zephyrproject.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5152.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5152.json
index 072d322a437..9f94aa01703 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5152.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5152.json
@@ -2,16 +2,16 @@
"id": "CVE-2023-5152",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T02:15:10.743",
- "lastModified": "2023-09-25T13:26:02.773",
+ "lastModified": "2023-10-27T12:56:50.037",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
- "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-8000 up to 20151231. Affected by this issue is some unknown functionality of the file /importexport.php. The manipulation of the argument sql leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240248. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced."
+ "value": "** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected by this issue is some unknown functionality of the file /importexport.php. The manipulation of the argument sql leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240248. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced."
},
{
"lang": "es",
- "value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** ** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Una vulnerabilidad clasificada como cr\u00edtica ha sido encontrada en D-Link DAR-8000 hasta 20151231. Una funcionalidad desconocida del archivo /importexport es afectada por este problema .php. La manipulaci\u00f3n del argumento sql conduce a la inyecci\u00f3n de sql. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-240248. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor. NOTA: Se contact\u00f3 primeramente con el proveedor y se confirm\u00f3 de inmediato que el producto ha llegado al final de su vida \u00fatil. Deber\u00eda retirarse y reemplazarse."
+ "value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** ** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Una vulnerabilidad clasificada como cr\u00edtica ha sido encontrada en D-Link DAR-7000 y DAR-8000 hasta 20151231. Una funcionalidad desconocida de el archivo /importexport.php. La manipulaci\u00f3n del argumento sql conduce a la inyecci\u00f3n de sql. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-240248. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor. NOTA: Se contact\u00f3 primeramente con el proveedor y se confirm\u00f3 de inmediato que el producto ha llegado al final de su vida \u00fatil. Deber\u00eda retirarse y reemplazarse."
}
],
"metrics": {
@@ -87,7 +87,7 @@
},
"weaknesses": [
{
- "source": "cna@vuldb.com",
+ "source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@@ -95,6 +95,16 @@
"value": "CWE-89"
}
]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
}
],
"configurations": [
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5156.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5156.json
index c1d5e9c83a9..1925d9853cc 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5156.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5156.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5156",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-25T16:15:15.613",
- "lastModified": "2023-10-04T00:15:12.353",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:28:56.387",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -111,19 +111,33 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/4",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/5",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/6",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/8",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Mailing List",
+ "Patch"
+ ]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-5156",
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5157.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5157.json
index 26e3f7576bd..e626540fc4c 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5157.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5157.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5157",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-27T15:19:41.807",
- "lastModified": "2023-10-13T01:15:55.990",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-20T20:16:19.680",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
- "value": "CWE-400"
+ "value": "NVD-CWE-noinfo"
}
]
}
@@ -136,6 +136,41 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder:9.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2ABBAA9E-CCBA-480B-ABB5-454448D91262"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "910C9542-26FC-4635-9351-128727971830"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "09AAD850-019A-46B8-A5A1-845DE048D30A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CA3C5EAE-267F-410F-8AFA-8F5B68A9E617"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "86034E5B-BCDD-4AFD-A460-38E790F608F5"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7B3D7389-35C1-48C4-A9EC-2564842723C4"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "C2ED1251-245C-4390-8964-DDCAD54A8957"
+ },
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
@@ -145,6 +180,81 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "5A47EF78-A5B6-4B89-8B74-EEB0647C549F"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2F7DAD7C-9369-4A87-A1D0-4208D3AF0CDC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*",
+ "matchCriteriaId": "213593D4-EB5A-4A1B-BDF3-3F043C5F6A6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "32AF225E-94C0-4D07-900C-DD868C05F554"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "2E068ABB-31C2-416E-974A-95E07A2BAB0A"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "22C65F53-D624-48A9-A9B7-4C78A31E19F9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*",
+ "matchCriteriaId": "26041661-0280-4544-AA0A-BC28FCED4699"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "23D471AC-7DCA-4425-AD91-E5D928753A8C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E07C1C58-0E5F-4B56-9B8D-5DE67DB00F79"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F91F9255-4EE1-43C7-8831-D2B6C228BFD9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*",
+ "matchCriteriaId": "99952557-C766-4B9E-8BF5-DBBA194349FF"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*",
+ "matchCriteriaId": "F1CA946D-1665-4874-9D41-C7D963DD1F56"
}
]
}
@@ -154,11 +264,17 @@
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:5683",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5684",
- "source": "secalert@redhat.com"
+ "source": "secalert@redhat.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-5157",
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5167.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5167.json
index 1ec8d59bdd2..14a427c570b 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5167.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5167.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5167",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.903",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T19:56:34.320",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento User Activity Log Pro de WordPress anterior a 2.3.4 no escapa correctamente a los Agentes de Usuario registrados en el panel de registros de actividad del usuario, lo que puede permitir a los visitantes realizar ataques de Cross-Site Scripting almacenados."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:solwininfotech:user_activity_log:*:*:*:*:pro:wordpress:*:*",
+ "versionEndExcluding": "2.3.4",
+ "matchCriteriaId": "EAFE880E-05FE-45C4-A9A8-F35C886A29F4"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/78ea6fe0-5fac-4923-949c-023c85fe2437",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5177.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5177.json
index af20eafdbaf..e9f0974f155 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5177.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5177.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5177",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-10-16T20:15:17.993",
- "lastModified": "2023-10-17T12:38:17.143",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T16:39:43.497",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@@ -14,7 +14,30 @@
"value": "El complemento Vrm 360 3D Model Viewerde para WordPress hasta 1.2.1 expone la ruta completa de un archivo al ingresar un archivo inexistente en un par\u00e1metro de c\u00f3digo corto."
