From 709e9010c932206d75637aa88f00e6be6a8b4601 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 6 Feb 2024 03:00:29 +0000 Subject: [PATCH] Auto-Update: 2024-02-06T03:00:25.770920+00:00 --- CVE-2014/CVE-2014-17xx/CVE-2014-1745.json | 6 +- CVE-2023/CVE-2023-228xx/CVE-2023-22817.json | 4 +- CVE-2023/CVE-2023-228xx/CVE-2023-22819.json | 4 +- CVE-2023/CVE-2023-273xx/CVE-2023-27318.json | 4 +- CVE-2023/CVE-2023-340xx/CVE-2023-34042.json | 4 +- CVE-2023/CVE-2023-404xx/CVE-2023-40414.json | 8 ++- CVE-2023/CVE-2023-428xx/CVE-2023-42833.json | 8 ++- CVE-2023/CVE-2023-463xx/CVE-2023-46359.json | 24 ++++++++ CVE-2023/CVE-2023-463xx/CVE-2023-46360.json | 24 ++++++++ CVE-2023/CVE-2023-46xx/CVE-2023-4637.json | 4 +- CVE-2023/CVE-2023-470xx/CVE-2023-47022.json | 24 ++++++++ CVE-2023/CVE-2023-473xx/CVE-2023-47353.json | 24 ++++++++ CVE-2023/CVE-2023-473xx/CVE-2023-47354.json | 4 +- CVE-2023/CVE-2023-478xx/CVE-2023-47889.json | 20 ++++++ CVE-2023/CVE-2023-507xx/CVE-2023-50781.json | 4 +- CVE-2023/CVE-2023-507xx/CVE-2023-50782.json | 4 +- CVE-2023/CVE-2023-515xx/CVE-2023-51506.json | 61 ++++++++++++++++++- CVE-2023/CVE-2023-515xx/CVE-2023-51509.json | 51 +++++++++++++++- CVE-2023/CVE-2023-515xx/CVE-2023-51514.json | 51 +++++++++++++++- CVE-2023/CVE-2023-516xx/CVE-2023-51684.json | 51 +++++++++++++++- CVE-2023/CVE-2023-516xx/CVE-2023-51685.json | 51 +++++++++++++++- CVE-2023/CVE-2023-516xx/CVE-2023-51689.json | 51 +++++++++++++++- CVE-2023/CVE-2023-516xx/CVE-2023-51690.json | 51 +++++++++++++++- CVE-2023/CVE-2023-516xx/CVE-2023-51691.json | 51 +++++++++++++++- CVE-2023/CVE-2023-516xx/CVE-2023-51693.json | 51 +++++++++++++++- CVE-2023/CVE-2023-516xx/CVE-2023-51694.json | 51 +++++++++++++++- CVE-2023/CVE-2023-516xx/CVE-2023-51695.json | 51 +++++++++++++++- CVE-2023/CVE-2023-519xx/CVE-2023-51951.json | 4 +- CVE-2023/CVE-2023-521xx/CVE-2023-52118.json | 51 +++++++++++++++- CVE-2023/CVE-2023-62xx/CVE-2023-6229.json | 67 +++++++++++++++++++++ CVE-2023/CVE-2023-62xx/CVE-2023-6230.json | 67 +++++++++++++++++++++ CVE-2023/CVE-2023-62xx/CVE-2023-6231.json | 67 +++++++++++++++++++++ CVE-2023/CVE-2023-62xx/CVE-2023-6232.json | 67 +++++++++++++++++++++ CVE-2023/CVE-2023-62xx/CVE-2023-6233.json | 67 +++++++++++++++++++++ CVE-2023/CVE-2023-62xx/CVE-2023-6234.json | 67 +++++++++++++++++++++ CVE-2023/CVE-2023-65xx/CVE-2023-6526.json | 4 +- CVE-2023/CVE-2023-65xx/CVE-2023-6557.json | 4 +- CVE-2023/CVE-2023-66xx/CVE-2023-6635.json | 4 +- CVE-2023/CVE-2023-66xx/CVE-2023-6679.json | 6 +- CVE-2023/CVE-2023-67xx/CVE-2023-6700.json | 4 +- CVE-2023/CVE-2023-67xx/CVE-2023-6701.json | 4 +- CVE-2023/CVE-2023-68xx/CVE-2023-6807.json | 4 +- CVE-2023/CVE-2023-68xx/CVE-2023-6808.json | 4 +- CVE-2023/CVE-2023-68xx/CVE-2023-6846.json | 4 +- CVE-2023/CVE-2023-68xx/CVE-2023-6884.json | 4 +- CVE-2023/CVE-2023-69xx/CVE-2023-6925.json | 4 +- CVE-2023/CVE-2023-69xx/CVE-2023-6933.json | 4 +- CVE-2023/CVE-2023-69xx/CVE-2023-6953.json | 4 +- CVE-2023/CVE-2023-69xx/CVE-2023-6959.json | 4 +- CVE-2023/CVE-2023-69xx/CVE-2023-6963.json | 4 +- CVE-2023/CVE-2023-69xx/CVE-2023-6982.json | 4 +- CVE-2023/CVE-2023-69xx/CVE-2023-6983.json | 4 +- CVE-2023/CVE-2023-69xx/CVE-2023-6985.json | 4 +- CVE-2023/CVE-2023-69xx/CVE-2023-6989.json | 4 +- CVE-2023/CVE-2023-69xx/CVE-2023-6996.json | 4 +- CVE-2023/CVE-2023-70xx/CVE-2023-7014.json | 4 +- CVE-2023/CVE-2023-70xx/CVE-2023-7029.json | 4 +- CVE-2024/CVE-2024-02xx/CVE-2024-0202.json | 4 +- CVE-2024/CVE-2024-02xx/CVE-2024-0221.json | 4 +- CVE-2024/CVE-2024-02xx/CVE-2024-0244.json | 67 +++++++++++++++++++++ CVE-2024/CVE-2024-02xx/CVE-2024-0254.json | 4 +- CVE-2024/CVE-2024-02xx/CVE-2024-0255.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0324.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0366.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0370.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0371.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0372.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0373.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0374.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0380.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0382.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0384.json | 4 +- CVE-2024/CVE-2024-04xx/CVE-2024-0428.json | 4 +- CVE-2024/CVE-2024-04xx/CVE-2024-0448.json | 4 +- CVE-2024/CVE-2024-05xx/CVE-2024-0508.json | 4 +- CVE-2024/CVE-2024-05xx/CVE-2024-0509.json | 4 +- CVE-2024/CVE-2024-05xx/CVE-2024-0585.json | 4 +- CVE-2024/CVE-2024-05xx/CVE-2024-0586.json | 4 +- CVE-2024/CVE-2024-05xx/CVE-2024-0597.json | 4 +- CVE-2024/CVE-2024-06xx/CVE-2024-0612.json | 4 +- CVE-2024/CVE-2024-06xx/CVE-2024-0630.json | 4 +- CVE-2024/CVE-2024-06xx/CVE-2024-0659.json | 4 +- CVE-2024/CVE-2024-06xx/CVE-2024-0660.json | 4 +- CVE-2024/CVE-2024-06xx/CVE-2024-0668.json | 4 +- CVE-2024/CVE-2024-06xx/CVE-2024-0678.json | 4 +- CVE-2024/CVE-2024-06xx/CVE-2024-0691.json | 4 +- CVE-2024/CVE-2024-06xx/CVE-2024-0699.json | 4 +- CVE-2024/CVE-2024-07xx/CVE-2024-0701.json | 4 +- CVE-2024/CVE-2024-07xx/CVE-2024-0709.json | 4 +- CVE-2024/CVE-2024-07xx/CVE-2024-0761.json | 4 +- CVE-2024/CVE-2024-07xx/CVE-2024-0790.json | 4 +- CVE-2024/CVE-2024-07xx/CVE-2024-0791.json | 4 +- CVE-2024/CVE-2024-07xx/CVE-2024-0796.json | 4 +- CVE-2024/CVE-2024-07xx/CVE-2024-0797.json | 4 +- CVE-2024/CVE-2024-08xx/CVE-2024-0823.json | 4 +- CVE-2024/CVE-2024-08xx/CVE-2024-0834.json | 4 +- CVE-2024/CVE-2024-08xx/CVE-2024-0835.json | 4 +- CVE-2024/CVE-2024-08xx/CVE-2024-0859.json | 4 +- CVE-2024/CVE-2024-08xx/CVE-2024-0869.json | 4 +- CVE-2024/CVE-2024-09xx/CVE-2024-0954.json | 4 +- CVE-2024/CVE-2024-09xx/CVE-2024-0961.json | 4 +- CVE-2024/CVE-2024-09xx/CVE-2024-0964.json | 4 +- CVE-2024/CVE-2024-09xx/CVE-2024-0969.json | 4 +- CVE-2024/CVE-2024-10xx/CVE-2024-1046.json | 4 +- CVE-2024/CVE-2024-10xx/CVE-2024-1052.json | 4 +- CVE-2024/CVE-2024-10xx/CVE-2024-1072.json | 4 +- CVE-2024/CVE-2024-10xx/CVE-2024-1075.json | 4 +- CVE-2024/CVE-2024-10xx/CVE-2024-1086.json | 8 ++- CVE-2024/CVE-2024-10xx/CVE-2024-1092.json | 4 +- CVE-2024/CVE-2024-11xx/CVE-2024-1121.json | 4 +- CVE-2024/CVE-2024-11xx/CVE-2024-1177.json | 4 +- CVE-2024/CVE-2024-12xx/CVE-2024-1208.json | 4 +- CVE-2024/CVE-2024-12xx/CVE-2024-1209.json | 4 +- CVE-2024/CVE-2024-12xx/CVE-2024-1210.json | 4 +- CVE-2024/CVE-2024-216xx/CVE-2024-21626.json | 6 +- CVE-2024/CVE-2024-222xx/CVE-2024-22202.json | 4 +- CVE-2024/CVE-2024-222xx/CVE-2024-22208.json | 4 +- CVE-2024/CVE-2024-223xx/CVE-2024-22319.json | 12 ++-- CVE-2024/CVE-2024-225xx/CVE-2024-22567.json | 4 +- CVE-2024/CVE-2024-227xx/CVE-2024-22773.json | 24 ++++++++ CVE-2024/CVE-2024-228xx/CVE-2024-22852.json | 24 ++++++++ CVE-2024/CVE-2024-228xx/CVE-2024-22853.json | 24 ++++++++ CVE-2024/CVE-2024-230xx/CVE-2024-23049.json | 4 +- CVE-2024/CVE-2024-232xx/CVE-2024-23206.json | 8 ++- CVE-2024/CVE-2024-232xx/CVE-2024-23213.json | 8 ++- CVE-2024/CVE-2024-232xx/CVE-2024-23222.json | 6 +- CVE-2024/CVE-2024-238xx/CVE-2024-23849.json | 8 ++- CVE-2024/CVE-2024-241xx/CVE-2024-24112.json | 20 ++++++ CVE-2024/CVE-2024-243xx/CVE-2024-24396.json | 4 +- CVE-2024/CVE-2024-243xx/CVE-2024-24398.json | 4 +- CVE-2024/CVE-2024-245xx/CVE-2024-24543.json | 4 +- CVE-2024/CVE-2024-245xx/CVE-2024-24559.json | 4 +- CVE-2024/CVE-2024-245xx/CVE-2024-24574.json | 4 +- CVE-2024/CVE-2024-245xx/CVE-2024-24595.json | 4 +- CVE-2024/CVE-2024-248xx/CVE-2024-24807.json | 4 +- README.md | 57 +++++++++++++++--- 136 files changed, 1566 insertions(+), 258 deletions(-) create mode 100644 CVE-2023/CVE-2023-463xx/CVE-2023-46359.json create mode 100644 CVE-2023/CVE-2023-463xx/CVE-2023-46360.json create mode 100644 CVE-2023/CVE-2023-470xx/CVE-2023-47022.json create mode 100644 CVE-2023/CVE-2023-473xx/CVE-2023-47353.json create mode 100644 CVE-2023/CVE-2023-478xx/CVE-2023-47889.json create mode 100644 CVE-2023/CVE-2023-62xx/CVE-2023-6229.json create mode 100644 CVE-2023/CVE-2023-62xx/CVE-2023-6230.json create mode 100644 CVE-2023/CVE-2023-62xx/CVE-2023-6231.json create mode 100644 CVE-2023/CVE-2023-62xx/CVE-2023-6232.json create mode 100644 CVE-2023/CVE-2023-62xx/CVE-2023-6233.json create mode 100644 CVE-2023/CVE-2023-62xx/CVE-2023-6234.json create mode 100644 CVE-2024/CVE-2024-02xx/CVE-2024-0244.json create mode 100644 CVE-2024/CVE-2024-227xx/CVE-2024-22773.json create mode 100644 CVE-2024/CVE-2024-228xx/CVE-2024-22852.json create mode 100644 CVE-2024/CVE-2024-228xx/CVE-2024-22853.json create mode 100644 CVE-2024/CVE-2024-241xx/CVE-2024-24112.json diff --git a/CVE-2014/CVE-2014-17xx/CVE-2014-1745.json b/CVE-2014/CVE-2014-17xx/CVE-2014-1745.json index 9148da6dbfc..1d971beea7b 100644 --- a/CVE-2014/CVE-2014-17xx/CVE-2014-1745.json +++ b/CVE-2014/CVE-2014-17xx/CVE-2014-1745.json @@ -2,7 +2,7 @@ "id": "CVE-2014-1745", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-05-21T11:14:09.677", - "lastModified": "2023-11-07T02:19:21.587", + "lastModified": "2024-02-06T02:15:07.623", "vulnStatus": "Modified", "descriptions": [ { @@ -491,6 +491,10 @@ "url": "http://www.debian.org/security/2014/dsa-2939", "source": "chrome-cve-admin@google.com" }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/05/8", + "source": "chrome-cve-admin@google.com" + }, { "url": "http://www.securitytracker.com/id/1030270", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22817.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22817.json index ddc80e6be9a..6451b82cd5a 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22817.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22817.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22817", "sourceIdentifier": "psirt@wdc.com", "published": "2024-02-05T22:15:54.820", - "lastModified": "2024-02-05T22:15:54.820", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22819.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22819.json index 9bed5e2ed4e..298464d0b5c 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22819.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22819.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22819", "sourceIdentifier": "psirt@wdc.com", "published": "2024-02-05T22:15:55.023", - "lastModified": "2024-02-05T22:15:55.023", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27318.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27318.json index 760d01843f3..609d3779f6a 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27318.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27318.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27318", "sourceIdentifier": "security-alert@netapp.com", "published": "2024-02-05T21:15:10.737", - "lastModified": "2024-02-05T21:15:10.737", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34042.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34042.json index ba1cd1ff033..80a9c7d2bc8 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34042.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34042.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34042", "sourceIdentifier": "security@vmware.com", "published": "2024-02-05T22:15:55.210", - "lastModified": "2024-02-05T22:15:55.210", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40414.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40414.json index 0373c0429e0..585cb9d93d5 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40414.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40414.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40414", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:48.687", - "lastModified": "2024-01-18T14:30:39.767", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-06T02:15:07.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -99,6 +99,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/05/8", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/en-us/HT213936", "source": "product-security@apple.com", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42833.