Auto-Update: 2023-07-11T02:00:51.334562+00:00

This commit is contained in:
cad-safe-bot 2023-07-11 02:00:55 +00:00
parent dd80e8a1de
commit 669df9fb48
11 changed files with 629 additions and 85 deletions

View File

@ -2,23 +2,86 @@
"id": "CVE-2021-46890",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-07-05T12:15:09.507",
"lastModified": "2023-07-05T13:00:26.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-11T00:24:44.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD62E8B-CB4B-43A6-98E8-09A8A1A3505B"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/7/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,49 @@
"id": "CVE-2021-46891",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-07-05T13:15:09.413",
"lastModified": "2023-07-05T16:25:43.523",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-11T00:28:45.877",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -23,14 +56,42 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD62E8B-CB4B-43A6-98E8-09A8A1A3505B"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2023/7/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34107",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-05T20:15:10.177",
"lastModified": "2023-07-05T20:31:30.957",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-11T00:21:52.767",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -50,14 +70,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.2.0",
"versionEndExcluding": "10.0.8",
"matchCriteriaId": "E4EB281D-CA0A-41FD-94AE-F0DD97DA641F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-966h-xrf5-pmj4",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34244",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-05T20:15:10.260",
"lastModified": "2023-07-05T20:31:30.957",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-11T00:14:17.360",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.4.0",
"versionEndExcluding": "10.0.8",
"matchCriteriaId": "04DC3FB6-3BF0-4269-AACF-BD52DC25EEB1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-p93p-pwg9-w95w",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35924",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-05T20:15:10.483",
"lastModified": "2023-07-05T20:31:30.957",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-11T00:11:06.083",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.8",
"matchCriteriaId": "AD9F0BED-0131-4054-BA93-5F7A65358262"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-gxh4-j63w-8jmm",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35939",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-05T21:15:09.707",
"lastModified": "2023-07-06T11:55:38.310",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-11T00:03:34.423",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -50,14 +70,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.5.0",
"versionEndExcluding": "10.0.8",
"matchCriteriaId": "890DEF65-8D7D-44EC-A053-B847F0163B14"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-cjcx-pwcx-v34c",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35940",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-05T21:15:09.787",
"lastModified": "2023-07-06T11:55:38.310",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-11T00:02:21.370",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -50,14 +80,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.5.0",
"versionEndExcluding": "10.0.8",
"matchCriteriaId": "890DEF65-8D7D-44EC-A053-B847F0163B14"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-qrh8-rg45-45fw",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35973",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-07-05T15:15:09.437",
"lastModified": "2023-07-05T16:25:41.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-11T00:50:42.443",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "security-alert@hpe.com",
"type": "Secondary",
@ -34,10 +54,137 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5.4.0",
"versionEndExcluding": "8.6.0.21",
"matchCriteriaId": "F16AFF8F-596A-4153-8529-36AD2E142066"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.7.0.0",
"versionEndExcluding": "8.10.0.7",
"matchCriteriaId": "DC566921-54C3-4368-A7FB-1F68F964975C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.11.0.0",
"versionEndExcluding": "8.11.1.1",
"matchCriteriaId": "A22E7E61-B318-47C8-8C72-498A17031997"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.4.0.0",