}
],
- "metrics": {},
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
"weaknesses": [
{
"source": "contact@wpscan.com",
@@ -27,10 +50,32 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:maurice:vrm360:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.2.1",
+ "matchCriteriaId": "343766D2-845F-42D6-9BF8-4E2A92462BB8"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://wpscan.com/vulnerability/a67b9c21-a35a-4cdb-9627-a5932334e5f0",
- "source": "contact@wpscan.com"
+ "source": "contact@wpscan.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5200.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5200.json
new file mode 100644
index 00000000000..26f6a9a7cff
--- /dev/null
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5200.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-5200",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T07:15:17.350",
+ "lastModified": "2023-10-26T17:24:54.950",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The flowpaper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'flipbook' shortcode in versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento flowpaper para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del shortcode 'flipbook' en versiones hasta la 2.0.3 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:flowpaper:flowpaper:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.0.3",
+ "matchCriteriaId": "B440472F-51A1-49D1-80FD-0C46400CA12E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/flowpaper-lite-pdf-flipbook/trunk/flowpaper.php?rev=2959754#L395",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2966821/flowpaper-lite-pdf-flipbook",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/31d6288d-87f0-4822-b3f4-541f70cf99fd?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5204.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5204.json
new file mode 100644
index 00000000000..fadda0fc38e
--- /dev/null
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5204.json
@@ -0,0 +1,128 @@
+{
+ "id": "CVE-2023-5204",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-19T06:15:08.343",
+ "lastModified": "2023-10-26T17:15:09.353",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid parameter in versions up to, and including, 4.8.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento ChatBot para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro $strid en versiones hasta la 4.8.9 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.9.1",
+ "matchCriteriaId": "4CA9F786-40A5-43EF-ABE6-145C83223484"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/qcld-wpwbot-search.php?rev=2957286#L177",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2977505%40chatbot%2Ftrunk&old=2967435%40chatbot%2Ftrunk&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5ad12146-200b-48e5-82de-7572541edcc4?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5205.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5205.json
new file mode 100644
index 00000000000..19702de7f18
--- /dev/null
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5205.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-5205",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-21T08:15:09.053",
+ "lastModified": "2023-10-27T19:42:29.360",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Add Custom Body Class plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'add_custom_body_class' value in versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Add Custom Body Class para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del valor 'add_custom_body_class' en versiones hasta la 1.4.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:anilankola:add_custom_body_class:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.4.1",
+ "matchCriteriaId": "0106864A-1809-4722-97F3-B5893BC4F6CD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/add-custom-body-class/trunk/add-custom-body-class.php#L32",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9841b57b-b869-4282-8781-60538f6f269f?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5212.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5212.json
new file mode 100644
index 00000000000..55d4c04cc41
--- /dev/null
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5212.json
@@ -0,0 +1,133 @@
+{
+ "id": "CVE-2023-5212",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-19T06:15:11.377",
+ "lastModified": "2023-10-26T17:15:09.477",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The AI ChatBot plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to, and including, 4.8.9 as well as version 4.9.2. This makes it possible for authenticated attackers with subscriber privileges to delete arbitrary files on the server, which makes it possible to take over affected sites as well as others sharing the same hosting account. Version 4.9.1 originally addressed the issue, but it was reintroduced in 4.9.2 and fixed again in 4.9.3."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento AI ChatBot para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos en versiones hasta la 4.8.9 incluida, as\u00ed como en la versi\u00f3n 4.9.2. Esto hace posible que atacantes autenticados con privilegios de suscriptor eliminen archivos arbitrarios en el servidor, lo que hace posible hacerse cargo de los sitios afectados, as\u00ed como de otros que comparten la misma cuenta de alojamiento. La versi\u00f3n 4.9.1 solucion\u00f3 originalmente el problema, pero se reintrodujo en 4.9.2 y se solucion\u00f3 nuevamente en 4.9.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.2
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.6,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 5.8
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-22"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "4.9.1",
+ "matchCriteriaId": "4CA9F786-40A5-43EF-ABE6-145C83223484"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:quantumcloud:ai_chatbot:4.9.2:*:*:*:*:wordpress:*:*",
+ "matchCriteriaId": "C54E19C0-77EE-4C3A-9DCD-4740E77D6D89"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/includes/openai/qcld-bot-openai.php?rev=2957286#L576",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Exploit"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2977505%40chatbot%2Ftrunk&old=2967435%40chatbot%2Ftrunk&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b3f4ccb-fcc6-42ec-8e9e-03d69ae7acf2?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5214.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5214.json
index 34f3fa87a4b..342cf260db1 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5214.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5214.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5214",
"sourceIdentifier": "security@puppet.com",
"published": "2023-10-06T18:15:12.453",
- "lastModified": "2023-10-10T20:24:44.750",
- "vulnStatus": "Analyzed",
+ "lastModified": "2023-10-17T17:15:09.810",
+ "vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@@ -100,11 +100,8 @@
],
"references": [
{
- "url": "https://www.puppet.com/security/cve/cve-2023-5255-denial-service-revocation-auto-renewed-certificates",
- "source": "security@puppet.com",
- "tags": [
- "Not Applicable"
- ]
+ "url": "https://www.puppet.com/security/cve/cve-2023-5214-privilege-escalation-puppet-bolt",
+ "source": "security@puppet.com"
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json
index 12c13fe7717..7c3e57252fb 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5217",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-28T16:15:10.980",
- "lastModified": "2023-10-17T05:15:50.840",
- "vulnStatus": "Modified",
+ "lastModified": "2023-10-24T13:34:22.990",
+ "vulnStatus": "Analyzed",
"cisaExploitAdd": "2023-10-02",
"cisaActionDue": "2023-10-23",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@@ -106,16 +106,144 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:edge:116.0.1938.98:*:*:*:*:*:*:*",
+ "matchCriteriaId": "83749E8D-D4EC-4C5E-B031-8DD4C5C3AA72"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:edge:117.0.2045.47:*:*:*:*:*:*:*",
+ "matchCriteriaId": "39F5AB10-A20E-4B12-863D-9335A6344130"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:edge_chromium:116.0.5845.229:*:*:*:*:*:*:*",
+ "matchCriteriaId": "494B17DA-B40E-4B79-925D-2F439C7A4BCC"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:microsoft:edge_chromium:117.0.5938.132:*:*:*:*:*:*:*",
+ "matchCriteriaId": "0A1735C0-78BF-4B9C-9EC6-64471C609046"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "118.0.1",
+ "matchCriteriaId": "B8EE027E-A8D8-4038-B0C5-3F9ABA3079B6"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*",
+ "versionEndExcluding": "118.1",
+ "matchCriteriaId": "C0246068-275F-4D13-93B9-44AD91D2EFFB"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "115.3.1",
+ "matchCriteriaId": "2AAF4C02-0ED7-4AEF-BB14-A0A48DAC3B2E"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mozilla:firefox_focus:*:*:*:*:*:android:*:*",
+ "versionEndExcluding": "118.1",
+ "matchCriteriaId": "54F53CD4-5766-401B-8333-1B8937112AD0"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "115.3.1",
+ "matchCriteriaId": "C287FD41-1668-4BA8-9BF5-7C56420F6F38"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
+ "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
+ "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/12",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/16",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/28/5",
@@ -145,15 +273,27 @@
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/29/11",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/29/12",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/29/14",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/29/2",
@@ -165,59 +305,114 @@
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/29/7",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/29/9",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/30/1",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/30/2",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/30/3",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/30/4",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/30/5",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/01/1",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/01/2",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/01/5",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/02/6",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/03/11",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241191",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html",
@@ -231,100 +426,179 @@
"url": "https://crbug.com/1486441",
"source": "chrome-cve-admin@google.com",
"tags": [
+ "Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://github.com/webmproject/libvpx/commit/3fbd1dca6a4d2dad332a2110d646e4ffef36d590",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/webmproject/libvpx/commit/af6dedd715f4307669366944cca6e0417b290282",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/webmproject/libvpx/releases/tag/v1.13.1",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Release Notes"
+ ]
},
{
"url": "https://github.com/webmproject/libvpx/tags",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Product"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00038.html",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/",
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List"
+ ]
},
{
"url": "https://pastebin.com/TdkC4pDv",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Not Applicable"
+ ]
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2023-5217",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://security.gentoo.org/glsa/202310-04",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://twitter.com/maddiestone/status/1707163313711497266",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5508",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5509",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.debian.org/security/2023/dsa-5510",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/09/28/5",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5218.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5218.json
index 85cfc8e8347..cc0264ae75b 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5218.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5218.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5218",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.443",
- "lastModified": "2023-10-14T03:15:10.277",
+ "lastModified": "2023-10-21T03:15:08.653",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
@@ -66,6 +66,31 @@
]
}
]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
+ }
+ ]
+ }
+ ]
}
],
"references": [
@@ -86,11 +111,22 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/",
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Mailing List",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5526",
- "source": "chrome-cve-admin@google.com"
+ "source": "chrome-cve-admin@google.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5231.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5231.json
new file mode 100644
index 00000000000..14398cd7d27
--- /dev/null
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5231.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-5231",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:13.250",
+ "lastModified": "2023-10-20T11:27:04.140",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Magic Action Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 2.17.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Magic Action Box para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s de shortcodes en versiones hasta la 2.17.2 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/magic-action-box/tags/2.17.2/lib/functions.php#L287",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce9b908b-1388-41fb-915c-e4e29eaf57ed?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5240.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5240.json