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42833.json index 942b0dce4f9..678083b3380 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42833.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42833.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42833", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:50.000", - "lastModified": "2024-01-17T20:50:04.980", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-06T02:15:07.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -87,6 +87,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/05/8", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/en-us/HT213938", "source": "product-security@apple.com", diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46359.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46359.json new file mode 100644 index 00000000000..705ff41fafc --- /dev/null +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46359.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46359", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-06T01:15:07.877", + "lastModified": "2024-02-06T01:15:07.877", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An OS command injection vulnerability in Hardy Barth cPH2 eCharge Ladestation v1.87.0 and earlier, may allow an unauthenticated remote attacker to execute arbitrary commands on the system via a specifically crafted arguments passed to the connectivity check feature." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://hardy.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.offensity.com/en/blog/os-command-injection-in-cph2-charging-station-200-cve-2023-46359-and-cve-2023-46360/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46360.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46360.json new file mode 100644 index 00000000000..a204d40b4f3 --- /dev/null +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46360.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46360", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-06T01:15:07.930", + "lastModified": "2024-02-06T01:15:07.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Hardy Barth cPH2 eCharge Ladestation v1.87.0 and earlier is vulnerable to Execution with Unnecessary Privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://hardy.com", + "source": "cve@mitre.org" + }, + { + "url": "https://www.offensity.com/en/blog/os-command-injection-in-cph2-charging-station-200-cve-2023-46359-and-cve-2023-46360/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4637.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4637.json index 001e0892f66..cfd7ef445a0 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4637.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4637.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4637", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:55.410", - "lastModified": "2024-02-05T22:15:55.410", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47022.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47022.json new file mode 100644 index 00000000000..b593c794529 --- /dev/null +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47022.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-47022", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-06T01:15:07.987", + "lastModified": "2024-02-06T01:15:07.987", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code via a crafted script to the payload parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.google.com/document/d/15s7NftTX2dxfcFnMqkFIyeN48xq3LceesWOhP-9xL4Y/edit?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Patrick0x41/Security-Advisories/tree/main/CVE-2023-47022", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-473xx/CVE-2023-47353.json b/CVE-2023/CVE-2023-473xx/CVE-2023-47353.json new file mode 100644 index 00000000000..7217f46047a --- /dev/null +++ b/CVE-2023/CVE-2023-473xx/CVE-2023-47353.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-47353", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-06T01:15:08.037", + "lastModified": "2024-02-06T01:15:08.037", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the com.oneed.dvr.service.DownloadFirmwareService component of IMOU GO v1.0.11 allows attackers to force the download of arbitrary files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/imou/blob/main/com.dahua.imou.go-V1.0.11.md", + "source": "cve@mitre.org" + }, + { + "url": "https://play.google.com/store/apps/details?id=com.dahua.imou.go", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-473xx/CVE-2023-47354.json b/CVE-2023/CVE-2023-473xx/CVE-2023-47354.json index f278183f297..de2d8a75041 100644 --- a/CVE-2023/CVE-2023-473xx/CVE-2023-47354.json +++ b/CVE-2023/CVE-2023-473xx/CVE-2023-47354.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47354", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-06T00:15:08.110", - "lastModified": "2024-02-06T00:15:08.110", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47889.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47889.json new file mode 100644 index 00000000000..4bf29556751 --- /dev/null +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47889.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-47889", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-06T01:15:08.087", + "lastModified": "2024-02-06T01:15:08.087", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Android application BINHDRM26 com.bdrm.superreboot 1.0.3, exposes several critical actions through its exported broadcast receivers. These exposed actions can allow any app on the device to send unauthorized broadcasts, leading to unintended consequences. The vulnerability is particularly concerning because these actions include powering off, system reboot & entering recovery mode." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50781.