mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2023-08-15T20:00:34.868319+00:00
This commit is contained in:
parent
34c4c9e7e5
commit
6f4cc5b100
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2013-3458",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2013-09-08T03:17:39.537",
|
||||
"lastModified": "2023-08-11T18:54:47.730",
|
||||
"lastModified": "2023-08-15T18:21:36.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -74,8 +74,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:h:cisco:adaptive_security_appliance:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AE0FF56-DBD4-459C-9F65-7E05603833D8"
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F7FDABB-8C67-4E56-A533-233B50047603"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-3867",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2017-03-17T22:59:00.267",
|
||||
"lastModified": "2023-08-15T15:14:43.030",
|
||||
"lastModified": "2023-08-15T18:21:36.797",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -136,8 +136,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:cisco:adaptive_security_appliance:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AE0FF56-DBD4-459C-9F65-7E05603833D8"
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8F7FDABB-8C67-4E56-A533-233B50047603"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-12677",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2019-10-02T19:15:12.327",
|
||||
"lastModified": "2022-05-25T17:34:45.180",
|
||||
"lastModified": "2023-08-15T18:25:32.857",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -121,13 +121,6 @@
|
||||
"versionEndExcluding": "9.1.7.4",
|
||||
"matchCriteriaId": "B45FE984-31F2-450E-B9D7-5D847E0180C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.2",
|
||||
"versionEndExcluding": "9.2.4.8",
|
||||
"matchCriteriaId": "02C4135C-46B1-44BD-A6C9-4F071AE01006"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
||||
@ -142,19 +135,26 @@
|
||||
"versionEndExcluding": "9.5.2.5",
|
||||
"matchCriteriaId": "1ED8AB16-31A6-415F-A961-E9F8D3351675"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.6",
|
||||
"versionEndExcluding": "9.6.2",
|
||||
"matchCriteriaId": "35DE3862-77E5-4300-9D4D-583E64061AE8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.3",
|
||||
"versionEndExcluding": "9.3.3.9",
|
||||
"matchCriteriaId": "4D7468AA-4332-41CC-9B7D-C16CDF45522F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.2",
|
||||
"versionEndExcluding": "9.2.4.8",
|
||||
"matchCriteriaId": "E0AA239B-A459-4F22-8CB2-BB3AC5AB205F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.6",
|
||||
"versionEndExcluding": "9.6.2",
|
||||
"matchCriteriaId": "A4BA9724-957D-4E67-9C3F-9FCE199B1DA4"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-41544",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-08-08T10:15:12.500",
|
||||
"lastModified": "2023-08-08T12:51:11.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:41:04.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-188491.pdf",
|
||||
"source": "productcert@siemens.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:software_center:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.0",
|
||||
"matchCriteriaId": "E1BAD8E7-AD1E-42B0-9A37-16986A7FC4BE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-188491.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20924",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2022-11-15T21:15:31.730",
|
||||
"lastModified": "2022-11-22T14:36:16.027",
|
||||
"lastModified": "2023-08-15T18:20:10.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -98,11 +98,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3658FDC4-FC57-4281-9376-F66B0CC85826"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F5018B2-1036-469C-9D64-C7D539533F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.2:*:*:*:*:*:*:*",
|
||||
@ -277,6 +272,11 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.18.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E80230C-EF78-4E7E-80C2-2746E3968EB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FF1A5FC-73BE-4218-86D9-2E81FA64EABD"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20927",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2022-11-15T21:15:32.607",
|
||||
"lastModified": "2022-11-22T14:46:18.090",
|
||||
"lastModified": "2023-08-15T18:20:10.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,7 +61,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -98,11 +98,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "182203D1-EA05-47BB-8682-9B4506DE97A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A24B2332-9F18-411F-9FB3-EBA2D2CA8F7C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.16:*:*:*:*:*:*:*",
|
||||
@ -138,11 +133,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3658FDC4-FC57-4281-9376-F66B0CC85826"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F5018B2-1036-469C-9D64-C7D539533F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.2:*:*:*:*:*:*:*",
|
||||
@ -242,6 +232,16 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1375D7A6-6645-4C0A-A527-11F5714A8B5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23C82327-5362-4876-8058-EB51030CD5DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FF1A5FC-73BE-4218-86D9-2E81FA64EABD"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20928",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2022-11-15T21:15:32.720",
|
||||
"lastModified": "2022-11-21T15:08:38.440",
|
||||
"lastModified": "2023-08-15T18:20:10.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -73,56 +73,6 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D70E1F57-AF04-40D2-B4B7-F9B6931C023E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F0CD7A7-9747-4074-8089-5924A871828C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "623546CA-997C-4B29-A39A-38A1E917FF47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.1.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02930611-7A74-4973-9314-FE6F3DCD8479"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "750BC96A-3CAD-4281-ACF0-87696E8524DF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20467402-9FBA-4F20-91A9-FA7B0B5E6C80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "95E2D7E0-900D-4C8B-805E-8CC725AF6722"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1A2F498-6451-4A9C-A5F2-5AB912986733"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DB8A573-98BB-4581-BCC1-3C72EC8B3F3B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07712952-9241-4596-BA4D-6E4EEFF8D558"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.13:*:*:*:*:*:*:*",
|
||||
@ -138,16 +88,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B666B342-9C0A-45AC-B2CE-44F189C7D92A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC9A4FB6-B434-4CB8-B420-961606DEE100"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3406E8C-4682-47E5-A666-8E30153A5B16"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.3.3:*:*:*:*:*:*:*",
|
||||
@ -188,26 +128,11 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.3.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66CAE892-0FDC-4601-997B-875405BA6D97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C35E4BCD-52A6-437D-829B-89C232D7F63C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0BB94C4E-9346-46A9-AB0D-1C06574B72C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6013942C-EC86-4455-A985-33C6E0A3ED8B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1958CE6B-8B4A-41ED-B228-CFCA9A2C793E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.8:*:*:*:*:*:*:*",
|
||||
@ -233,16 +158,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A32D2E99-65CC-4BD6-AA4B-98B734664303"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0128E17F-84FA-454B-B4BF-D2A6B6A32619"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52EB5452-1642-4ECF-8EB0-5C7086B17C5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.22:*:*:*:*:*:*:*",
|
||||
@ -258,11 +173,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1254921-947C-4549-9D69-1513FA45152D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F6B0078-1634-413E-9EBF-9FA72E9CDFA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.29:*:*:*:*:*:*:*",
|
||||
@ -303,16 +213,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.45:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45000609-AC75-47F5-A850-7773E210D1CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70F1EAD5-2EC4-4E13-B4DC-762A66F474F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67B01A5D-75BA-4449-B172-82A72C588B80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1.4:*:*:*:*:*:*:*",
|
||||
@ -333,16 +233,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F45B06C-735F-4931-9E01-66FA151054F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DFD9929-92DA-4022-B8AF-DC2313FE2DC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8385FDE-E6A2-4495-84A3-E4C45EC81340"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.1:*:*:*:*:*:*:*",
|
||||
@ -358,11 +248,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39E87945-C837-43F9-A623-966B51DEE412"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "823E1E1A-97EA-43BE-9A17-00560C8A8C9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.8:*:*:*:*:*:*:*",
|
||||
@ -383,16 +268,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DEFC69B0-90C0-4F16-A0D9-F1BE545BC31F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2818249A-E55D-4341-AB9D-CB650096E318"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9032AB1C-B84D-446D-93DD-6EAF585842E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.26:*:*:*:*:*:*:*",
|
||||
@ -438,36 +313,16 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD8716C2-FCDE-445D-9A15-4955DD63D198"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "844185D4-7E2E-4407-8201-93C6918AAAF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20913177-C7B4-402C-A7A8-2E7E45D3CA65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97CF48F5-B594-410D-A098-A96287653E38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A178961D-1EDB-4672-96A4-497FE5AB7F77"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "784768E5-6CCC-4477-B9D6-AD75EFA8A6F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9500C9B-EF4B-436A-AA81-B62FECE42232"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.3:*:*:*:*:*:*:*",
|
||||
@ -518,16 +373,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02D0493-5B73-4348-A338-EDE89244310F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0E71C8E5-E578-4294-9E71-3005E3A2C55E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43DFEA3F-C62F-4921-964F-C8EA1797C2AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.32:*:*:*:*:*:*:*",
|
||||
@ -578,26 +423,11 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.45:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B4D7A82-21E8-4113-B8D1-63224CD0EFFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D65349B0-E01A-4AF1-8DD0-B7A92BC87C90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A09357F-139B-4909-BE14-770074B4AB3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8BB1082-C525-4AEC-88BB-260FA7B94CEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA4F9600-7D26-48A3-985F-BA08BC1A03E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.5:*:*:*:*:*:*:*",
|
||||
@ -638,31 +468,11 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78169F85-AE1E-4D85-A8C6-DD415B073514"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "697EB5F2-2737-4926-8B1E-9C99A1795FD4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6751FD41-6670-41B0-8EF1-CEE0336CF975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0233D3A0-A056-4AAE-BBDB-EC6EDC6E1ACF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.47:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D8114FE-512C-4F49-BBF2-66BFD997C866"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4BDF6A5-B0A1-491E-AC5C-36D4F43AF6F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.52:*:*:*:*:*:*:*",
|
||||
@ -683,11 +493,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.61:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F7555FD-B521-4DB9-9638-9952AE3D0814"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.66:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9AA8E18-365D-421A-A370-6BF3E00ACB5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.67:*:*:*:*:*:*:*",
|
||||
@ -698,11 +503,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.74:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "197D15B5-4694-4608-B651-18917E8BDC5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.80:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DAE1C783-7B7B-4627-8F24-C00CAD201482"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.83:*:*:*:*:*:*:*",
|
||||
@ -718,16 +518,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4457D41B-339A-4FAD-BCFF-5ABCEC072315"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3440DEEA-1CDC-4723-8BB1-C99FB7F8DE7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "337193C1-741E-4618-AAA2-7098988F6A56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.10:*:*:*:*:*:*:*",