index 7972ab95dc7..884d09efbaa 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5240.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5240.json
@@ -2,19 +2,79 @@
"id": "CVE-2023-5240",
"sourceIdentifier": "security@devolutions.net",
"published": "2023-10-13T13:15:12.693",
- "lastModified": "2023-10-13T13:46:47.010",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-17T16:11:51.793",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "El control de acceso inadecuado en los scripts de propagaci\u00f3n de PAM en Devolutions Server 2023.2.8.0 y anteriores permite un ataque con permiso para administrar los scripts de propagaci\u00f3n de PAM para recuperar las contrase\u00f1as almacenadas en \u00e9l mediante una solicitud GET."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-Other"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023.2.8.0",
+ "matchCriteriaId": "15C3CED4-3D9D-4A6C-94CE-802DF9E2C576"
+ }
+ ]
+ }
+ ]
}
],
- "metrics": {},
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2023-0017",
- "source": "security@devolutions.net"
+ "source": "security@devolutions.net",
+ "tags": [
+ "Vendor Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5241.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5241.json
new file mode 100644
index 00000000000..2389cd85527
--- /dev/null
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5241.json
@@ -0,0 +1,133 @@
+{
+ "id": "CVE-2023-5241",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-19T06:15:11.690",
+ "lastModified": "2023-10-26T17:15:09.617",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The AI ChatBot for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.8.9 as well as 4.9.2 via the qcld_openai_upload_pagetraining_file function. This allows subscriber-level attackers to append \" leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-242143. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Port\u00e1bilis i-Educar hasta 2.7.5. Ha sido declarado problem\u00e1tico. Una funci\u00f3n desconocida del archivo \\intranet\\agenda_imprimir.php del componente HTTP GET Request Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento cod_agenda con la entrada \");'> conduce a Cross-Site Scripting (XSS). El ataque se puede lanzar de forma remota. El exploit se ha divulgado al p\u00fablico y puede El identificador asociado de esta vulnerabilidad es VDB-242143. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -71,14 +97,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2.7.5",
+ "matchCriteriaId": "618D1541-AAA7-4010-8AE0-C97F039D49AA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://vuldb.com/?ctiid.242143",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?id.242143",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5579.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5579.json
index 7137f087865..cfc467ff84b 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5579.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5579.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-5579",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-14T12:15:10.277",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T14:31:52.493",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in yhz66 Sandbox 6.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /im/user/ of the component User Data Handler. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-242144."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en yhz66 Sandbox 6.1.0. Ha sido calificado como problem\u00e1tico. Una funci\u00f3n desconocida del archivo /im/user/ del componente User Data Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-242144."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -71,18 +97,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:yzh66:sandbox:6.1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1499551A-9963-47B3-8F6E-37A82609865C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/cojoben/Sendbox/blob/main/README.md",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.242144",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?id.242144",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5580.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5580.json
index ffe3a8692a7..542cd918311 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5580.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5580.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-5580",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-14T12:15:10.353",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T20:23:33.090",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Library System 1.0. This affects an unknown part of the file index.php. The manipulation of the argument category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-242145 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en SourceCodester Library System 1.0 y clasificada como cr\u00edtica. Una parte desconocida del archivo index.php afecta a esta vulnerabilidad. La manipulaci\u00f3n de la categor\u00eda de argumento conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-242145."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -71,18 +97,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:library_system_project:library_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "AD9DDE89-9456-4FAB-B277-1F80D6D9EDBC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/GodRone/CVE/blob/main/SerBermz_SQL%20injection.md",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.242145",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?id.242145",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5581.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5581.json
index 25dc971b063..e4f1e7aeb89 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5581.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5581.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-5581",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-14T13:15:09.743",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T12:59:59.087",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in SourceCodester Medicine Tracker System 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument page leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-242146 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en SourceCodester Medicine Tracker System 1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo index.php. La manipulaci\u00f3n de la p\u00e1gina de argumentos conduce a Cross-Site Scripting (XSS). El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-242146 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -71,18 +97,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oretnom23:medicine_tracker_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "44A35599-C92F-4A69-B7B1-C768223118FD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/GodRone/MedicineTrackerSystem/blob/main/Medicine%20Tracker%20System_XSS.md",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.242146",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?id.242146",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5582.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5582.json
index 2e2e85ef954..60c8aea759f 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5582.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5582.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-5582",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-14T14:15:10.963",
- "lastModified": "2023-10-14T17:32:28.813",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-18T18:07:32.040",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in ZZZCMS 2.2.0. This issue affects some unknown processing of the component Personal Profile Page. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-242147."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en ZZZCMS 2.2.0 y clasificada como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del componente Personal Profile Page. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS) b\u00e1sicas. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-242147."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -71,18 +97,46 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:zzzcms:zzzcms:2.2.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "D737AAFD-9E0B-4B4F-A477-13764CC99842"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/Jacky-Y/vuls/blob/main/vul8.md",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.242147",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?id.242147",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5585.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5585.json
index af62d4109c4..96fe218af4a 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5585.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5585.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-5585",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-15T00:15:10.363",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T01:07:28.147",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Online Motorcycle Rental System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/?page=bike of the component Bike List. The manipulation of the argument Model with the input \"> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-242170 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Online Motorcycle Rental System 1.0. Ha sido declarado problem\u00e1tico. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /admin/?page=bike del componente Bike List. La manipulaci\u00f3n del argumento Model con la entrada \"> conduce a Cross-Site Scripting (XSS). El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede usarse. VDB-242170 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -71,14 +97,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:oretnom23:online_motorcycle_\\(bike\\)_rental_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "44A6A0FC-0D4E-4799-BA45-579E01595ACA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://vuldb.com/?ctiid.242170",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?id.242170",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5586.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5586.json
index ee5b6b562dc..0f0227cfac5 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5586.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5586.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-5586",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-15T01:15:09.100",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T01:10:36.447",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3.0-DEV."
+ },
+ {
+ "lang": "es",
+ "value": "Eliminaci\u00f3n de referencia del puntero NULL en el repositorio de GitHub gpac/gpac anterior a 2.3.0-DEV."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@@ -46,14 +72,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.3.0",
+ "matchCriteriaId": "8427BDFE-346D-45C9-B0BD-1F06E8825368"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/ca1b48f0abe71bf81a58995d7d75dc27f5a17ddc",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5588.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5588.json
index 7b3d7714345..a118a9120c1 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5588.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5588.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-5588",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-15T22:15:15.703",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T15:18:31.607",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in kphrx pleroma. It has been classified as problematic. This affects the function Pleroma.Emoji.Pack of the file lib/pleroma/emoji/pack.ex. The manipulation of the argument name leads to path traversal. The complexity of an attack is rather high. The exploitability is told to be difficult. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 2c795094535537a8607cc0d3b7f076a609636f40. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-242187."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en kphrx pleroma. Ha sido clasificada como problem\u00e1tica. Esto afecta a la funci\u00f3n Pleroma.Emoji.Pack del archivo lib/pleroma/emoji/pack.ex. La manipulaci\u00f3n del nombre del argumento conduce a un path traversal. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. Este producto no utiliza versiones. Esta es la raz\u00f3n por la que la informaci\u00f3n sobre las versiones afectadas y no afectadas no est\u00e1 disponible. El parche se llama 2c795094535537a8607cc0d3b7f076a609636f40. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-242187."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@@ -71,22 +97,53 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:kpherox:pleroma:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "63EF7C11-4A35-4E62-8C90-4DEE5B5963FF"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/kphrx/pleroma/commit/2c795094535537a8607cc0d3b7f076a609636f40",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://github.com/kphrx/pleroma/pull/197",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Patch",
+ "Vendor Advisory"
+ ]
},
{
"url": "https://vuldb.com/?ctiid.242187",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
},
{
"url": "https://vuldb.com/?id.242187",
- "source": "cna@vuldb.com"
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5590.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5590.json
index 7a497fe2159..7f228eb7e03 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5590.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5590.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-5590",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-15T23:15:44.857",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:07:40.070",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "NULL Pointer Dereference in GitHub repository seleniumhq/selenium prior to 4.14.0."