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50781.json index a142c6d73a7..2a859adbaa9 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50781.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50781.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50781", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-05T21:15:10.970", - "lastModified": "2024-02-05T21:15:10.970", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json index 083ece890f9..809f4ccb772 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50782", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-05T21:15:11.183", - "lastModified": "2024-02-05T21:15:11.183", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51506.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51506.json index a2b1fe33e71..7a7fc0adbb1 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51506.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51506.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51506", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T12:15:53.533", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:02:24.077", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in realmag777 WPCS \u2013 WordPress Currency Switcher Professional allows Stored XSS.This issue affects WPCS \u2013 WordPress Currency Switcher Professional: from n/a through 1.2.0.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en realmag777 WPCS \u2013 WordPress Currency Switcher Professional permite XSS almacenado. Este problema afecta a WPCS \u2013 WordPress Currency Switcher Professional: desde n/a hasta 1.2.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:wordpress_currency_switcher:*:*:*:*:professional:wordpress:*:*", + "versionEndIncluding": "1.2.0", + "matchCriteriaId": "AFCA1CB3-B05C-4321-8DDF-A6423543FDFC" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/currency-switcher/wordpress-wpcs-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51509.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51509.json index 26d2dbc36ce..e54b5aad11f 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51509.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51509.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51509", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T12:15:53.733", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:02:16.330", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login allows Reflected XSS.This issue affects RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login: from n/a through 5.2.4.1.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Metagauss RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login permite XSS reflejado. Este problema afecta a RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login : desde n/a hasta 5.2.4.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.2.4.1", + "matchCriteriaId": "1544CCD4-9E9D-4204-BF69-4E82AED429EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-4-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51514.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51514.json index 4f4adaadc61..262b6a61248 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51514.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51514.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51514", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T12:15:53.917", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:02:10.990", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codeboxr Team CBX Bookmark & Favorite allows Stored XSS.This issue affects CBX Bookmark & Favorite: from n/a through 1.7.13.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Codeboxr Team CBX Bookmark & Favorite permite almacenar XSS. Este problema afecta a CBX Bookmark & Favorite: desde n/a hasta 1.7.13." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codeboxr:cbx_bookmark_\\&_favorite:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.7.13", + "matchCriteriaId": "F872E4B9-A613-4017-BCE5-A6CE7209ACB7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cbxwpbookmark/wordpress-cbx-bookmark-favorite-plugin-1-7-13-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51684.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51684.json index 3814aec5848..b61f16b3844 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51684.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51684.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51684", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T11:15:11.260", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:03:20.777", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Easy Digital Downloads Easy Digital Downloads \u2013 Sell Digital Files (eCommerce Store & Payments Made Easy) allows Stored XSS.This issue affects Easy Digital Downloads \u2013 Sell Digital Files (eCommerce Store & Payments Made Easy): from n/a through 3.2.5.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Easy Digital Downloads Easy Digital Downloads \u2013 Sell Digital Files (eCommerce Store & Payments Made Easy) permite XSS almacenado. Este problema afecta a Easy Digital Downloads \u2013 Sell Digital Files (eCommerce Store & Payments Made Easy): desde n/a hasta 3.2.5." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.2.5", + "matchCriteriaId": "DE476B02-71FE-48F3-8A64-FE62EF8645BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/easy-digital-downloads/wordpress-easy-digital-downloads-plugin-3-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51685.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51685.json index dade337780d..b1eb2c2c009 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51685.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51685.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51685", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T11:15:11.463", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:03:15.713", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LJ Apps WP Review Slider allows Stored XSS.This issue affects WP Review Slider: from n/a through 12.7.