|
||||
@ -738,11 +528,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FB80B89-40D4-474D-9F96-2B29253AC4BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54477B7D-FAF1-4338-81CB-B4C43A3F2E16"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.22:*:*:*:*:*:*:*",
|
||||
@ -753,11 +538,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1ABF0FE1-B115-4AAC-A73F-2FB4A1C7C618"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40B2468F-17AB-4135-B488-CCF34FFD0616"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.32:*:*:*:*:*:*:*",
|
||||
@ -778,11 +558,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E840D341-1D05-4D3A-B722-BDF8AEB92776"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "368A7088-134C-4D47-BDF1-8A1F9AF7EF8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.1:*:*:*:*:*:*:*",
|
||||
@ -798,11 +573,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E259EBE0-ABE4-45A7-92F3-D7D517DB5634"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94B55C22-4065-477C-AF6F-44AC8A55EC8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.1:*:*:*:*:*:*:*",
|
||||
@ -813,11 +583,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "479CA237-B51A-4BBC-8BE1-F51123313C4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F1E96DA-F1B6-43C9-BECD-FC0144BB159B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.9:*:*:*:*:*:*:*",
|
||||
@ -858,11 +623,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A266EBC6-EEB0-4B0D-BDE5-08887F3D2F0A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3CBC316-0395-44CD-9ED0-5916173BFEF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.4.7:*:*:*:*:*:*:*",
|
||||
@ -953,11 +713,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "182203D1-EA05-47BB-8682-9B4506DE97A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A24B2332-9F18-411F-9FB3-EBA2D2CA8F7C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.16:*:*:*:*:*:*:*",
|
||||
@ -998,11 +753,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3658FDC4-FC57-4281-9376-F66B0CC85826"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F5018B2-1036-469C-9D64-C7D539533F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.2:*:*:*:*:*:*:*",
|
||||
@ -1113,11 +863,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1375D7A6-6645-4C0A-A527-11F5714A8B5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.16.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30B2DA09-6065-4E07-B344-C13C630C8BB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.16.1.28:*:*:*:*:*:*:*",
|
||||
@ -1162,6 +907,261 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.17.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08B3EAB4-F902-4B13-AC37-3255FDCB03EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2780DD07-79B8-4096-A435-DB8FD6301E7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F2D8411-7317-4865-ADF9-279648210E0D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E7AA7A9-F4DB-4BC1-9233-F72B66191F40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03D8C893-BA42-4EE5-A790-13614A6B436F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "339ACF13-0E1F-48D6-9939-96B16AE857CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D5D09C9-4559-4FED-B4B7-EAE5935EBCEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "074A5E58-A066-470B-840A-1148A8979DFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEF2C556-48E6-4572-8FD9-4DC8BAD90B90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CDAD792D-70DB-4123-8BCC-B6890A9BCAA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F273C29-0615-45E9-9860-178227E726B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05E59B31-CBCB-46BC-A2CE-98754FC8C36B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6279892E-BB24-428F-95AE-07257400444B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FAC7A642-121A-4A8C-B055-0296EA5D6E10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04CF50BE-1D0A-4182-BF07-3097C1FEC85A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A460A3C-AFAD-41D5-A2A8-4D38D307CDCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "032675B3-83C7-46A5-B13C-D98934E70057"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "689F4FE8-FA45-41AC-965E-132380FD12DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67B36032-DB43-4C4B-97C4-DE47F241EF2A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8208A38E-5B6E-4669-ADAE-E40A4C0E3A6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49FCBAFC-41BE-4650-B7D1-39F8C7688870"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30468FB9-D2B7-4905-AD81-E2D1DA30B916"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CED805E-D656-4582-9578-51AD165C1D76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EAF8B33E-0C95-467D-A865-0A234E69D0CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15354443-5EB7-4712-B2DE-61DB33830759"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "248D6B44-E134-4DEC-A947-636824E3FDFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1FAFCF9-0ABE-483E-9604-329762BB7870"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83DB4278-3126-4765-97C4-6C0A8C78DA78"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FE3538B-F612-4105-BFDE-A4B594482DCF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD9992-6D98-4E03-9599-ECF38A186FBB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FA399CF-12DB-42E0-A66F-14508B52A453"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B5A7608-E737-420E-9B5E-836600DAC701"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C50642A-B123-4503-9EBB-32CDB67E44D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39B646DA-3317-4285-9CB3-1D90B8F54266"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75846B12-CC4D-4277-B12D-2C2D0DF1C706"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44FC4B71-584F-444F-957C-99E045AA4140"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E25FBC5B-3FD8-461A-99DE-4120D62CA914"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.47:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "390781EE-6B38-4C25-9BBC-10D67F858678"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "332C4752-27EA-43ED-A42D-9C0E250C2F15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.66:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD0E70B2-E401-4F27-9033-5061BD8BA3D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.80:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B3FB946-FEC6-42F8-AFC3-40F581F7126B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A774BF55-3B8C-4E0A-BE73-93189E8E1CC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC46F5E6-5385-46A9-997B-ED543B71CE25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E65D4505-C562-41C1-8CFE-1ABE807D83FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D1A5740-7C1A-45D7-8767-5C50E09F2268"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46CE7CFE-6DAB-47D5-87EB-9607BBD41E1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE727035-06CB-4E37-A9D2-96BD54502120"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE8D5D71-5C85-4644-8A84-F073549ADB50"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4723B88-62BA-40E6-AA89-BAC02D6A036F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23C82327-5362-4876-8058-EB51030CD5DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FF1A5FC-73BE-4218-86D9-2E81FA64EABD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13F57A86-6284-4269-823E-B30C57185D14"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-20947",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2022-11-15T21:15:35.590",
|
||||
"lastModified": "2022-11-21T15:39:10.930",
|
||||
"lastModified": "2023-08-15T18:20:10.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -61,7 +61,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,56 +73,6 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D70E1F57-AF04-40D2-B4B7-F9B6931C023E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F0CD7A7-9747-4074-8089-5924A871828C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "623546CA-997C-4B29-A39A-38A1E917FF47"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.1.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02930611-7A74-4973-9314-FE6F3DCD8479"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "750BC96A-3CAD-4281-ACF0-87696E8524DF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20467402-9FBA-4F20-91A9-FA7B0B5E6C80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "95E2D7E0-900D-4C8B-805E-8CC725AF6722"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1A2F498-6451-4A9C-A5F2-5AB912986733"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9DB8A573-98BB-4581-BCC1-3C72EC8B3F3B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07712952-9241-4596-BA4D-6E4EEFF8D558"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.13:*:*:*:*:*:*:*",
|
||||
@ -138,16 +88,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.2.23:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B666B342-9C0A-45AC-B2CE-44F189C7D92A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC9A4FB6-B434-4CB8-B420-961606DEE100"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3406E8C-4682-47E5-A666-8E30153A5B16"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.3.3:*:*:*:*:*:*:*",
|
||||
@ -188,26 +128,11 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.3.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "66CAE892-0FDC-4601-997B-875405BA6D97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C35E4BCD-52A6-437D-829B-89C232D7F63C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0BB94C4E-9346-46A9-AB0D-1C06574B72C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6013942C-EC86-4455-A985-33C6E0A3ED8B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1958CE6B-8B4A-41ED-B228-CFCA9A2C793E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.8:*:*:*:*:*:*:*",
|
||||
@ -233,16 +158,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A32D2E99-65CC-4BD6-AA4B-98B734664303"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0128E17F-84FA-454B-B4BF-D2A6B6A32619"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52EB5452-1642-4ECF-8EB0-5C7086B17C5C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.22:*:*:*:*:*:*:*",
|
||||
@ -258,11 +173,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B1254921-947C-4549-9D69-1513FA45152D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F6B0078-1634-413E-9EBF-9FA72E9CDFA5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.29:*:*:*:*:*:*:*",
|
||||
@ -303,16 +213,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.6.4.45:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "45000609-AC75-47F5-A850-7773E210D1CD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70F1EAD5-2EC4-4E13-B4DC-762A66F474F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67B01A5D-75BA-4449-B172-82A72C588B80"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1.4:*:*:*:*:*:*:*",
|
||||
@ -333,16 +233,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F45B06C-735F-4931-9E01-66FA151054F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DFD9929-92DA-4022-B8AF-DC2313FE2DC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.7.1.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D8385FDE-E6A2-4495-84A3-E4C45EC81340"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.1:*:*:*:*:*:*:*",
|
||||
@ -358,11 +248,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39E87945-C837-43F9-A623-966B51DEE412"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "823E1E1A-97EA-43BE-9A17-00560C8A8C9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.8:*:*:*:*:*:*:*",
|
||||
@ -383,16 +268,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DEFC69B0-90C0-4F16-A0D9-F1BE545BC31F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2818249A-E55D-4341-AB9D-CB650096E318"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9032AB1C-B84D-446D-93DD-6EAF585842E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.26:*:*:*:*:*:*:*",
|
||||
@ -438,36 +313,16 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD8716C2-FCDE-445D-9A15-4955DD63D198"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "844185D4-7E2E-4407-8201-93C6918AAAF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20913177-C7B4-402C-A7A8-2E7E45D3CA65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97CF48F5-B594-410D-A098-A96287653E38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A178961D-1EDB-4672-96A4-497FE5AB7F77"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "784768E5-6CCC-4477-B9D6-AD75EFA8A6F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9500C9B-EF4B-436A-AA81-B62FECE42232"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.3:*:*:*:*:*:*:*",
|
||||
@ -518,16 +373,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02D0493-5B73-4348-A338-EDE89244310F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0E71C8E5-E578-4294-9E71-3005E3A2C55E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43DFEA3F-C62F-4921-964F-C8EA1797C2AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.32:*:*:*:*:*:*:*",