+ },
+ {
+ "lang": "es",
+ "value": "Eliminaci\u00f3n de referencia del puntero NULL en el repositorio de GitHub seleniumhq/selenium anterior a 4.14.0."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@@ -46,14 +72,40 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:selenium:selenium:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.14.0",
+ "matchCriteriaId": "D7F99E6A-73B9-4154-BCC9-93421E29945A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/seleniumhq/selenium/commit/023a0d52f106321838ab1c0997e76693f4dcbdf6",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5591.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5591.json
index d3c3cca6da5..35f381602a1 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5591.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5591.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-5591",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-16T01:15:09.857",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-19T11:09:26.690",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": " SQL Injection in GitHub repository librenms/librenms prior to 23.10.0."
+ },
+ {
+ "lang": "es",
+ "value": "Inyecci\u00f3n SQL en librenms/librenms del repositorio de GitHub anteriores a 23.10.0."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@@ -46,14 +72,38 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "23.9.1",
+ "matchCriteriaId": "8EB9DB40-F096-4A20-9F73-0756B37A5319"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/librenms/librenms/commit/908aef65967ce6184bdc587fd105660d5d55129e",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/54813d42-5b93-440e-b9b1-c179d2cbf090",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Permissions Required"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5595.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5595.json
index c9fa8398d93..6ddec5b401a 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5595.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5595.json
@@ -2,15 +2,41 @@
"id": "CVE-2023-5595",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-16T09:15:12.090",
- "lastModified": "2023-10-16T11:58:00.980",
- "vulnStatus": "Awaiting Analysis",
+ "lastModified": "2023-10-20T15:09:44.577",
+ "vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Denial of Service in GitHub repository gpac/gpac prior to 2.3.0-DEV."
+ },
+ {
+ "lang": "es",
+ "value": "Denegaci\u00f3n de Servicio en el repositorio de GitHub gpac/gpac anterior a la versi\u00f3n 2.3.0-DEV."
}
],
"metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@@ -36,8 +62,18 @@
},
"weaknesses": [
{
- "source": "security@huntr.dev",
+ "source": "nvd@nist.gov",
"type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
"description": [
{
"lang": "en",
@@ -46,14 +82,39 @@
]
}
],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.3.0",
+ "matchCriteriaId": "8427BDFE-346D-45C9-B0BD-1F06E8825368"
+ }
+ ]
+ }
+ ]
+ }
+ ],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/7a6f636db3360bb16d18078d51e8c596f31302a1",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
},
{
"url": "https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e",
- "source": "security@huntr.dev"
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
}
]
}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5602.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5602.json
new file mode 100644
index 00000000000..7e11d57fc5f
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5602.json
@@ -0,0 +1,63 @@
+{
+ "id": "CVE-2023-5602",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:13.577",
+ "lastModified": "2023-10-20T11:27:04.140",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Social Media Share Buttons & Social Sharing Icons plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.8.5. This is due to missing or incorrect nonce validation on several functions corresponding to AJAX actions. This makes it possible for unauthenticated attackers to invoke those actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Social Media Share Buttons & Social Sharing Icons para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en todas las versiones hasta la 2.8.5 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en varias funciones correspondientes a acciones AJAX. Esto hace posible que atacantes no autenticados invoquen esas acciones a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer click en un enlace."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2975574/ultimate-social-media-icons/tags/2.8.6/libs/controllers/sfsi_buttons_controller.php?old=2956446&old_path=ultimate-social-media-icons%2Ftags%2F2.8.5%2Flibs%2Fcontrollers%2Fsfsi_buttons_controller.php",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d44a45fb-3bff-4a1f-8319-a58a47a9d76b?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5613.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5613.json
new file mode 100644
index 00000000000..d1fcbcefb21
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5613.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-5613",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T05:15:08.540",
+ "lastModified": "2023-10-26T17:33:24.743",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tpsscode' shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Super Testimonials para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del shortcode 'tpsscode' del complemento en todas las versiones hasta la 2.9 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:themepoints:super_testimonials:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.9",
+ "matchCriteriaId": "551C8DE4-EA46-4D5E-95A5-30661A2B98BA"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/super-testimonial/tags/2.8/tp-testimonials.php#L214",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2979378/super-testimonial#file9",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52659f1c-642e-4c88-b3d0-d5c5a206b11c?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5614.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5614.json
new file mode 100644
index 00000000000..502ee5b513c
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5614.json
@@ -0,0 +1,124 @@
+{
+ "id": "CVE-2023-5614",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T05:15:08.660",
+ "lastModified": "2023-10-26T17:33:14.737",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Theme Switcha plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'theme_switcha_list' shortcode in all versions up to, and including, 3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Theme Switcha para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del shortcode 'theme_switcha_list' del complemento en todas las versiones hasta la 3.3 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:plugin-planet:theme_switcha:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.3",
+ "matchCriteriaId": "DF1F54D6-3625-4E89-AB5A-8EDF498DDECC"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/theme-switcha/tags/3.3/inc/plugin-core.php#L445",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2979783/theme-switcha#file1",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b0937fe-3ea6-427a-aef7-539c08687abb?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5615.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5615.json
new file mode 100644
index 00000000000..b4b53dd2010
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5615.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-5615",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:13.640",
+ "lastModified": "2023-10-26T18:16:31.840",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Skype Legacy Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'skype-status' shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Skype Legacy Buttons para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del shortcode 'skype-status' del complemento en todas las versiones hasta la 3.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:ravanh:skype_legacy_buttons:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "3.1",
+ "matchCriteriaId": "E2929CBB-5C3E-4AAB-BF5E-3894B362392B"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/skype-online-status/tags/3.1/skype-classes.php#L316",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/914bcc8f-fecd-450e-b2a7-0989b7a0dd4c?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5618.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5618.json
new file mode 100644
index 00000000000..c23f12f749b
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5618.json
@@ -0,0 +1,118 @@
+{
+ "id": "CVE-2023-5618",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T12:15:24.193",
+ "lastModified": "2023-10-27T18:50:02.090",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Modern Footnotes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode in versions up to, and including, 1.4.16 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Modern Footnotes para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado del complemento en versiones hasta la 1.4.16 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:prismtechstudios:modern_footnotes:*:*:*:*:*:wordpress:*:*",
+ "versionEndExcluding": "1.4.17",
+ "matchCriteriaId": "1A7A6EF2-B5F1-4409-B856-D234D890D055"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2980695/modern-footnotes",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c20c674f-54b5-470f-b470-07a63501eb4d?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5621.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5621.json
new file mode 100644
index 00000000000..a2889abeeaa
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5621.json
@@ -0,0 +1,123 @@
+{
+ "id": "CVE-2023-5621",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-18T08:15:08.297",
+ "lastModified": "2023-10-25T10:02:48.557",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Title field in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Thumbnail Slider With Lightbox para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del campo Image Title en versiones hasta la 1.0 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso a nivel de administrador, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:i13websolution:thumbnail_slider_with_lightbox:1.0:*:*:*:*:wordpress:*:*",
+ "matchCriteriaId": "E935AB1C-89B4-460B-981E-EC4ED85F7A27"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=1263536%40wp-responsive-slider-with-lightbox&new=1263536%40wp-responsive-slider-with-lightbox&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://wordpress.org/plugins/wp-responsive-slider-with-lightbox/",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Product"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/547c425d-8b0f-4e65-8b8a-c3a3059301fe?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5622.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5622.json
new file mode 100644
index 00000000000..0319d76b22c
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5622.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-5622",
+ "sourceIdentifier": "vulnreport@tenable.com",
+ "published": "2023-10-26T17:15:09.773",
+ "lastModified": "2023-10-26T17:33:34.980",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nUnder certain conditions, Nessus Network Monitor could allow a low privileged user to escalate privileges to NT AUTHORITY\\SYSTEM on Windows hosts by replacing a specially crafted file."