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en LJ Apps WP Review Slider permite XSS almacenado. Este problema afecta a WP Review Slider: desde n/a hasta 12.7." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ljapps:wp_review_slider:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "12.7", + "matchCriteriaId": "B1728266-9E22-4F86-8A0A-788F9DF1B5DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-facebook-reviews/wordpress-wp-review-slider-plugin-12-7-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51689.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51689.json index 0e2c5d9e78a..34dc38c7fdc 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51689.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51689.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51689", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T11:15:11.760", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:03:10.150", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in naa986 Easy Video Player allows Stored XSS.This issue affects Easy Video Player: from n/a through 1.2.2.10.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en naa986 Easy Video Player permite XSS almacenado. Este problema afecta a Easy Video Player: desde n/a hasta 1.2.2.10." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:noorsplugin:easy_video_player:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.2.10", + "matchCriteriaId": "A3CC8437-86DA-46AE-9993-E81F8658C13C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/easy-video-player/wordpress-easy-video-player-plugin-1-2-2-10-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51690.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51690.json index c8a0c4bb4a3..8b4f79ae7d4 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51690.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51690.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51690", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T11:15:11.973", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:03:05.650", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Advanced iFrame allows Stored XSS.This issue affects Advanced iFrame: from n/a through 2023.8.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Advanced iFrame permite XSS almacenado. Este problema afecta a Advanced iFrame: desde n/a hasta 2023.8." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tinywebgallery:advanced_iframe:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2023.8", + "matchCriteriaId": "3FB2A371-1205-4C24-9197-7FB2C426D252" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/advanced-iframe/wordpress-advanced-iframe-plugin-2023-8-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51691.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51691.json index 7236a50e017..c6aa1451469 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51691.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51691.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51691", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T11:15:12.200", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:02:56.130", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gVectors Team Comments \u2013 wpDiscuz allows Stored XSS.This issue affects Comments \u2013 wpDiscuz: from n/a through 7.6.12.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en gVectors Team Comments \u2013 wpDiscuz permite XSS almacenado. Este problema afecta a Comments \u2013 wpDiscuz: desde n/a hasta 7.6.12." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "7.6.12", + "matchCriteriaId": "34F76E76-5AB9-48F9-B91F-82465F427743" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpdiscuz/wordpress-wpdiscuz-plugin-7-6-12-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51693.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51693.json index be9d28ce495..aec239bf4ce 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51693.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51693.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51693", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T11:15:12.390", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:02:50.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themify Icons allows Stored XSS.This issue affects Themify Icons: from n/a through 2.0.1.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Themify Icons permite XSS almacenado. Este problema afecta a Themify Icons: desde n/a hasta 2.0.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themify:icons:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.1", + "matchCriteriaId": "A58495FC-9A5D-4675-9E52-45D889756DE1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/themify-icons/wordpress-themify-icons-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51694.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51694.json index 10e18d7d3fe..bdb6d57e3c1 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51694.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51694.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51694", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T11:15:12.610", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:02:45.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Epiphyt Embed Privacy allows Stored XSS.This issue affects Embed Privacy: from n/a through 1.8.0.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Epiphyt Embed Privacy permite XSS almacenado. Este problema afecta a Embed Privacy: desde n/a hasta 1.8.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:epiph:embed_privacy:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.8.0", + "matchCriteriaId": "C0F2CF23-80AC-4026-9B22-43D500FEEA64" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/embed-privacy/wordpress-embed-privacy-plugin-1-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51695.