|
||||
@ -568,26 +413,11 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.43:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3BEEDF63-D161-41BB-9AC4-E6810E167D54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D65349B0-E01A-4AF1-8DD0-B7A92BC87C90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A09357F-139B-4909-BE14-770074B4AB3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8BB1082-C525-4AEC-88BB-260FA7B94CEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA4F9600-7D26-48A3-985F-BA08BC1A03E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.5:*:*:*:*:*:*:*",
|
||||
@ -628,31 +458,11 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78169F85-AE1E-4D85-A8C6-DD415B073514"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "697EB5F2-2737-4926-8B1E-9C99A1795FD4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6751FD41-6670-41B0-8EF1-CEE0336CF975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0233D3A0-A056-4AAE-BBDB-EC6EDC6E1ACF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.47:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D8114FE-512C-4F49-BBF2-66BFD997C866"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4BDF6A5-B0A1-491E-AC5C-36D4F43AF6F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.52:*:*:*:*:*:*:*",
|
||||
@ -673,11 +483,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.61:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F7555FD-B521-4DB9-9638-9952AE3D0814"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.66:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9AA8E18-365D-421A-A370-6BF3E00ACB5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.67:*:*:*:*:*:*:*",
|
||||
@ -688,11 +493,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.74:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "197D15B5-4694-4608-B651-18917E8BDC5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.80:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DAE1C783-7B7B-4627-8F24-C00CAD201482"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.83:*:*:*:*:*:*:*",
|
||||
@ -708,16 +508,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4457D41B-339A-4FAD-BCFF-5ABCEC072315"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3440DEEA-1CDC-4723-8BB1-C99FB7F8DE7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "337193C1-741E-4618-AAA2-7098988F6A56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.10:*:*:*:*:*:*:*",
|
||||
@ -728,11 +518,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FB80B89-40D4-474D-9F96-2B29253AC4BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54477B7D-FAF1-4338-81CB-B4C43A3F2E16"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.22:*:*:*:*:*:*:*",
|
||||
@ -743,11 +528,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1ABF0FE1-B115-4AAC-A73F-2FB4A1C7C618"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40B2468F-17AB-4135-B488-CCF34FFD0616"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.32:*:*:*:*:*:*:*",
|
||||
@ -768,11 +548,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E840D341-1D05-4D3A-B722-BDF8AEB92776"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "368A7088-134C-4D47-BDF1-8A1F9AF7EF8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.1:*:*:*:*:*:*:*",
|
||||
@ -788,11 +563,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E259EBE0-ABE4-45A7-92F3-D7D517DB5634"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94B55C22-4065-477C-AF6F-44AC8A55EC8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.1:*:*:*:*:*:*:*",
|
||||
@ -803,11 +573,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "479CA237-B51A-4BBC-8BE1-F51123313C4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F1E96DA-F1B6-43C9-BECD-FC0144BB159B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.9:*:*:*:*:*:*:*",
|
||||
@ -848,11 +613,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A266EBC6-EEB0-4B0D-BDE5-08887F3D2F0A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3CBC316-0395-44CD-9ED0-5916173BFEF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.4.7:*:*:*:*:*:*:*",
|
||||
@ -933,11 +693,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "182203D1-EA05-47BB-8682-9B4506DE97A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A24B2332-9F18-411F-9FB3-EBA2D2CA8F7C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.16:*:*:*:*:*:*:*",
|
||||
@ -978,11 +733,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3658FDC4-FC57-4281-9376-F66B0CC85826"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F5018B2-1036-469C-9D64-C7D539533F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.2:*:*:*:*:*:*:*",
|
||||
@ -1073,11 +823,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DD29815E-8B50-44E2-96AB-58D353700D72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.16.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30B2DA09-6065-4E07-B344-C13C630C8BB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.16.1.28:*:*:*:*:*:*:*",
|
||||
@ -1107,6 +852,261 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.17.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4F7F85C-1377-4715-A6EC-673359E05A1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2780DD07-79B8-4096-A435-DB8FD6301E7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F2D8411-7317-4865-ADF9-279648210E0D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E7AA7A9-F4DB-4BC1-9233-F72B66191F40"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.1.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03D8C893-BA42-4EE5-A790-13614A6B436F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "339ACF13-0E1F-48D6-9939-96B16AE857CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D5D09C9-4559-4FED-B4B7-EAE5935EBCEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "074A5E58-A066-470B-840A-1148A8979DFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FEF2C556-48E6-4572-8FD9-4DC8BAD90B90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CDAD792D-70DB-4123-8BCC-B6890A9BCAA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9F273C29-0615-45E9-9860-178227E726B5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "05E59B31-CBCB-46BC-A2CE-98754FC8C36B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6279892E-BB24-428F-95AE-07257400444B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FAC7A642-121A-4A8C-B055-0296EA5D6E10"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04CF50BE-1D0A-4182-BF07-3097C1FEC85A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A460A3C-AFAD-41D5-A2A8-4D38D307CDCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "032675B3-83C7-46A5-B13C-D98934E70057"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "689F4FE8-FA45-41AC-965E-132380FD12DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.4.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67B36032-DB43-4C4B-97C4-DE47F241EF2A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8208A38E-5B6E-4669-ADAE-E40A4C0E3A6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49FCBAFC-41BE-4650-B7D1-39F8C7688870"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30468FB9-D2B7-4905-AD81-E2D1DA30B916"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.7.1.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CED805E-D656-4582-9578-51AD165C1D76"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EAF8B33E-0C95-467D-A865-0A234E69D0CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15354443-5EB7-4712-B2DE-61DB33830759"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "248D6B44-E134-4DEC-A947-636824E3FDFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1FAFCF9-0ABE-483E-9604-329762BB7870"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83DB4278-3126-4765-97C4-6C0A8C78DA78"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FE3538B-F612-4105-BFDE-A4B594482DCF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD9992-6D98-4E03-9599-ECF38A186FBB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FA399CF-12DB-42E0-A66F-14508B52A453"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B5A7608-E737-420E-9B5E-836600DAC701"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C50642A-B123-4503-9EBB-32CDB67E44D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39B646DA-3317-4285-9CB3-1D90B8F54266"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75846B12-CC4D-4277-B12D-2C2D0DF1C706"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44FC4B71-584F-444F-957C-99E045AA4140"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E25FBC5B-3FD8-461A-99DE-4120D62CA914"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.47:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "390781EE-6B38-4C25-9BBC-10D67F858678"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "332C4752-27EA-43ED-A42D-9C0E250C2F15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.66:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD0E70B2-E401-4F27-9033-5061BD8BA3D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.80:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B3FB946-FEC6-42F8-AFC3-40F581F7126B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A774BF55-3B8C-4E0A-BE73-93189E8E1CC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC46F5E6-5385-46A9-997B-ED543B71CE25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E65D4505-C562-41C1-8CFE-1ABE807D83FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D1A5740-7C1A-45D7-8767-5C50E09F2268"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46CE7CFE-6DAB-47D5-87EB-9607BBD41E1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE727035-06CB-4E37-A9D2-96BD54502120"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE8D5D71-5C85-4644-8A84-F073549ADB50"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4723B88-62BA-40E6-AA89-BAC02D6A036F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23C82327-5362-4876-8058-EB51030CD5DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FF1A5FC-73BE-4218-86D9-2E81FA64EABD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13F57A86-6284-4269-823E-B30C57185D14"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-27861",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-08-10T10:15:09.603",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:20:32.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/arscode-ninja-popups/wordpress-ninja-popups-plugin-4-7-5-unauth-open-redirect-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:arscode:ninja_popups:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.7.5",
|
||||
"matchCriteriaId": "EBCCA00A-1BCA-47D8-85D8-DF1B2DBDE1B3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/arscode-ninja-popups/wordpress-ninja-popups-plugin-4-7-5-unauth-open-redirect-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-39062",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-08-08T10:15:12.657",
|
||||
"lastModified": "2023-08-08T12:51:11.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:39:15.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-975961.pdf",
|
||||
"source": "productcert@siemens.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sicam_toolbox_ii:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "07.10",
|
||||
"matchCriteriaId": "B47D53C9-EEED-4AF2-BC20-826E0853CF36"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-975961.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20081",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2023-03-23T17:15:14.873",
|
||||
"lastModified": "2023-05-22T18:57:24.750",
|
||||
"lastModified": "2023-08-15T18:20:10.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -101,11 +101,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39E87945-C837-43F9-A623-966B51DEE412"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "823E1E1A-97EA-43BE-9A17-00560C8A8C9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.8:*:*:*:*:*:*:*",
|
||||
@ -126,16 +121,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DEFC69B0-90C0-4F16-A0D9-F1BE545BC31F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2818249A-E55D-4341-AB9D-CB650096E318"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9032AB1C-B84D-446D-93DD-6EAF585842E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.2.26:*:*:*:*:*:*:*",
|
||||
@ -186,36 +171,16 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BD8716C2-FCDE-445D-9A15-4955DD63D198"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "844185D4-7E2E-4407-8201-93C6918AAAF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20913177-C7B4-402C-A7A8-2E7E45D3CA65"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "97CF48F5-B594-410D-A098-A96287653E38"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A178961D-1EDB-4672-96A4-497FE5AB7F77"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.3.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "784768E5-6CCC-4477-B9D6-AD75EFA8A6F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9500C9B-EF4B-436A-AA81-B62FECE42232"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.3:*:*:*:*:*:*:*",
|
||||