+ },
+ {
+ "lang": "es",
+ "value": "Bajo ciertas condiciones, Nessus Network Monitor podr\u00eda permitir que un usuario con pocos privilegios escale privilegios a NT AUTHORITY\\SYSTEM en hosts de Windows reemplazando un archivo especialmente manipulado."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "vulnreport@tenable.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "NONE",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.2
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.tenable.com/security/tns-2023-34",
+ "source": "vulnreport@tenable.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5623.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5623.json
new file mode 100644
index 00000000000..6c538a3e6e3
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5623.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-5623",
+ "sourceIdentifier": "vulnreport@tenable.com",
+ "published": "2023-10-26T17:15:09.860",
+ "lastModified": "2023-10-26T17:33:34.980",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nNNM failed to properly set ACLs on its installation directory, which could allow a low privileged user to run arbitrary code with SYSTEM privileges where NNM is installed to a non-standard location\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "NNM no pudo configurar correctamente las ACL en su directorio de instalaci\u00f3n, lo que podr\u00eda permitir a un usuario con pocos privilegios ejecutar c\u00f3digo arbitrario con privilegios de SYSTEM cuando NNM est\u00e1 instalado en una ubicaci\u00f3n no est\u00e1ndar."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "vulnreport@tenable.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.0,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.0,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://www.tenable.com/security/tns-2023-34",
+ "source": "vulnreport@tenable.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5624.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5624.json
new file mode 100644
index 00000000000..72426854e17
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5624.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-5624",
+ "sourceIdentifier": "vulnreport@tenable.com",
+ "published": "2023-10-26T17:15:09.923",
+ "lastModified": "2023-10-26T17:33:34.980",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nUnder certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injection.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Bajo ciertas condiciones, se descubri\u00f3 que Nessus Network Monitor no aplicaba adecuadamente la validaci\u00f3n de entrada. Esto podr\u00eda permitir a un usuario administrador modificar par\u00e1metros que potencialmente podr\u00edan permitir una inyecci\u00f3n blindSQL."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "vulnreport@tenable.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "vulnreport@tenable.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://www.tenable.com/security/tns-2023-34",
+ "source": "vulnreport@tenable.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5626.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5626.json
new file mode 100644
index 00000000000..55e360ad1ae
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5626.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-5626",
+ "sourceIdentifier": "security@huntr.dev",
+ "published": "2023-10-18T00:15:10.347",
+ "lastModified": "2023-10-25T00:11:45.460",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) in GitHub repository pkp/ojs prior to 3.3.0-16."
+ },
+ {
+ "lang": "es",
+ "value": "Cross-Site Request Forgery (CSRF) en el repositorio de GitHub pkp/ojs anterior a 3.3.0-16."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.5,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:sfu:open_journal_system:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "3.3.0-16",
+ "matchCriteriaId": "48ABAEE8-CB2D-4653-9F9D-218CB76D54FD"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/pkp/ojs/commit/99a9f393190383454aa5ddffedffc89596f6c682",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://huntr.dev/bounties/c99279c1-709a-4e7b-a042-010c2bb44d6b",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json
new file mode 100644
index 00000000000..274946c2fbf
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5631.json
@@ -0,0 +1,219 @@
+{
+ "id": "CVE-2023-5631",
+ "sourceIdentifier": "security@eset.com",
+ "published": "2023-10-18T15:15:08.727",
+ "lastModified": "2023-10-25T18:17:43.777",
+ "vulnStatus": "Modified",
+ "cisaExploitAdd": "2023-10-26",
+ "cisaActionDue": "2023-11-16",
+ "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
+ "cisaVulnerabilityName": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nRoundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker\n\nto load arbitrary JavaScript code.\n\n\n\n\n\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "Roundcube anterior a 1.4.15, 1.5.x anterior a 1.5.5 y 1.6.x anterior a 1.6.4 permiten almacenar XSS a trav\u00e9s de un mensaje de correo electr\u00f3nico HTML con un documento SVG manipulado debido al comportamiento de program/lib/Roundcube/rcube_washtml.php. Esto podr\u00eda permitir que un atacante remoto cargue c\u00f3digo JavaScript arbitrario."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@eset.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@eset.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.4.15",
+ "matchCriteriaId": "4A35A7DC-58C4-43F7-A66C-229B0A409224"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.5.0",
+ "versionEndExcluding": "1.5.5",
+ "matchCriteriaId": "AF32BDE4-0C58-4D19-9E7C-CC0C0B22DF51"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
+ "versionStartIncluding": "1.6.0",
+ "versionEndExcluding": "1.6.4",
+ "matchCriteriaId": "BBAB5ECE-B692-46C2-A3EF-6BC52E4F3C3B"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079",
+ "source": "security@eset.com",
+ "tags": [
+ "Mailing List",
+ "Patch",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d",
+ "source": "security@eset.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613",
+ "source": "security@eset.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/roundcube/roundcubemail/issues/9168",
+ "source": "security@eset.com",
+ "tags": [
+ "Exploit",
+ "Issue Tracking",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.4.15",
+ "source": "security@eset.com",
+ "tags": [
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.5",
+ "source": "security@eset.com",
+ "tags": [
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.4",
+ "source": "security@eset.com",
+ "tags": [
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html",
+ "source": "security@eset.com"
+ },
+ {
+ "url": "https://roundcube.net/news/2023/10/16/security-update-1.6.4-released",
+ "source": "security@eset.com",
+ "tags": [
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15",
+ "source": "security@eset.com",
+ "tags": [
+ "Release Notes"
+ ]
+ },
+ {
+ "url": "https://www.debian.org/security/2023/dsa-5531",
+ "source": "security@eset.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5632.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5632.json
new file mode 100644
index 00000000000..eb892a0eac5
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5632.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-5632",
+ "sourceIdentifier": "emo@eclipse.org",
+ "published": "2023-10-18T09:15:10.080",
+ "lastModified": "2023-10-25T17:32:13.007",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6\n\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "En Eclipse Mosquito anterior a 2.0.5 incluida, establecer una conexi\u00f3n con el servidor mosquitto sin enviar datos provoca que se agregue el evento EPOLLOUT, lo que resulta en un consumo excesivo de CPU. Esto podr\u00eda ser utilizado por un actor malintencionado para realizar un ataque de tipo de denegaci\u00f3n de servicio. Este problema se solucion\u00f3 en 2.0.6."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ },
+ {
+ "source": "emo@eclipse.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-834"
+ }
+ ]
+ },
+ {
+ "source": "emo@eclipse.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-834"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.0.6",
+ "matchCriteriaId": "A9ACA0BE-573B-4295-9390-F88687C64298"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/eclipse/mosquitto/commit/18bad1ff32435e523d7507e9b2ce0010124a8f2d",
+ "source": "emo@eclipse.org",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://github.com/eclipse/mosquitto/pull/2053",
+ "source": "emo@eclipse.org",
+ "tags": [
+ "Issue Tracking"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5633.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5633.json
new file mode 100644
index 00000000000..3c5143a2088
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5633.json
@@ -0,0 +1,51 @@
+{
+ "id": "CVE-2023-5633",
+ "sourceIdentifier": "secalert@redhat.com",
+ "published": "2023-10-23T22:15:09.430",
+ "lastModified": "2023-10-24T12:45:02.747",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges."