"versionEndExcluding": "10.4.0.2",
"matchCriteriaId": "6418722E-304A-46EF-8D9E-EB42596F0DFC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:arubanetworks:mc-va-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51A31372-168E-4182-BFE0-440403454DC5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:arubanetworks:mc-va-1k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F519E5CF-474B-4564-9DC4-AE6FC58A48A7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:arubanetworks:mc-va-250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51478694-008E-47A4-B8AF-497BA81EC80D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:arubanetworks:mc-va-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A10EF4D1-35E8-41BB-8453-19F0F3623D25"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:arubanetworks:mcr-va-10k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA5AF43C-F2E3-44E7-B4E3-AC315B0B0DB2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:arubanetworks:mcr-va-1k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "276FF1F2-7353-4AF4-8BDA-8B78B5DCF688"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:arubanetworks:mcr-va-50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCAB5D5-EB6D-460A-A8C7-0A2A9E813776"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:arubanetworks:mcr-va-500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "413B049C-8B7F-4BAC-8170-2BF3B0EEA43F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:arubanetworks:mcr-va-5k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F87B24FC-9C99-4CF7-9481-74686E48E800"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:arubanetworks:sd-wan:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47E812E5-4476-4335-97D7-3D0E2A5E9E9B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:mcr-hw-10k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA9CA7B-AC2C-408A-B759-E2F4778B20ED"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:mcr-hw-1k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38A42369-3558-4015-AF7B-7F2E2465AE61"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:mcr-hw-5k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0D8DDC4-17FB-4A9D-BB01-E8C130B04ED2"
}
]
}
]
}
],
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt",
"source": "security-alert@hpe.com"
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36808",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-05T21:15:10.017",
"lastModified": "2023-07-06T11:55:38.310",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-10T23:58:42.933",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.80",
"versionEndExcluding": "10.0.8",
"matchCriteriaId": "F1A3115A-400D-4977-93AA-D33F2516C35E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi/releases/tag/10.0.8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vf5h-jh9q-2gjm",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-37191",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-11T01:15:12.883",
"lastModified": "2023-07-11T01:15:12.883",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in Issabel issabel-pbx v.4.0.0-6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Group and Description parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/sahiloj/CVE-2023-37191/blob/main/README.md",
"source": "cve@mitre.org"
},
{
"url": "https://reference3.example.com/index.php?menu=faxnew",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-10T23:55:47.047247+00:00
2023-07-11T02:00:51.334562+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-10T23:55:12.697000+00:00
2023-07-11T01:15:12.883000+00:00
```
### Last Data Feed Release
@ -23,66 +23,35 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2023-07-10T00:00:13.552837+00:00
2023-07-11T00:00:13.555672+00:00
```
### Total Number of included CVEs
```plain
219654
219655
```
### CVEs added in the last Commit
Recently added CVEs: `16`
Recently added CVEs: `1`
* [CVE-2023-30765](CVE-2023/CVE-2023-307xx/CVE-2023-30765.json) (`2023-07-10T20:15:15.237`)
* [CVE-2023-34316](CVE-2023/CVE-2023-343xx/CVE-2023-34316.json) (`2023-07-10T20:15:15.310`)
* [CVE-2023-3605](CVE-2023/CVE-2023-36xx/CVE-2023-3605.json) (`2023-07-10T20:15:15.377`)
* [CVE-2023-22835](CVE-2023/CVE-2023-228xx/CVE-2023-22835.json) (`2023-07-10T21:15:10.540`)
* [CVE-2023-24486](CVE-2023/CVE-2023-244xx/CVE-2023-24486.json) (`2023-07-10T21:15:10.600`)