@ -266,16 +231,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.25:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02D0493-5B73-4348-A338-EDE89244310F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0E71C8E5-E578-4294-9E71-3005E3A2C55E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43DFEA3F-C62F-4921-964F-C8EA1797C2AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.32:*:*:*:*:*:*:*",
|
||||
@ -326,26 +281,11 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.8.4.45:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B4D7A82-21E8-4113-B8D1-63224CD0EFFE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D65349B0-E01A-4AF1-8DD0-B7A92BC87C90"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0A09357F-139B-4909-BE14-770074B4AB3F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8BB1082-C525-4AEC-88BB-260FA7B94CEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA4F9600-7D26-48A3-985F-BA08BC1A03E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.1.5:*:*:*:*:*:*:*",
|
||||
@ -386,31 +326,11 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78169F85-AE1E-4D85-A8C6-DD415B073514"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "697EB5F2-2737-4926-8B1E-9C99A1795FD4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6751FD41-6670-41B0-8EF1-CEE0336CF975"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.40:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0233D3A0-A056-4AAE-BBDB-EC6EDC6E1ACF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.47:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D8114FE-512C-4F49-BBF2-66BFD997C866"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4BDF6A5-B0A1-491E-AC5C-36D4F43AF6F8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.52:*:*:*:*:*:*:*",
|
||||
@ -431,11 +351,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.61:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F7555FD-B521-4DB9-9638-9952AE3D0814"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.66:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9AA8E18-365D-421A-A370-6BF3E00ACB5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.67:*:*:*:*:*:*:*",
|
||||
@ -446,11 +361,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.74:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "197D15B5-4694-4608-B651-18917E8BDC5F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.80:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DAE1C783-7B7B-4627-8F24-C00CAD201482"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.9.2.83:*:*:*:*:*:*:*",
|
||||
@ -471,16 +381,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4457D41B-339A-4FAD-BCFF-5ABCEC072315"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3440DEEA-1CDC-4723-8BB1-C99FB7F8DE7D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "337193C1-741E-4618-AAA2-7098988F6A56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.10:*:*:*:*:*:*:*",
|
||||
@ -491,11 +391,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6FB80B89-40D4-474D-9F96-2B29253AC4BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "54477B7D-FAF1-4338-81CB-B4C43A3F2E16"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.22:*:*:*:*:*:*:*",
|
||||
@ -506,11 +401,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.27:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1ABF0FE1-B115-4AAC-A73F-2FB4A1C7C618"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40B2468F-17AB-4135-B488-CCF34FFD0616"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.32:*:*:*:*:*:*:*",
|
||||
@ -531,11 +421,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.42:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E840D341-1D05-4D3A-B722-BDF8AEB92776"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.10.1.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "368A7088-134C-4D47-BDF1-8A1F9AF7EF8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.1:*:*:*:*:*:*:*",
|
||||
@ -551,11 +436,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.1.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E259EBE0-ABE4-45A7-92F3-D7D517DB5634"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "94B55C22-4065-477C-AF6F-44AC8A55EC8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.1:*:*:*:*:*:*:*",
|
||||
@ -566,11 +446,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "479CA237-B51A-4BBC-8BE1-F51123313C4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F1E96DA-F1B6-43C9-BECD-FC0144BB159B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.2.9:*:*:*:*:*:*:*",
|
||||
@ -611,11 +486,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A266EBC6-EEB0-4B0D-BDE5-08887F3D2F0A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3CBC316-0395-44CD-9ED0-5916173BFEF7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.12.4.7:*:*:*:*:*:*:*",
|
||||
@ -696,11 +566,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "182203D1-EA05-47BB-8682-9B4506DE97A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A24B2332-9F18-411F-9FB3-EBA2D2CA8F7C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.13.1.16:*:*:*:*:*:*:*",
|
||||
@ -741,11 +606,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3658FDC4-FC57-4281-9376-F66B0CC85826"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F5018B2-1036-469C-9D64-C7D539533F0B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.14.2:*:*:*:*:*:*:*",
|
||||
@ -846,11 +706,6 @@
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.15.1.21:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1375D7A6-6645-4C0A-A527-11F5714A8B5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.16.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30B2DA09-6065-4E07-B344-C13C630C8BB4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.16.1.28:*:*:*:*:*:*:*",
|
||||
@ -880,6 +735,151 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cisco:adaptive_security_appliance:9.17.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C4F7F85C-1377-4715-A6EC-673359E05A1D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EAF8B33E-0C95-467D-A865-0A234E69D0CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.20:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "15354443-5EB7-4712-B2DE-61DB33830759"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "248D6B44-E134-4DEC-A947-636824E3FDFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1FAFCF9-0ABE-483E-9604-329762BB7870"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "83DB4278-3126-4765-97C4-6C0A8C78DA78"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FE3538B-F612-4105-BFDE-A4B594482DCF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "26DD9992-6D98-4E03-9599-ECF38A186FBB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FA399CF-12DB-42E0-A66F-14508B52A453"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B5A7608-E737-420E-9B5E-836600DAC701"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3C50642A-B123-4503-9EBB-32CDB67E44D8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "39B646DA-3317-4285-9CB3-1D90B8F54266"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.1.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75846B12-CC4D-4277-B12D-2C2D0DF1C706"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.32:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44FC4B71-584F-444F-957C-99E045AA4140"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.36:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E25FBC5B-3FD8-461A-99DE-4120D62CA914"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.47:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "390781EE-6B38-4C25-9BBC-10D67F858678"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.50:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "332C4752-27EA-43ED-A42D-9C0E250C2F15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.66:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD0E70B2-E401-4F27-9033-5061BD8BA3D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.9.2.80:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B3FB946-FEC6-42F8-AFC3-40F581F7126B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A774BF55-3B8C-4E0A-BE73-93189E8E1CC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC46F5E6-5385-46A9-997B-ED543B71CE25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.17:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E65D4505-C562-41C1-8CFE-1ABE807D83FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D1A5740-7C1A-45D7-8767-5C50E09F2268"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.10.1.44:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46CE7CFE-6DAB-47D5-87EB-9607BBD41E1F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE727035-06CB-4E37-A9D2-96BD54502120"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE8D5D71-5C85-4644-8A84-F073549ADB50"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4723B88-62BA-40E6-AA89-BAC02D6A036F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.13.1.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "23C82327-5362-4876-8058-EB51030CD5DD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FF1A5FC-73BE-4218-86D9-2E81FA64EABD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13F57A86-6284-4269-823E-B30C57185D14"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22955",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-11T20:15:14.607",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"lastModified": "2023-08-15T19:15:09.983",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,6 +12,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Aug/17",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://syss.de",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22956",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-11T20:15:14.703",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"lastModified": "2023-08-15T19:15:10.233",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,6 +12,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Aug/16",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://syss.de",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22957",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-11T20:15:14.787",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"lastModified": "2023-08-15T19:15:10.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,6 +12,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Aug/15",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://syss.de",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23346",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2023-08-09T19:15:14.500",
|
||||
"lastModified": "2023-08-09T20:12:10.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:58:44.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
@ -34,10 +54,57 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106670",
|
||||
"source": "psirt@hcl.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:dryice_mycloud:10.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "17645F0D-B724-4511-9755-8FA5EF415AE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:dryice_mycloud:10.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56D1CC82-7BA1-42FA-B609-7F3032700581"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:dryice_mycloud:10.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4093FF10-1038-4F93-B28E-77CA62D3AA61"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:dryice_mycloud:10.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4A0C7C49-B89E-4869-A4B8-6C0A85B7D329"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106670",
|
||||
"source": "psirt@hcl.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-23xx/CVE-2023-2312.json
Normal file
24
CVE-2023/CVE-2023-23xx/CVE-2023-2312.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2312",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:10.017",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1448548",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26309",
|
||||
"sourceIdentifier": "security@oppo.com",
|
||||
"published": "2023-08-10T09:15:09.623",
|
||||
"lastModified": "2023-08-11T10:15:09.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:13:03.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@oppo.com",
|
||||
"type": "Secondary",
|
||||
@ -34,10 +54,42 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1689464826201645056",
|
||||
"source": "security@oppo.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oneplus:store:3.3.0:*:*:*:*:android:*:*",
|
||||
"matchCriteriaId": "087B159A-B943-48D3-8D16-63A8FB91D929"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1689464826201645056",
|
||||
"source": "security@oppo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26311",
|
||||
"sourceIdentifier": "security@oppo.com",
|
||||
"published": "2023-08-10T11:15:12.140",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:59:47.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@oppo.com",
|
||||
"type": "Secondary",
|
||||
@ -34,10 +54,42 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1689584995217448960",
|
||||