+ },
+ {
+ "lang": "es",
+ "value": "Los cambios en el recuento de referencias realizados como parte de las correcciones CVE-2023-33951 y CVE-2023-33952 expusieron una falla de use-after-free en la forma en que se manejaban los objetos de memoria cuando se usaban para almacenar una superficie. Cuando se ejecuta dentro de un invitado de VMware con la aceleraci\u00f3n 3D habilitada, un usuario local sin privilegios podr\u00eda utilizar esta falla para aumentar sus privilegios."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "secalert@redhat.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://access.redhat.com/security/cve/CVE-2023-5633",
+ "source": "secalert@redhat.com"
+ },
+ {
+ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245663",
+ "source": "secalert@redhat.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5638.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5638.json
new file mode 100644
index 00000000000..32c9180f3cf
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5638.json
@@ -0,0 +1,131 @@
+{
+ "id": "CVE-2023-5638",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-19T02:15:07.943",
+ "lastModified": "2023-10-25T15:56:14.580",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wcj_image' shortcode in versions up to, and including, 7.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Booster for WooCommerce para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'wcj_image' en versiones hasta la 7.1.2 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "7.1.2",
+ "matchCriteriaId": "8BC07205-3703-4C1D-84D6-6C40B79094B7"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/tags/7.1.2/includes/shortcodes/class-wcj-general-shortcodes.php#L1122",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/tags/7.1.3/includes/functions/wcj-functions-general.php#L1205",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/tags/7.1.3/includes/shortcodes/class-wcj-general-shortcodes.php#L1122",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f0257620-3a0e-4011-9378-7aa423e7c0b2?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5639.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5639.json
new file mode 100644
index 00000000000..71e00eb0c6e
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5639.json
@@ -0,0 +1,131 @@
+{
+ "id": "CVE-2023-5639",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-19T02:15:08.027",
+ "lastModified": "2023-10-25T15:14:54.063",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Team Showcase plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tmfshortcode' shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento Team Showcase para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'tmfshortcode' del complemento en todas las versiones hasta la 2.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:themepoints:team_showcase:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "2.1",
+ "matchCriteriaId": "42305522-F5B9-4368-A146-C1FD8DAD47C5"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/team-showcase/trunk/team-manager-free.php?rev=2912143#L489",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/team-showcase/trunk/team-manager-free.php?rev=2912143#L893",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/2980614/team-showcase",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3b26060-294e-4d4c-9295-0b08f533d5c4?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5642.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5642.json
new file mode 100644
index 00000000000..f101b4dc96a
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5642.json
@@ -0,0 +1,110 @@
+{
+ "id": "CVE-2023-5642",
+ "sourceIdentifier": "vulnreport@tenable.com",
+ "published": "2023-10-18T16:15:08.943",
+ "lastModified": "2023-10-25T01:24:38.107",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information."
+ },
+ {
+ "lang": "es",
+ "value": "Advantech R-SeeNet v2.4.23 permite a un atacante remoto no autenticado leer y escribir en el archivo snmpmon.ini, que contiene informaci\u00f3n confidencial."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ },
+ {
+ "source": "vulnreport@tenable.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "vulnreport@tenable.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-200"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:advantech:r-seenet:2.4.23:*:*:*:*:*:*:*",
+ "matchCriteriaId": "E12AEE31-409E-4E02-AB90-0AC403328C94"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://tenable.com/security/research/tra-2023-33",
+ "source": "vulnreport@tenable.com",
+ "tags": [
+ "Exploit",
+ "Vendor Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5646.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5646.json
new file mode 100644
index 00000000000..bad05032f03
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5646.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2023-5646",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T02:15:08.193",
+ "lastModified": "2023-10-23T14:15:10.370",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** it is a duplicate"
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5647.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5647.json
new file mode 100644
index 00000000000..2b224ec2d3d
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5647.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2023-5647",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T02:15:08.300",
+ "lastModified": "2023-10-23T14:15:10.470",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** it is a duplicate"
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5654.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5654.json
new file mode 100644
index 00000000000..f92d79f6869
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5654.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-5654",
+ "sourceIdentifier": "report@snyk.io",
+ "published": "2023-10-19T15:15:09.973",
+ "lastModified": "2023-10-27T21:53:06.943",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The React Developer Tools extension registers a message listener with window.addEventListener('message', ) in a content script that is accessible to any webpage that is active in the browser. Within the listener is code that requests a URL derived from the received message via fetch(). The URL is not validated or sanitised before it is fetched, thus allowing a malicious web page to arbitrarily fetch URL\u2019s via the victim's browser."