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51695.json index d7b94718452..cb9646d86a9 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51695.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51695.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51695", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T11:15:12.790", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:02:41.030", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPEverest Everest Forms \u2013 Build Contact Forms, Surveys, Polls, Application Forms, and more with Ease! allows Stored XSS.This issue affects Everest Forms \u2013 Build Contact Forms, Surveys, Polls, Application Forms, and more with Ease!: from n/a through 2.0.4.1.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPEverest Everest Forms \u2013 Build Contact Forms, Surveys, Polls, Application Forms, and more with Ease! permite XSS almacenado. Este problema afecta a Everest Forms \u2013 Build Contact Forms, Surveys, Polls, Application Forms, and more with Ease! : desde n/a hasta 2.0.4.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpeverest:everest_forms:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.4.1", + "matchCriteriaId": "CFED2A13-F884-487A-86A3-5D31BEDB7DEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/everest-forms/wordpress-everest-forms-plugin-2-0-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-519xx/CVE-2023-51951.json b/CVE-2023/CVE-2023-519xx/CVE-2023-51951.json index 66de9973c28..431aa180007 100644 --- a/CVE-2023/CVE-2023-519xx/CVE-2023-51951.json +++ b/CVE-2023/CVE-2023-519xx/CVE-2023-51951.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51951", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T21:15:11.397", - "lastModified": "2024-02-05T21:15:11.397", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52118.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52118.json index 7aa889a92d0..bbae026efcb 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52118.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52118.json @@ -2,16 +2,40 @@ "id": "CVE-2023-52118", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-01T11:15:12.970", - "lastModified": "2024-02-01T13:41:44.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:02:32.410", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Event Manager WP User Profile Avatar allows Stored XSS.This issue affects WP User Profile Avatar: from n/a through 1.0.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Event Manager WP User Profile Avatar permite XSS almacenado. Este problema afecta a WP User Profile Avatar: desde n/a hasta 1.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-eventmanager:wp_event_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "66A91FE3-F891-4C5A-842E-57C6B7277B6E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-user-profile-avatar/wordpress-wp-user-profile-avatar-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6229.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6229.json new file mode 100644 index 00000000000..979ac9a6bd7 --- /dev/null +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6229.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-6229", + "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "published": "2024-02-06T01:15:08.137", + "lastModified": "2024-02-06T01:15:08.137", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer overflow in CPCA PDL Resource Download process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://canon.jp/support/support-info/240205vulnerability-response", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://psirt.canon/advisory-information/cp2024-001/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.canon-europe.com/support/product-security-latest-news/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6230.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6230.json new file mode 100644 index 00000000000..96948e463a7 --- /dev/null +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6230.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-6230", + "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "published": "2024-02-06T01:15:08.350", + "lastModified": "2024-02-06T01:15:08.350", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer overflow in the Address Book password process in authentication of Mobile Device Function of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://canon.jp/support/support-info/240205vulnerability-response", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://psirt.canon/advisory-information/cp2024-001/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.canon-europe.com/support/product-security-latest-news/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6231.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6231.json new file mode 100644 index 00000000000..e7c88af2f50 --- /dev/null +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6231.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-6231", + "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "published": "2024-02-06T01:15:08.547", + "lastModified": "2024-02-06T01:15:08.547", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer overflow in WSD probe request process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://canon.jp/support/support-info/240205vulnerability-response", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://psirt.canon/advisory-information/cp2024-001/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.canon-europe.com/support/product-security-latest-news/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6232.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6232.json new file mode 100644 index 00000000000..c2dbdabe727 --- /dev/null +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6232.