"source": "security@oppo.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oppo:oppo_store:1.5.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8586F723-1B85-4CC4-992F-B4E28309B6D6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1689584995217448960",
|
||||
"source": "security@oppo.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30481",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-08-10T12:15:10.563",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:46:50.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/agp-font-awesome-collection/wordpress-agp-font-awesome-collection-plugin-3-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:profosbox:agp_font_awesome_collection:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.2.4",
|
||||
"matchCriteriaId": "070BC037-FA26-4382-839A-0A207820357E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/agp-font-awesome-collection/wordpress-agp-font-awesome-collection-plugin-3-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30654",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:10.487",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:44:18.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,355 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30689",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:11.547",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:41:33.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,355 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30691",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:11.630",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:40:31.923",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,355 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30693",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:11.730",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:37:11.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,355 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30694",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:11.817",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:29:20.070",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,355 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30696",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:12.000",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:26:14.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,405 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30697",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:12.077",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:20:53.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,405 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30698",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:12.173",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:19:51.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,80 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30699",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:12.267",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:14:51.793",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,405 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DA3806E2-A780-4BB5-B4DC-D015D841E4C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8D2D0083-0A85-47F7-A42D-2040A3BEC132"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0332BF16-0F1F-4733-ABCE-A1EA1366A5D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7120696-2440-44EC-B3A4-6FCBB4A60A12"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3658A42-BCA9-4188-8B36-3C6599BBF83C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0E55E09-C2C9-43D1-8A1A-6D02F544E34A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "693D72EF-1531-4C15-B105-2DEBE02D30F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C26195A5-31BE-4116-8F31-9F25BE57AB52"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C6114C5-C175-45E7-821E-6BA218F923DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "58BA232B-8D39-473A-91D0-D3AC03FDE8FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62105EDB-0A60-4153-9F3F-7635CC8756FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "25B42CE0-67DE-4611-8D70-DEEC975E32BA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2EADA0-5976-4711-A7A5-61594F3E2FEB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B59145B-5506-477C-8F9C-ABB0CE2CF631"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC082E25-1B7D-473D-A066-1463E6321CD5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "655BEA94-9A83-4A56-8DDE-79ADC821C707"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B894D0C1-E66E-44B0-8FCA-2EE4290C4173"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B088DE9-31F1-4737-8BC8-CC406F208ACB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "899F6BD2-47AF-4ADA-935D-90AB069E9BA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "60281652-A1DF-4EA4-8CD3-6DCA43F6162F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2592B14-B3B7-4C85-88E8-5E12F6F50ED3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40A783AA-91E7-426B-8A78-4EBE5D69A602"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F46F8F7-0EBA-4D2F-AC53-4BB5956D7B87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA51F5D5-D18D-426C-B09F-EE12CE11E9FB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53968A3C-6E71-42B8-8671-6730D8C85603"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFB0F9B9-C60D-40CC-AC7D-FDB288EB2264"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C946853-D56D-457C-A1CB-AD1A5BD56C41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B35EB1D3-2F29-4A5C-AC9A-6ED72A2E22D2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DD6CFD3-5341-4069-B4FC-A5E07F13A63F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BD8E899-427B-47D2-9168-446B0249868F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E923AF0F-34BA-40FE-AA20-B01366263B97"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "16A17CC3-7BA2-497C-835B-907B629A1B05"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78B14D1F-C536-4816-A076-B074E41EB0A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF2D00F4-B521-4D8F-84F8-DCE45B6349A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "644444DC-1247-45FC-A2B9-223D9ED55AB2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "548BCC15-C6D8-4AE7-B167-4DD74382097B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2B6E53-CC07-4590-ADFA-CEF7DB0F4EB7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BF31CC5-E850-4B7E-BA43-6B1ED560DD45"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30703",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:12.650",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:09:42.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:samsung:members:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.0.07.1",
|
||||
"matchCriteriaId": "044ADE70-4832-46D5-A68F-6EBD280B34DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30704",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:12.737",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:49:33.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:samsung:internet:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "22.0.0.35",
|
||||
"matchCriteriaId": "17160356-8284-4095-A102-14B262264C9A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30705",
|
||||
"sourceIdentifier": "mobile.security@samsung.com",
|
||||
"published": "2023-08-10T02:15:12.827",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:51:41.220",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "mobile.security@samsung.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.5.56.6",
|
||||
"matchCriteriaId": "0A29713B-C927-4431-9887-851B811A9C86"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=08",
|
||||
"source": "mobile.security@samsung.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32565",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2023-08-10T20:15:10.577",
|
||||
"lastModified": "2023-08-11T03:44:51.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:58:02.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
@ -34,10 +56,43 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US",
|
||||
"source": "support@hackerone.com"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.4.1",
|
||||
"matchCriteriaId": "E1BB2A71-2815-4982-825E-3546E2A7FE83"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US",
|
||||
"source": "support@hackerone.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,87 @@
|
||||
"id": "CVE-2023-32783",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-07T17:15:11.080",
|
||||
"lastModified": "2023-08-07T18:20:15.283",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:04:29.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The event analysis component in Zoho ManageEngine ADAudit Plus 7.1.1 allows an attacker to bypass audit detection by creating or renaming user accounts with a \"$\" symbol suffix."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://www.peteslade.com/post/manageengine-adauditplus-cve-2023-32783",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zohocorp:manageengine_adaudit_plus:7.1.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8224AF5-B334-48E5-81AD-324A1C64E804"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.peteslade.com/post/manageengine-adauditplus-cve-2023-32783",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3632",
|
||||
"sourceIdentifier": "cve@usom.gov.tr",
|
||||
"published": "2023-08-09T09:15:14.297",
|
||||
"lastModified": "2023-08-09T12:46:39.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T18:56:10.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -13,8 +13,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@usom.gov.tr",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve@usom.gov.tr",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-23-0446",
|
||||
"source": "cve@usom.gov.tr"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:kunduz:kunduz:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.2.3",
|
||||
"matchCriteriaId": "BBF42D5D-B42C-41C3-8E69-F0015A91F80C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-23-0446",
|
||||
"source": "cve@usom.gov.tr",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,75 @@
|
||||
"id": "CVE-2023-37068",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-09T20:15:10.497",
|
||||
"lastModified": "2023-08-10T01:51:18.907",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:30:45.440",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Code-Projects Gym Management System V1.0 allows remote attackers to execute arbitrary SQL commands via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username and password fields, enabling SQL Injection attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://github.com/Mr-Secure-Code/My-CVE/blob/main/CVE-2023-37068-Exploit.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sherlock:gym_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DBC0537E-FB5D-487F-8F36-B328100E2D85"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Mr-Secure-Code/My-CVE/blob/main/CVE-2023-37068-Exploit.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,27 +2,91 @@
|
||||
"id": "CVE-2023-37625",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-10T20:15:10.660",
|
||||
"lastModified": "2023-08-11T03:44:51.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:53:36.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored cross-site scripting (XSS) vulnerability in Netbox v3.4.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Custom Link templates."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://github.com/benjaminpsinclair/Netbox-CVE",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/benjaminpsinclair/Netbox-CVE-2023-37625",
|
||||
"source": "cve@mitre.org"
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://github.com/netbox-community/netbox/issues/12205",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netbox_project:netbox:3.4.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "46C71FA3-90B4-460E-A2E7-1BEDD0A10A1C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/benjaminpsinclair/Netbox-CVE",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/benjaminpsinclair/Netbox-CVE-2023-37625",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/netbox-community/netbox/issues/12205",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,105 @@
|
||||
"id": "CVE-2023-38333",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-10T21:15:10.307",
|
||||
"lastModified": "2023-08-11T03:44:51.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:57:13.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Zoho ManageEngine Applications Manager through 16530 allows reflected XSS while logged in."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2023-38333.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.5",
|
||||