+ },
+ {
+ "lang": "es",
+ "value": "La extensi\u00f3n React Developer Tools registra un detector de mensajes con window.addEventListener('message', ) en un script de contenido al que se puede acceder desde cualquier p\u00e1gina web que est\u00e9 activa en el navegador. Dentro del oyente hay un c\u00f3digo que solicita una URL derivada del mensaje recibido mediante fetch(). La URL no se valida ni se sanitiza antes de recuperarla, lo que permite que una p\u00e1gina web maliciosa obtenga URL de forma arbitraria a trav\u00e9s del navegador de la v\u00edctima."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ },
+ {
+ "source": "report@snyk.io",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "NVD-CWE-noinfo"
+ }
+ ]
+ },
+ {
+ "source": "report@snyk.io",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-285"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:facebook:react-devtools:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "4.28.4",
+ "matchCriteriaId": "2100C135-FD9A-4DE3-A140-CD93B20C5365"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://gist.github.com/CalumHutton/1fb89b64409570a43f89d1fd3274b231",
+ "source": "report@snyk.io",
+ "tags": [
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5655.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5655.json
new file mode 100644
index 00000000000..936f99856f4
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5655.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2023-5655",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T02:15:08.367",
+ "lastModified": "2023-10-23T14:15:10.563",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** it is a duplicate"
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5656.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5656.json
new file mode 100644
index 00000000000..ebe9205c1b0
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5656.json
@@ -0,0 +1,15 @@
+{
+ "id": "CVE-2023-5656",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T08:15:13.707",
+ "lastModified": "2023-10-23T14:15:10.663",
+ "vulnStatus": "Rejected",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "** REJECT ** it is a duplicate"
+ }
+ ],
+ "metrics": {},
+ "references": []
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5668.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5668.json
new file mode 100644
index 00000000000..5ecbefdb1e2
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5668.json
@@ -0,0 +1,117 @@
+{
+ "id": "CVE-2023-5668",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2023-10-20T05:15:08.727",
+ "lastModified": "2023-10-26T17:33:02.437",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The WhatsApp Share Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'whatsapp' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ },
+ {
+ "lang": "es",
+ "value": "El complemento WhatsApp Share Button para WordPress es vulnerable a Cross-Site Scripting (XSS) Almacenado a trav\u00e9s del shortcode 'whatsapp' del complemento en todas las versiones hasta la 1.0.1 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida en los atributos proporcionados por el usuario insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:firecask:whatsapp_share_button:*:*:*:*:*:wordpress:*:*",
+ "versionEndIncluding": "1.0.1",
+ "matchCriteriaId": "23299FD1-9F10-4C74-8462-303E679C3BC6"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/whatsapp/tags/1.0.1/class-frontend.php#L46",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/77911b0f-c028-49ae-b85e-15909d806e30?source=cve",
+ "source": "security@wordfence.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5671.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5671.json
new file mode 100644
index 00000000000..4648df1efa6
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5671.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-5671",
+ "sourceIdentifier": "hp-security-alert@hp.com",
+ "published": "2023-10-25T18:17:43.867",
+ "lastModified": "2023-10-25T20:31:55.900",
+ "vulnStatus": "Awaiting Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "HP Print and Scan Doctor for Windows may potentially be vulnerable to escalation of privilege. HP is releasing software updates to mitigate the potential vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "HP Print and Scan Doctor para Windows puede ser potencialmente vulnerable a una escalada de privilegios. HP est\u00e1 lanzando actualizaciones de software para mitigar la vulnerabilidad potencial."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://support.hp.com/us-en/document/ish_9502679-9502704-16",
+ "source": "hp-security-alert@hp.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5681.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5681.json
new file mode 100644
index 00000000000..9c1f337865f
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5681.json
@@ -0,0 +1,151 @@
+{
+ "id": "CVE-2023-5681",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2023-10-20T21:15:09.933",
+ "lastModified": "2023-10-28T03:48:48.963",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_addr_fwresource_ip.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243057 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Netentsec NS-ASG Application Security Gateway 6.3 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /admin/list_addr_fwresource_ip.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-243057. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.2,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "MULTIPLE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL",
+ "baseScore": 5.8
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 6.4,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*",
+ "matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/Wsecpro/cve1/blob/main/NS-ASG-sql-list_addr_fwresource_ip.md",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.243057",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?id.243057",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5682.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5682.json
new file mode 100644
index 00000000000..fe83c1f820f
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5682.json
@@ -0,0 +1,157 @@
+{
+ "id": "CVE-2023-5682",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2023-10-20T21:15:10.023",
+ "lastModified": "2023-10-29T07:31:14.383",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability has been found in Tongda OA 2017 and classified as critical. This vulnerability affects unknown code of the file general/hr/training/record/delete.php. The manipulation of the argument RECORD_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-243058 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Tongda OA 2017 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo general/hr/training/record/delete.php. La manipulaci\u00f3n del argumento RECORD_ID conduce a la inyecci\u00f3n de SQL. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 11.10 puede solucionar este problema. Se recomienda actualizar el componente afectado. VDB-243058 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "ADJACENT_NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
+ "accessVector": "ADJACENT_NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "SINGLE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL",
+ "baseScore": 5.2
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 5.1,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tongda2000:tongda_oa:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "11.10",
+ "matchCriteriaId": "17F21834-2024-4969-BB2C-1C56D7C85F5D"
+ },
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:tongda2000:tongda_oa:2017:*:*:*:*:*:*:*",
+ "matchCriteriaId": "A77F4CAB-A2ED-4AFF-B9C7-03C69B14AE9D"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/Godfather-onec/cve/blob/main/sql.md",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.243058",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?id.243058",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json
new file mode 100644
index 00000000000..0296307d465
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json
@@ -0,0 +1,164 @@
+{
+ "id": "CVE-2023-5683",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2023-10-21T05:16:07.347",
+ "lastModified": "2023-10-28T03:35:27.703",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20231010 and classified as critical. This issue affects some unknown processing of the file /sysmanage/importconf.php. The manipulation of the argument btn_file_renew leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243059. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Beijing Baichuo Smart S85F Management Platform hasta 20231010 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /sysmanage/importconf.php. La manipulaci\u00f3n del argumento btn_file_renew conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-243059. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "SINGLE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL",
+ "baseScore": 6.5
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 8.0,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:byzoro:smart_s85f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023-10-10",
+ "matchCriteriaId": "E491B94F-E51C-4F61-98BD-44E1105B3794"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:byzoro:smart_s85f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1E47769D-223D-4113-A1D0-5736287B1DE2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/yaphetszz/cve/blob/main/upload.md",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.243059",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?id.243059",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5684.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5684.json
new file mode 100644
index 00000000000..257892b9f5d
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5684.json
@@ -0,0 +1,164 @@
+{
+ "id": "CVE-2023-5684",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2023-10-21T07:15:07.987",
+ "lastModified": "2023-10-28T03:44:56.627",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20231012. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /importexport.php. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243061 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Beijing Baichuo Smart S85F Management Platform hasta 20231012 y ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo /importexport.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-243061. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "MULTIPLE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL",
+ "baseScore": 5.8
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 6.4,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-78"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "operator": "AND",
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:o:byzoro:smart_s85f_firmware:*:*:*:*:*:*:*:*",
+ "versionEndIncluding": "2023-10-12",
+ "matchCriteriaId": "66312BE1-E671-4A2B-9BFA-8BFECBCA2F07"
+ }
+ ]
+ },
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": false,
+ "criteria": "cpe:2.3:h:byzoro:smart_s85f:-:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1E47769D-223D-4113-A1D0-5736287B1DE2"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/Chef003/cve/blob/main/rce.md",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.243061",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?id.243061",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5686.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5686.json
new file mode 100644
index 00000000000..ae7527ddf33
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5686.json
@@ -0,0 +1,121 @@
+{
+ "id": "CVE-2023-5686",
+ "sourceIdentifier": "security@huntr.dev",
+ "published": "2023-10-20T17:15:08.747",
+ "lastModified": "2023-10-27T18:52:07.290",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0."
+ },
+ {
+ "lang": "es",
+ "value": "Desbordamiento de b\u00fafer basado en mont\u00f3n en el repositorio de GitHub radareorg/radare2 antes de 5.9.0."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-787"
+ }
+ ]
+ },
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-122"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "5.9.0",
+ "matchCriteriaId": "0E042C08-7911-4974-A2A6-95F0EFD10809"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/radareorg/radare2/commit/1bdda93e348c160c84e30da3637acef26d0348de",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5687.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5687.json
new file mode 100644
index 00000000000..c2e02293e47
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5687.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-5687",
+ "sourceIdentifier": "security@huntr.dev",
+ "published": "2023-10-20T17:15:08.813",
+ "lastModified": "2023-10-27T18:51:42.730",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) in GitHub repository mosparo/mosparo prior to 1.0.3."