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-6232", + "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "published": "2024-02-06T01:15:08.740", + "lastModified": "2024-02-06T01:15:08.740", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer overflow in the Address Book username process in authentication of Mobile Device Function of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://canon.jp/support/support-info/240205vulnerability-response", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://psirt.canon/advisory-information/cp2024-001/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.canon-europe.com/support/product-security-latest-news/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6233.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6233.json new file mode 100644 index 00000000000..23830c30db8 --- /dev/null +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6233.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-6233", + "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "published": "2024-02-06T01:15:08.930", + "lastModified": "2024-02-06T01:15:08.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer overflow in SLP attribute request process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://canon.jp/support/support-info/240205vulnerability-response", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://psirt.canon/advisory-information/cp2024-001/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.canon-europe.com/support/product-security-latest-news/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6234.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6234.json new file mode 100644 index 00000000000..8e69b6193d6 --- /dev/null +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6234.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2023-6234", + "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "published": "2024-02-06T01:15:09.107", + "lastModified": "2024-02-06T01:15:09.107", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer overflow in CPCA Color LUT Resource Download process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://canon.jp/support/support-info/240205vulnerability-response", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://psirt.canon/advisory-information/cp2024-001/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.canon-europe.com/support/product-security-latest-news/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6526.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6526.json index 88ae64cf3e7..ad17e1adf19 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6526.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6526.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6526", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:55.593", - "lastModified": "2024-02-05T22:15:55.593", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6557.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6557.json index 297e0f3a7d5..c54a4242a3e 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6557.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6557.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6557", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:55.767", - "lastModified": "2024-02-05T22:15:55.767", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6635.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6635.json index 1ff3ada8f13..2b723416bf8 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6635.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6635.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6635", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:56.023", - "lastModified": "2024-02-05T22:15:56.023", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6679.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6679.json index 7b59abd97e9..04b07fd82bd 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6679.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6679.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6679", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-11T19:15:09.440", - "lastModified": "2024-01-25T20:15:39.967", + "lastModified": "2024-02-06T02:15:08.087", "vulnStatus": "Modified", "descriptions": [ { @@ -155,6 +155,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/", + "source": "secalert@redhat.com" + }, { "url": "https://lore.kernel.org/netdev/20231211083758.1082853-1-jiri@resnulli.us/", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6700.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6700.json index bde34d37cea..06892c61e2c 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6700.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6700.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6700", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:56.187", - "lastModified": "2024-02-05T22:15:56.187", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6701.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6701.json index 49d912413dc..8cbcdebb7e8 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6701.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6701.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6701", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:56.357", - "lastModified": "2024-02-05T22:15:56.357", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6807.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6807.json index 5a36b46cde0..0529e4f6fd3 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6807.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6807.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6807", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:56.543", - "lastModified": "2024-02-05T22:15:56.543", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6808.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6808.json index 1c48ea35025..343ba7671ff 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6808.