"matchCriteriaId": "1CE31108-0BCF-439A-A0A4-6A5E3D317A58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:16.5:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9E7A5CB9-A7B8-4ED0-B7B7-A55C9DEA1031"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:16.5:build16500:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D81950D-33D9-4BBB-A209-13BC2C74C36A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:16.5:build16510:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35F55779-23A6-4C21-8A24-DAD73DFDA728"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:16.5:build16511:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "836A8F78-C994-4CE9-A7E8-5D69975D18E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:16.5:build16520:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08E9CD04-711B-4062-AE20-00BECCB2AC5E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:16.5:build16530:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CCFE6112-8FF3-4E3D-8300-92C54F25B139"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2023-38333.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-384xx/CVE-2023-38401.json
Normal file
43
CVE-2023/CVE-2023-384xx/CVE-2023-38401.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-38401",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-08-15T19:15:10.377",
|
||||
"lastModified": "2023-08-15T19:15:10.377",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the HPE Aruba Networking Virtual Intranet Access (VIA) client could allow local users to elevate\u00a0privileges. Successful exploitation could allow execution of\u00a0arbitrary code with NT AUTHORITY\\SYSTEM privileges on the\u00a0operating system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-011.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-384xx/CVE-2023-38402.json
Normal file
43
CVE-2023/CVE-2023-384xx/CVE-2023-38402.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-38402",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-08-15T19:15:10.490",
|
||||
"lastModified": "2023-08-15T19:15:10.490",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the HPE Aruba Networking Virtual Intranet\u00a0Access (VIA) client could allow malicious users to overwrite\u00a0arbitrary files as NT AUTHORITY\\SYSTEM. A successful\u00a0exploit could allow these malicious users to create a\u00a0Denial-of-Service (DoS) condition affecting the Microsoft\u00a0Windows operating System boot process."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-011.txt",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38641",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-08-08T10:15:16.493",
|
||||
"lastModified": "2023-08-08T12:51:11.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:40:17.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "productcert@siemens.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-975961.pdf",
|
||||
"source": "productcert@siemens.com"
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:sicam_toolbox_ii:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "07.10",
|
||||
"matchCriteriaId": "B47D53C9-EEED-4AF2-BC20-826E0853CF36"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-975961.pdf",
|
||||
"source": "productcert@siemens.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-388xx/CVE-2023-38861.json
Normal file
20
CVE-2023/CVE-2023-388xx/CVE-2023-38861.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38861",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-15T19:15:10.560",
|
||||
"lastModified": "2023-08-15T19:15:10.560",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Wavlink WL_WNJ575A3 v.R75A3_V1410_220513 allows a remote attacker to execute arbitrary code via username parameter of the set_sys_adm function in adm.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK/WL-WN575A3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-388xx/CVE-2023-38862.json
Normal file
20
CVE-2023/CVE-2023-388xx/CVE-2023-38862.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38862",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-15T19:15:10.613",
|
||||
"lastModified": "2023-08-15T19:15:10.613",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in COMFAST CF-XR11 v.2.7.2 allows an attacker to execute arbitrary code via the destination parameter of sub_431F64 function in bin/webmgnt."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-388xx/CVE-2023-38863.json
Normal file
20
CVE-2023/CVE-2023-388xx/CVE-2023-38863.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38863",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-15T19:15:10.673",
|
||||
"lastModified": "2023-08-15T19:15:10.673",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in COMFAST CF-XR11 v.2.7.2 allows an attacker to execute arbitrary code via the ifname and mac parameters in the sub_410074 function at bin/webmgnt."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject4",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-388xx/CVE-2023-38865.json
Normal file
20
CVE-2023/CVE-2023-388xx/CVE-2023-38865.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-38865",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-15T19:15:10.727",
|
||||
"lastModified": "2023-08-15T19:15:10.727",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "COMFAST CF-XR11 V2.7.2 has a command injection vulnerability detected at function sub_4143F0. Attackers can send POST request messages to /usr/bin/webmgnt and inject commands into parameter timestr."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject5",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3894",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2023-08-08T18:15:24.297",
|
||||
"lastModified": "2023-08-08T18:32:54.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:28:31.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cve-coordination@google.com",
|
||||
"type": "Secondary",
|
||||
@ -46,18 +76,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50083",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://github.com/FasterXML/jackson-dataformats-text/blob/2.16/release-notes/VERSION-2.x",
|
||||
"source": "cve-coordination@google.com"
|
||||
},
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"url": "https://github.com/FasterXML/jackson-dataformats-text/pull/398",
|
||||
"source": "cve-coordination@google.com"
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fasterxml:jackson-dataformats-text:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.15.0",
|
||||
"matchCriteriaId": "8EA5DD6F-240A-4691-B691-1D38B8B4165A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50083",
|
||||
"source": "cve-coordination@google.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FasterXML/jackson-dataformats-text/blob/2.16/release-notes/VERSION-2.x",
|
||||
"source": "cve-coordination@google.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/FasterXML/jackson-dataformats-text/pull/398",
|
||||
"source": "cve-coordination@google.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,27 +2,88 @@
|
||||
"id": "CVE-2023-39805",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-10T20:15:10.733",
|
||||
"lastModified": "2023-08-11T03:44:51.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:44:14.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "iCMS v7.0.16 was discovered to contain a SQL injection vulnerability via the where parameter at admincp.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "http://icms.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
{
|
||||
"url": "http://icmsdev.com",
|
||||
"source": "cve@mitre.org"
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gist.github.com/ChubbyZ/3ad434bd5fc2ab1242dd32500384cfb5",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:idreamsoft:icms:7.0.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADF5334A-FE6D-45F3-801F-DF6CC9FC92F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://icms.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://icmsdev.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/ChubbyZ/3ad434bd5fc2ab1242dd32500384cfb5",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,27 +2,88 @@
|
||||
"id": "CVE-2023-39806",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-10T20:15:10.793",
|
||||
"lastModified": "2023-08-11T03:44:51.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:44:26.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "iCMS v7.0.16 was discovered to contain a SQL injection vulnerability via the bakupdata function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"url": "http://icms.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
{
|
||||
"url": "http://icmsdev.com",
|
||||
"source": "cve@mitre.org"
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"url": "https://gist.github.com/ChubbyZ/27fa6f43699c9964ddfa701614fc4d5e",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:idreamsoft:icms:7.0.16:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADF5334A-FE6D-45F3-801F-DF6CC9FC92F0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://icms.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://icmsdev.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/ChubbyZ/27fa6f43699c9964ddfa701614fc4d5e",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-400xx/CVE-2023-40027.json
Normal file
63
CVE-2023/CVE-2023-400xx/CVE-2023-40027.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-40027",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-15T18:15:10.297",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Keystone is an open source headless CMS for Node.js \u2014 built with GraphQL and React. When `ui.isAccessAllowed` is set as `undefined`, the `adminMeta` GraphQL query is publicly accessible (no session required). This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible (no session required) if a `session` strategy is not defined. This vulnerability does not affect developers using the `@keystone-6/auth` package, or any users that have written their own `ui.isAccessAllowed` (that is to say, `isAccessAllowed` is not `undefined`). This vulnerability does affect users who believed that their `session` strategy will, by default, enforce that `adminMeta` is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware. This vulnerability has been patched in `@keystone-6/core` version `5.5.1`. Users are advised to upgrade. Users unable to upgrade may opt to write their own `isAccessAllowed` functionality to work-around this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/keystonejs/keystone/commit/650e27e6e9b42abfb94c340c8470faf61f0ff284",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/keystonejs/keystone/pull/8771",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/keystonejs/keystone/security/advisories/GHSA-9cvc-v7wm-992c",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-400xx/CVE-2023-40028.json
Normal file
59
CVE-2023/CVE-2023-400xx/CVE-2023-40028.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-40028",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-15T18:15:10.547",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ghost is an open source content management system. Versions prior to 5.59.1 are subject to a vulnerability which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system. Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's `content/` folder. Version 5.59.1 contains a fix for this issue. All users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TryGhost/Ghost/commit/690fbf3f7302ff3f77159c0795928bdd20f41205",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TryGhost/Ghost/security/advisories/GHSA-9c9v-w225-v5rg",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4276",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-08-10T07:15:37.463",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:01:26.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -50,14 +50,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/absolute-privacy/trunk/profile_page.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3855e84-b97e-4729-8a48-55f2a2444e2c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:johnkolbert:absolute_privacy:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.1",
|
||||
"matchCriteriaId": "66EDEB9E-0BF3-493D-B6DD-470A81D061FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/absolute-privacy/trunk/profile_page.php",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3855e84-b97e-4729-8a48-55f2a2444e2c?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4277",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-08-10T07:15:37.797",
|
||||
"lastModified": "2023-08-10T12:43:50.693",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-15T19:09:30.973",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -17,8 +17,28 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
@ -50,14 +70,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
"configurations": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/realia/tags/1.4.0/includes/post-types/class-realia-post-type-user.php#L112",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
"nodes": [