+ },
+ {
+ "lang": "es",
+ "value": "Cross-Site Request Forgery (CSRF) en el repositorio de GitHub mosparo/mosparo antes de 1.0.3."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "LOW",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:mosparo:mosparo:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "1.0.3",
+ "matchCriteriaId": "D5115402-D9D1-4643-A9A7-FB741E1321B0"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/mosparo/mosparo/commit/fb3ac528b7548beb802182310967968a21c1354a",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://huntr.com/bounties/33f95510-cdee-460e-8e61-107874962f2d",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5688.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5688.json
new file mode 100644
index 00000000000..b5de304ee49
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5688.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-5688",
+ "sourceIdentifier": "security@huntr.dev",
+ "published": "2023-10-20T17:15:08.883",
+ "lastModified": "2023-10-27T18:51:36.000",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2."
+ },
+ {
+ "lang": "es",
+ "value": "Cross-site Scripting (XSS): DOM en el repositorio de GitHub modoboa/modoboa anterior a 2.2.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.2.2",
+ "matchCriteriaId": "07F47C6D-A091-4637-90E1-9FDC92F2973E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/modoboa/modoboa/commit/d33d3cd2d11dbfebd8162c46e2c2a9873919a967",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://huntr.com/bounties/0ceb10e4-952b-4ca4-baf8-5b6f12e3a8a7",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5689.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5689.json
new file mode 100644
index 00000000000..bc362fad434
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5689.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-5689",
+ "sourceIdentifier": "security@huntr.dev",
+ "published": "2023-10-20T17:15:08.953",
+ "lastModified": "2023-10-27T18:52:11.203",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2."
+ },
+ {
+ "lang": "es",
+ "value": "Cross-site Scripting (XSS): DOM en el repositorio de GitHub modoboa/modoboa anterior a 2.2.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.3,
+ "impactScore": 2.7
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.1,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 5.9
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.2.2",
+ "matchCriteriaId": "07F47C6D-A091-4637-90E1-9FDC92F2973E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/modoboa/modoboa/commit/d33d3cd2d11dbfebd8162c46e2c2a9873919a967",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://huntr.com/bounties/24835833-3421-412b-bafb-1b7ea3cf60e6",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5690.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5690.json
new file mode 100644
index 00000000000..02888966eb1
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5690.json
@@ -0,0 +1,111 @@
+{
+ "id": "CVE-2023-5690",
+ "sourceIdentifier": "security@huntr.dev",
+ "published": "2023-10-20T17:15:09.020",
+ "lastModified": "2023-10-27T18:50:44.663",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.2.2."
+ },
+ {
+ "lang": "es",
+ "value": "Cross-Site Request Forgery (CSRF) en el repositorio de GitHub modoboa/modoboa antes de 2.2.2."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.8,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 5.9
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security@huntr.dev",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-352"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:*:*:*",
+ "versionEndExcluding": "2.2.2",
+ "matchCriteriaId": "07F47C6D-A091-4637-90E1-9FDC92F2973E"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/modoboa/modoboa/commit/23e4c25511c66c0548da001236f47e19e3f9e4d9",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Patch"
+ ]
+ },
+ {
+ "url": "https://huntr.com/bounties/980c75a5-d978-4b0e-9bcc-2b2682c97e01",
+ "source": "security@huntr.dev",
+ "tags": [
+ "Exploit",
+ "Patch",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5693.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5693.json
new file mode 100644
index 00000000000..33224a6d089
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5693.json
@@ -0,0 +1,153 @@
+{
+ "id": "CVE-2023-5693",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2023-10-22T23:15:08.067",
+ "lastModified": "2023-10-28T03:38:51.327",
+ "vulnStatus": "Undergoing Analysis",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in CodeAstro Internet Banking System 1.0 and classified as critical. This issue affects some unknown processing of the file pages_reset_pwd.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243131."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en CodeAstro Internet Banking System 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo pages_reset_pwd.php. La manipulaci\u00f3n del argumento email conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-243131."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 9.8,
+ "baseSeverity": "CRITICAL"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 5.9
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "SINGLE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL",
+ "baseScore": 6.5
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 8.0,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:codeastro:internet_banking_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "1E22B024-DF7A-4CC7-BE59-CFA07165DC9F"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/E1CHO/cve_hub/blob/main/Internet%20Banking%20System/Internet%20Banking%20System%20-%20vuln%201.pdf",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.243131",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?id.243131",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5694.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5694.json
new file mode 100644
index 00000000000..01dea380570
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5694.json
@@ -0,0 +1,152 @@
+{
+ "id": "CVE-2023-5694",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2023-10-22T23:15:08.130",
+ "lastModified": "2023-10-28T03:44:14.797",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been classified as problematic. Affected is an unknown function of the file pages_system_settings.php. The manipulation of the argument sys_name with the input leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243132."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en CodeAstro Internet Banking System 1.0. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo pages_system_settings.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento sys_name con la entrada conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-243132."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.5,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 1.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "SINGLE",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.0
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 8.0,
+ "impactScore": 2.9,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:martmbithi:internet_banking_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD0AF461-CF49-4FCA-BDCC-935CE159A06A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/E1CHO/cve_hub/blob/main/Internet%20Banking%20System/Internet%20Banking%20System%20-%20vuln%202.pdf",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.243132",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?id.243132",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5695.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5695.json
new file mode 100644
index 00000000000..6ace03d220e
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5695.json
@@ -0,0 +1,152 @@
+{
+ "id": "CVE-2023-5695",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2023-10-22T23:15:08.200",
+ "lastModified": "2023-10-28T03:41:49.800",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file pages_reset_pwd.php. The manipulation of the argument email with the input testing%40example.com'%26%25 leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243133 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en CodeAstro Internet Banking System 1.0. Ha sido declarada problem\u00e1tica. Una funci\u00f3n desconocida del archivo pages_reset_pwd.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento email con la entrada testing%40example.com'%26%25alert(9860) conduce a cross site scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-243133."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ],
+ "cvssMetricV30": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.0",
+ "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.5,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 2.1,
+ "impactScore": 1.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "SINGLE",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.0
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 8.0,
+ "impactScore": 2.9,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "nvd@nist.gov",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ },
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-79"
+ }
+ ]
+ }
+ ],
+ "configurations": [
+ {
+ "nodes": [
+ {
+ "operator": "OR",
+ "negate": false,
+ "cpeMatch": [
+ {
+ "vulnerable": true,
+ "criteria": "cpe:2.3:a:martmbithi:internet_banking_system:1.0:*:*:*:*:*:*:*",
+ "matchCriteriaId": "FD0AF461-CF49-4FCA-BDCC-935CE159A06A"
+ }
+ ]
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/E1CHO/cve_hub/blob/main/Internet%20Banking%20System/Internet%20Banking%20System%20-%20vuln%203.pdf",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Exploit",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.243133",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Permissions Required",
+ "Third Party Advisory"
+ ]
+ },
+ {
+ "url": "https://vuldb.com/?id.243133",
+ "source": "cna@vuldb.com",
+ "tags": [
+ "Third Party Advisory"
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5696.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5696.json
new file mode 100644
index 00000000000..372c4670519
--- /dev/null
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5696.json
@@ -0,0 +1,152 @@
+{
+ "id": "CVE-2023-5696",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2023-10-22T23:15:08.260",
+ "lastModified": "2023-10-28T03:43:53.283",
+ "vulnStatus": "Analyzed",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file pages_transfer_money.php. The manipulation of the argument account_number with the input 357146928-->