* [CVE-2023-24487](CVE-2023/CVE-2023-244xx/CVE-2023-24487.json) (`2023-07-10T21:15:10.650`)
* [CVE-2023-24488](CVE-2023/CVE-2023-244xx/CVE-2023-24488.json) (`2023-07-10T21:15:10.707`)
* [CVE-2023-34432](CVE-2023/CVE-2023-344xx/CVE-2023-34432.json) (`2023-07-10T21:15:10.763`)
* [CVE-2023-3606](CVE-2023/CVE-2023-36xx/CVE-2023-3606.json) (`2023-07-10T21:15:10.823`)
* [CVE-2023-3607](CVE-2023/CVE-2023-36xx/CVE-2023-3607.json) (`2023-07-10T21:15:10.887`)
* [CVE-2023-24489](CVE-2023/CVE-2023-244xx/CVE-2023-24489.json) (`2023-07-10T22:15:09.197`)
* [CVE-2023-24490](CVE-2023/CVE-2023-244xx/CVE-2023-24490.json) (`2023-07-10T22:15:09.263`)
* [CVE-2023-30956](CVE-2023/CVE-2023-309xx/CVE-2023-30956.json) (`2023-07-10T22:15:09.337`)
* [CVE-2023-30960](CVE-2023/CVE-2023-309xx/CVE-2023-30960.json) (`2023-07-10T22:15:09.410`)
* [CVE-2023-30963](CVE-2023/CVE-2023-309xx/CVE-2023-30963.json) (`2023-07-10T22:15:09.477`)
* [CVE-2023-3608](CVE-2023/CVE-2023-36xx/CVE-2023-3608.json) (`2023-07-10T22:15:09.530`)
* [CVE-2023-37191](CVE-2023/CVE-2023-371xx/CVE-2023-37191.json) (`2023-07-11T01:15:12.883`)
### CVEs modified in the last Commit
Recently modified CVEs: `41`
Recently modified CVEs: `9`
* [CVE-2022-41186](CVE-2022/CVE-2022-411xx/CVE-2022-41186.json) (`2023-07-10T21:15:09.467`)
* [CVE-2022-41187](CVE-2022/CVE-2022-411xx/CVE-2022-41187.json) (`2023-07-10T21:15:09.540`)
* [CVE-2022-41189](CVE-2022/CVE-2022-411xx/CVE-2022-41189.json) (`2023-07-10T21:15:09.613`)
* [CVE-2022-41190](CVE-2022/CVE-2022-411xx/CVE-2022-41190.json) (`2023-07-10T21:15:09.690`)
* [CVE-2022-41191](CVE-2022/CVE-2022-411xx/CVE-2022-41191.json) (`2023-07-10T21:15:09.763`)
* [CVE-2022-41193](CVE-2022/CVE-2022-411xx/CVE-2022-41193.json) (`2023-07-10T21:15:09.837`)
* [CVE-2022-41195](CVE-2022/CVE-2022-411xx/CVE-2022-41195.json) (`2023-07-10T21:15:09.913`)
* [CVE-2022-41196](CVE-2022/CVE-2022-411xx/CVE-2022-41196.json) (`2023-07-10T21:15:09.993`)
* [CVE-2022-41198](CVE-2022/CVE-2022-411xx/CVE-2022-41198.json) (`2023-07-10T21:15:10.063`)
* [CVE-2022-41199](CVE-2022/CVE-2022-411xx/CVE-2022-41199.json) (`2023-07-10T21:15:10.147`)
* [CVE-2022-41200](CVE-2022/CVE-2022-412xx/CVE-2022-41200.json) (`2023-07-10T21:15:10.223`)
* [CVE-2022-41201](CVE-2022/CVE-2022-412xx/CVE-2022-41201.json) (`2023-07-10T21:15:10.300`)
* [CVE-2022-41202](CVE-2022/CVE-2022-412xx/CVE-2022-41202.json) (`2023-07-10T21:15:10.373`)
* [CVE-2022-41211](CVE-2022/CVE-2022-412xx/CVE-2022-41211.json) (`2023-07-10T21:15:10.447`)
* [CVE-2022-47927](CVE-2022/CVE-2022-479xx/CVE-2022-47927.json) (`2023-07-10T23:15:08.933`)
* [CVE-2023-26136](CVE-2023/CVE-2023-261xx/CVE-2023-26136.json) (`2023-07-10T23:15:09.030`)
* [CVE-2023-3505](CVE-2023/CVE-2023-35xx/CVE-2023-3505.json) (`2023-07-10T23:18:54.143`)
* [CVE-2023-21635](CVE-2023/CVE-2023-216xx/CVE-2023-21635.json) (`2023-07-10T23:27:42.030`)
* [CVE-2023-21637](CVE-2023/CVE-2023-216xx/CVE-2023-21637.json) (`2023-07-10T23:31:13.807`)
* [CVE-2023-21638](CVE-2023/CVE-2023-216xx/CVE-2023-21638.json) (`2023-07-10T23:32:10.557`)
* [CVE-2023-35786](CVE-2023/CVE-2023-357xx/CVE-2023-35786.json) (`2023-07-10T23:33:29.193`)
* [CVE-2023-3336](CVE-2023/CVE-2023-33xx/CVE-2023-3336.json) (`2023-07-10T23:37:04.847`)
* [CVE-2023-21640](CVE-2023/CVE-2023-216xx/CVE-2023-21640.json) (`2023-07-10T23:38:21.937`)
* [CVE-2023-35972](CVE-2023/CVE-2023-359xx/CVE-2023-35972.json) (`2023-07-10T23:48:12.443`)
* [CVE-2023-22319](CVE-2023/CVE-2023-223xx/CVE-2023-22319.json) (`2023-07-10T23:55:12.697`)
* [CVE-2021-46890](CVE-2021/CVE-2021-468xx/CVE-2021-46890.json) (`2023-07-11T00:24:44.113`)
* [CVE-2021-46891](CVE-2021/CVE-2021-468xx/CVE-2021-46891.json) (`2023-07-11T00:28:45.877`)
* [CVE-2023-36808](CVE-2023/CVE-2023-368xx/CVE-2023-36808.json) (`2023-07-10T23:58:42.933`)
* [CVE-2023-35940](CVE-2023/CVE-2023-359xx/CVE-2023-35940.json) (`2023-07-11T00:02:21.370`)
* [CVE-2023-35939](CVE-2023/CVE-2023-359xx/CVE-2023-35939.json) (`2023-07-11T00:03:34.423`)
* [CVE-2023-35924](CVE-2023/CVE-2023-359xx/CVE-2023-35924.json) (`2023-07-11T00:11:06.083`)
* [CVE-2023-34244](CVE-2023/CVE-2023-342xx/CVE-2023-34244.json) (`2023-07-11T00:14:17.360`)
* [CVE-2023-34107](CVE-2023/CVE-2023-341xx/CVE-2023-34107.json) (`2023-07-11T00:21:52.767`)
* [CVE-2023-35973](CVE-2023/CVE-2023-359xx/CVE-2023-35973.json) (`2023-07-11T00:50:42.443`)
## Download and Usage