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/06f33e18-0bdd-4c56-a8df-fc1969b9ecf8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pragmaticmates:realia:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.4.0",
|
||||
"matchCriteriaId": "40156890-FF5A-4119-8B7A-1E2279EBB834"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/realia/tags/1.4.0/includes/post-types/class-realia-post-type-user.php#L112",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/06f33e18-0bdd-4c56-a8df-fc1969b9ecf8?source=cve",
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4323.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4323.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4323",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:10.790",
|
||||
"lastModified": "2023-08-15T19:15:10.790",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4324.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4324.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4324",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:10.847",
|
||||
"lastModified": "2023-08-15T19:15:10.847",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4325.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4325.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4325",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:10.900",
|
||||
"lastModified": "2023-08-15T19:15:10.900",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4326.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4326.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4326",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:10.957",
|
||||
"lastModified": "2023-08-15T19:15:10.957",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4327.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4327.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4327",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.010",
|
||||
"lastModified": "2023-08-15T19:15:11.010",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Linux"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4328.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4328.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4328",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.060",
|
||||
"lastModified": "2023-08-15T19:15:11.060",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Linux"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4329.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4329.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4329",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.117",
|
||||
"lastModified": "2023-08-15T19:15:11.117",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4330.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4330.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4330",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.177",
|
||||
"lastModified": "2023-08-15T19:15:11.177",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable Denial of Service can be caused by an authenticated user to the REST API Interface"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4331.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4331.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4331",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.230",
|
||||
"lastModified": "2023-08-15T19:15:11.230",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4332.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4332.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4332",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.290",
|
||||
"lastModified": "2023-08-15T19:15:11.290",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4333.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4333.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4333",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.347",
|
||||
"lastModified": "2023-08-15T19:15:11.347",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Windows"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4334.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4334.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4334",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.397",
|
||||
"lastModified": "2023-08-15T19:15:11.397",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller Web server (nginx) is serving private files without any authentication"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4335.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4335.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4335",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.450",
|
||||
"lastModified": "2023-08-15T19:15:11.450",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4336.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4336.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4336",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.503",
|
||||
"lastModified": "2023-08-15T19:15:11.503",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4337.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4337.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4337",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.560",
|
||||
"lastModified": "2023-08-15T19:15:11.560",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4338.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4338.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4338",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.613",
|
||||
"lastModified": "2023-08-15T19:15:11.613",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4339.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4339.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4339",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.663",
|
||||
"lastModified": "2023-08-15T19:15:11.663",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4340.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4340.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4340",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.717",
|
||||
"lastModified": "2023-08-15T19:15:11.717",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4341.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4341.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4341",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.770",
|
||||
"lastModified": "2023-08-15T19:15:11.770",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4342.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4342.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4342",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.823",
|
||||
"lastModified": "2023-08-15T19:15:11.823",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4343.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4343.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4343",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.883",
|
||||
"lastModified": "2023-08-15T19:15:11.883",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4344.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4344.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4344",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T19:15:11.943",
|
||||
"lastModified": "2023-08-15T19:15:11.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-43xx/CVE-2023-4345.json
Normal file
20
CVE-2023/CVE-2023-43xx/CVE-2023-4345.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-4345",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-08-15T18:15:10.757",
|
||||
"lastModified": "2023-08-15T19:15:12.000",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broadcom RAID Controller web interface is vulnerable client-side control bypass leads to unauthorized data access for low privileged user"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.broadcom.com/support/resources/product-security-center",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4349.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4349.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4349",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:10.950",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Device Trust Connectors in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1458303",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4350.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4350.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4350",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.103",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Fullscreen in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1454817",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4351.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4351.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4351",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.260",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Network in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has elicited a browser shutdown to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1465833",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4352.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4352.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4352",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.463",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type confusion in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1452076",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4353.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4353.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4353",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.613",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap buffer overflow in ANGLE in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1458046",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4354.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4354.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4354",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.763",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap buffer overflow in Skia in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1464215",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4355.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4355.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4355",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.923",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1468943",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4356.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4356.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4356",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.090",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Audio in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who has convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1449929",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4357.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4357.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4357",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.247",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1458911",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4358.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4358.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4358",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.397",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1466415",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4359.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4359.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4359",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.637",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 116.0.5845.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1443722",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4360.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4360.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4360",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.863",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Color in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1462723",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4361.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4361.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4361",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.960",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Autofill in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1465230",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4362.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4362.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4362",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.030",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap buffer overflow in Mojom IDL in Google Chrome prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process and gained control of a WebUI process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1316379",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4363.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4363.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4363",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.113",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in WebShare in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker to spoof the contents of a dialog URL via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1367085",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4364.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4364.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4364",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.217",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Permission Prompts in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1406922",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4365.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4365.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4365",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.290",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Fullscreen in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1431043",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4366.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4366.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4366",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.413",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Extensions in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1450784",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4367.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4367.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4367",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.520",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1467743",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4368.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4368.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4368",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.597",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1467751",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-43xx/CVE-2023-4369.json
Normal file
24
CVE-2023/CVE-2023-43xx/CVE-2023-4369.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-4369",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.687",
|
||||
"lastModified": "2023-08-15T18:23:32.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.96 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1464456",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
109
README.md
109
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-08-15T18:00:33.830284+00:00
|
||||
2023-08-15T20:00:34.868319+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-08-15T17:59:37.850000+00:00
|
||||
2023-08-15T19:58:44.960000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,68 +29,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
222702
|
||||
222755
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `24`
|
||||
Recently added CVEs: `53`
|
||||
|
||||
* [CVE-2023-38840](CVE-2023/CVE-2023-388xx/CVE-2023-38840.json) (`2023-08-15T17:15:10.320`)
|
||||
* [CVE-2023-38850](CVE-2023/CVE-2023-388xx/CVE-2023-38850.json) (`2023-08-15T17:15:10.480`)
|
||||
* [CVE-2023-38851](CVE-2023/CVE-2023-388xx/CVE-2023-38851.json) (`2023-08-15T17:15:10.603`)
|
||||
* [CVE-2023-38852](CVE-2023/CVE-2023-388xx/CVE-2023-38852.json) (`2023-08-15T17:15:10.760`)
|
||||
* [CVE-2023-38853](CVE-2023/CVE-2023-388xx/CVE-2023-38853.json) (`2023-08-15T17:15:10.897`)
|
||||
* [CVE-2023-38854](CVE-2023/CVE-2023-388xx/CVE-2023-38854.json) (`2023-08-15T17:15:11.047`)
|
||||
* [CVE-2023-38855](CVE-2023/CVE-2023-388xx/CVE-2023-38855.json) (`2023-08-15T17:15:11.153`)
|
||||
* [CVE-2023-38856](CVE-2023/CVE-2023-388xx/CVE-2023-38856.json) (`2023-08-15T17:15:11.270`)
|
||||
* [CVE-2023-38857](CVE-2023/CVE-2023-388xx/CVE-2023-38857.json) (`2023-08-15T17:15:11.420`)
|
||||
* [CVE-2023-38858](CVE-2023/CVE-2023-388xx/CVE-2023-38858.json) (`2023-08-15T17:15:11.597`)
|
||||
* [CVE-2023-38860](CVE-2023/CVE-2023-388xx/CVE-2023-38860.json) (`2023-08-15T17:15:11.737`)
|
||||
* [CVE-2023-38889](CVE-2023/CVE-2023-388xx/CVE-2023-38889.json) (`2023-08-15T17:15:11.887`)
|
||||
* [CVE-2023-38896](CVE-2023/CVE-2023-388xx/CVE-2023-38896.json) (`2023-08-15T17:15:12.027`)
|
||||
* [CVE-2023-38898](CVE-2023/CVE-2023-388xx/CVE-2023-38898.json) (`2023-08-15T17:15:12.187`)
|
||||
* [CVE-2023-38915](CVE-2023/CVE-2023-389xx/CVE-2023-38915.json) (`2023-08-15T17:15:12.327`)
|
||||
* [CVE-2023-38916](CVE-2023/CVE-2023-389xx/CVE-2023-38916.json) (`2023-08-15T17:15:12.457`)
|
||||
* [CVE-2023-39438](CVE-2023/CVE-2023-394xx/CVE-2023-39438.json) (`2023-08-15T17:15:12.627`)
|
||||
* [CVE-2023-39659](CVE-2023/CVE-2023-396xx/CVE-2023-39659.json) (`2023-08-15T17:15:12.930`)
|
||||
* [CVE-2023-39661](CVE-2023/CVE-2023-396xx/CVE-2023-39661.json) (`2023-08-15T17:15:13.133`)
|
||||
* [CVE-2023-39662](CVE-2023/CVE-2023-396xx/CVE-2023-39662.json) (`2023-08-15T17:15:13.313`)
|
||||
* [CVE-2023-32003](CVE-2023/CVE-2023-320xx/CVE-2023-32003.json) (`2023-08-15T16:15:10.970`)
|
||||
* [CVE-2023-32004](CVE-2023/CVE-2023-320xx/CVE-2023-32004.json) (`2023-08-15T16:15:11.303`)
|
||||
* [CVE-2023-32006](CVE-2023/CVE-2023-320xx/CVE-2023-32006.json) (`2023-08-15T16:15:11.460`)
|
||||
* [CVE-2023-35082](CVE-2023/CVE-2023-350xx/CVE-2023-35082.json) (`2023-08-15T16:15:11.633`)
|
||||
* [CVE-2023-38863](CVE-2023/CVE-2023-388xx/CVE-2023-38863.json) (`2023-08-15T19:15:10.673`)
|
||||
* [CVE-2023-38865](CVE-2023/CVE-2023-388xx/CVE-2023-38865.json) (`2023-08-15T19:15:10.727`)
|
||||
* [CVE-2023-4323](CVE-2023/CVE-2023-43xx/CVE-2023-4323.json) (`2023-08-15T19:15:10.790`)
|
||||
* [CVE-2023-4324](CVE-2023/CVE-2023-43xx/CVE-2023-4324.json) (`2023-08-15T19:15:10.847`)
|
||||
* [CVE-2023-4325](CVE-2023/CVE-2023-43xx/CVE-2023-4325.json) (`2023-08-15T19:15:10.900`)
|
||||
* [CVE-2023-4326](CVE-2023/CVE-2023-43xx/CVE-2023-4326.json) (`2023-08-15T19:15:10.957`)
|
||||
* [CVE-2023-4327](CVE-2023/CVE-2023-43xx/CVE-2023-4327.json) (`2023-08-15T19:15:11.010`)
|
||||
* [CVE-2023-4328](CVE-2023/CVE-2023-43xx/CVE-2023-4328.json) (`2023-08-15T19:15:11.060`)
|
||||
* [CVE-2023-4329](CVE-2023/CVE-2023-43xx/CVE-2023-4329.json) (`2023-08-15T19:15:11.117`)
|
||||
* [CVE-2023-4330](CVE-2023/CVE-2023-43xx/CVE-2023-4330.json) (`2023-08-15T19:15:11.177`)
|
||||
* [CVE-2023-4331](CVE-2023/CVE-2023-43xx/CVE-2023-4331.json) (`2023-08-15T19:15:11.230`)
|
||||
* [CVE-2023-4332](CVE-2023/CVE-2023-43xx/CVE-2023-4332.json) (`2023-08-15T19:15:11.290`)
|
||||
* [CVE-2023-4333](CVE-2023/CVE-2023-43xx/CVE-2023-4333.json) (`2023-08-15T19:15:11.347`)
|
||||
* [CVE-2023-4334](CVE-2023/CVE-2023-43xx/CVE-2023-4334.json) (`2023-08-15T19:15:11.397`)
|
||||
* [CVE-2023-4335](CVE-2023/CVE-2023-43xx/CVE-2023-4335.json) (`2023-08-15T19:15:11.450`)
|
||||
* [CVE-2023-4336](CVE-2023/CVE-2023-43xx/CVE-2023-4336.json) (`2023-08-15T19:15:11.503`)
|
||||
* [CVE-2023-4337](CVE-2023/CVE-2023-43xx/CVE-2023-4337.json) (`2023-08-15T19:15:11.560`)
|
||||
* [CVE-2023-4338](CVE-2023/CVE-2023-43xx/CVE-2023-4338.json) (`2023-08-15T19:15:11.613`)
|
||||
* [CVE-2023-4339](CVE-2023/CVE-2023-43xx/CVE-2023-4339.json) (`2023-08-15T19:15:11.663`)
|
||||
* [CVE-2023-4340](CVE-2023/CVE-2023-43xx/CVE-2023-4340.json) (`2023-08-15T19:15:11.717`)
|
||||
* [CVE-2023-4341](CVE-2023/CVE-2023-43xx/CVE-2023-4341.json) (`2023-08-15T19:15:11.770`)
|
||||
* [CVE-2023-4342](CVE-2023/CVE-2023-43xx/CVE-2023-4342.json) (`2023-08-15T19:15:11.823`)
|
||||
* [CVE-2023-4343](CVE-2023/CVE-2023-43xx/CVE-2023-4343.json) (`2023-08-15T19:15:11.883`)
|
||||
* [CVE-2023-4344](CVE-2023/CVE-2023-43xx/CVE-2023-4344.json) (`2023-08-15T19:15:11.943`)
|
||||
* [CVE-2023-4345](CVE-2023/CVE-2023-43xx/CVE-2023-4345.json) (`2023-08-15T18:15:10.757`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `67`
|
||||
Recently modified CVEs: `43`
|
||||
|
||||
* [CVE-2023-38235](CVE-2023/CVE-2023-382xx/CVE-2023-38235.json) (`2023-08-15T17:30:42.653`)
|
||||
* [CVE-2023-29320](CVE-2023/CVE-2023-293xx/CVE-2023-29320.json) (`2023-08-15T17:32:36.587`)
|
||||
* [CVE-2023-29303](CVE-2023/CVE-2023-293xx/CVE-2023-29303.json) (`2023-08-15T17:33:20.033`)
|
||||
* [CVE-2023-38232](CVE-2023/CVE-2023-382xx/CVE-2023-38232.json) (`2023-08-15T17:33:34.033`)
|
||||
* [CVE-2023-38233](CVE-2023/CVE-2023-382xx/CVE-2023-38233.json) (`2023-08-15T17:33:42.080`)
|
||||
* [CVE-2023-31450](CVE-2023/CVE-2023-314xx/CVE-2023-31450.json) (`2023-08-15T17:35:48.010`)
|
||||
* [CVE-2023-31448](CVE-2023/CVE-2023-314xx/CVE-2023-31448.json) (`2023-08-15T17:35:56.743`)
|
||||
* [CVE-2023-31449](CVE-2023/CVE-2023-314xx/CVE-2023-31449.json) (`2023-08-15T17:36:07.090`)
|
||||
* [CVE-2023-32781](CVE-2023/CVE-2023-327xx/CVE-2023-32781.json) (`2023-08-15T17:36:12.360`)
|
||||
* [CVE-2023-24389](CVE-2023/CVE-2023-243xx/CVE-2023-24389.json) (`2023-08-15T17:36:39.197`)
|
||||
* [CVE-2023-32782](CVE-2023/CVE-2023-327xx/CVE-2023-32782.json) (`2023-08-15T17:37:04.170`)
|
||||
* [CVE-2023-23798](CVE-2023/CVE-2023-237xx/CVE-2023-23798.json) (`2023-08-15T17:45:33.117`)
|
||||
* [CVE-2023-30701](CVE-2023/CVE-2023-307xx/CVE-2023-30701.json) (`2023-08-15T17:47:14.807`)
|
||||
* [CVE-2023-30702](CVE-2023/CVE-2023-307xx/CVE-2023-30702.json) (`2023-08-15T17:48:45.177`)
|
||||
* [CVE-2023-29299](CVE-2023/CVE-2023-292xx/CVE-2023-29299.json) (`2023-08-15T17:49:51.120`)
|
||||
* [CVE-2023-30700](CVE-2023/CVE-2023-307xx/CVE-2023-30700.json) (`2023-08-15T17:50:06.857`)
|
||||
* [CVE-2023-37069](CVE-2023/CVE-2023-370xx/CVE-2023-37069.json) (`2023-08-15T17:50:23.687`)
|
||||
* [CVE-2023-39005](CVE-2023/CVE-2023-390xx/CVE-2023-39005.json) (`2023-08-15T17:52:49.717`)
|
||||
* [CVE-2023-39003](CVE-2023/CVE-2023-390xx/CVE-2023-39003.json) (`2023-08-15T17:54:22.027`)
|
||||
* [CVE-2023-37855](CVE-2023/CVE-2023-378xx/CVE-2023-37855.json) (`2023-08-15T17:54:28.870`)
|
||||
* [CVE-2023-39532](CVE-2023/CVE-2023-395xx/CVE-2023-39532.json) (`2023-08-15T17:55:07.667`)
|
||||
* [CVE-2023-3572](CVE-2023/CVE-2023-35xx/CVE-2023-3572.json) (`2023-08-15T17:55:24.917`)
|
||||
* [CVE-2023-23826](CVE-2023/CVE-2023-238xx/CVE-2023-23826.json) (`2023-08-15T17:56:23.057`)
|
||||
* [CVE-2023-36054](CVE-2023/CVE-2023-360xx/CVE-2023-36054.json) (`2023-08-15T17:57:23.407`)
|
||||
* [CVE-2023-4012](CVE-2023/CVE-2023-40xx/CVE-2023-4012.json) (`2023-08-15T17:59:37.850`)
|
||||
* [CVE-2023-30694](CVE-2023/CVE-2023-306xx/CVE-2023-30694.json) (`2023-08-15T18:29:20.070`)
|
||||
* [CVE-2023-30693](CVE-2023/CVE-2023-306xx/CVE-2023-30693.json) (`2023-08-15T18:37:11.480`)
|
||||
* [CVE-2023-30691](CVE-2023/CVE-2023-306xx/CVE-2023-30691.json) (`2023-08-15T18:40:31.923`)
|
||||
* [CVE-2023-30689](CVE-2023/CVE-2023-306xx/CVE-2023-30689.json) (`2023-08-15T18:41:33.743`)
|
||||
* [CVE-2023-30654](CVE-2023/CVE-2023-306xx/CVE-2023-30654.json) (`2023-08-15T18:44:18.730`)
|
||||
* [CVE-2023-30704](CVE-2023/CVE-2023-307xx/CVE-2023-30704.json) (`2023-08-15T18:49:33.083`)
|
||||
* [CVE-2023-30705](CVE-2023/CVE-2023-307xx/CVE-2023-30705.json) (`2023-08-15T18:51:41.220`)
|
||||
* [CVE-2023-3632](CVE-2023/CVE-2023-36xx/CVE-2023-3632.json) (`2023-08-15T18:56:10.700`)
|
||||
* [CVE-2023-26311](CVE-2023/CVE-2023-263xx/CVE-2023-26311.json) (`2023-08-15T18:59:47.580`)
|
||||
* [CVE-2023-4276](CVE-2023/CVE-2023-42xx/CVE-2023-4276.json) (`2023-08-15T19:01:26.193`)
|
||||
* [CVE-2023-4277](CVE-2023/CVE-2023-42xx/CVE-2023-4277.json) (`2023-08-15T19:09:30.973`)
|
||||
* [CVE-2023-26309](CVE-2023/CVE-2023-263xx/CVE-2023-26309.json) (`2023-08-15T19:13:03.507`)
|
||||
* [CVE-2023-22955](CVE-2023/CVE-2023-229xx/CVE-2023-22955.json) (`2023-08-15T19:15:09.983`)
|
||||
* [CVE-2023-22956](CVE-2023/CVE-2023-229xx/CVE-2023-22956.json) (`2023-08-15T19:15:10.233`)
|
||||
* [CVE-2023-22957](CVE-2023/CVE-2023-229xx/CVE-2023-22957.json) (`2023-08-15T19:15:10.303`)
|
||||
* [CVE-2023-3894](CVE-2023/CVE-2023-38xx/CVE-2023-3894.json) (`2023-08-15T19:28:31.137`)
|
||||
* [CVE-2023-37068](CVE-2023/CVE-2023-370xx/CVE-2023-37068.json) (`2023-08-15T19:30:45.440`)
|
||||
* [CVE-2023-38641](CVE-2023/CVE-2023-386xx/CVE-2023-38641.json) (`2023-08-15T19:40:17.187`)
|
||||
* [CVE-2023-39805](CVE-2023/CVE-2023-398xx/CVE-2023-39805.json) (`2023-08-15T19:44:14.640`)
|
||||
* [CVE-2023-39806](CVE-2023/CVE-2023-398xx/CVE-2023-39806.json) (`2023-08-15T19:44:26.260`)
|
||||
* [CVE-2023-30481](CVE-2023/CVE-2023-304xx/CVE-2023-30481.json) (`2023-08-15T19:46:50.283`)
|
||||
* [CVE-2023-37625](CVE-2023/CVE-2023-376xx/CVE-2023-37625.json) (`2023-08-15T19:53:36.610`)
|
||||
* [CVE-2023-38333](CVE-2023/CVE-2023-383xx/CVE-2023-38333.json) (`2023-08-15T19:57:13.227`)
|
||||
* [CVE-2023-32565](CVE-2023/CVE-2023-325xx/CVE-2023-32565.json) (`2023-08-15T19:58:02.880`)
|
||||
* [CVE-2023-23346](CVE-2023/CVE-2023-233xx/CVE-2023-23346.json) (`2023-08-15T19:58:44.960`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user