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6808.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6808", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:56.710", - "lastModified": "2024-02-05T22:15:56.710", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6846.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6846.json index e622eaf119f..56c4231d63b 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6846.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6846.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6846", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:56.887", - "lastModified": "2024-02-05T22:15:56.887", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6884.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6884.json index 28396f03086..dd3fb33a226 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6884.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6884.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6884", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:57.057", - "lastModified": "2024-02-05T22:15:57.057", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6925.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6925.json index 309f319ad06..5b1ffec2b72 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6925.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6925.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6925", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:57.233", - "lastModified": "2024-02-05T22:15:57.233", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6933.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6933.json index ec723c02eea..ea57ac8b2e8 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6933.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6933.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6933", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:57.407", - "lastModified": "2024-02-05T22:15:57.407", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6953.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6953.json index 4939be70598..1cef9c3802f 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6953.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6953.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6953", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:57.587", - "lastModified": "2024-02-05T22:15:57.587", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6959.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6959.json index 766e8f86bc6..b10d39edd6d 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6959.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6959.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6959", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:57.767", - "lastModified": "2024-02-05T22:15:57.767", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6963.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6963.json index 1e19c1929e8..49b4f2b000c 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6963.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6963.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6963", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:57.930", - "lastModified": "2024-02-05T22:15:57.930", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6982.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6982.json index 6454bb1acd0..8301edf7d38 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6982.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6982.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6982", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:58.093", - "lastModified": "2024-02-05T22:15:58.093", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6983.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6983.json index 28a92689f36..a602905f765 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6983.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6983.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6983", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:58.257", - "lastModified": "2024-02-05T22:15:58.257", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6985.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6985.json index c69e960345d..5c1697fe02b 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6985.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6985.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6985", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:58.433", - "lastModified": "2024-02-05T22:15:58.433", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6989.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6989.json index ff3723db01b..d4ff2fb4ed3 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6989.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6989.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6989", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:58.603", - "lastModified": "2024-02-05T22:15:58.603", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6996.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6996.json index 138ad64b384..a0bdebe7738 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6996.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6996.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6996", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:58.773", - "lastModified": "2024-02-05T22:15:58.773", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7014.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7014.json index 7d4dc0bffdc..e1b9c69a9d3 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7014.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7014.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7014", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:58.943", - "lastModified": "2024-02-05T22:15:58.943", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7029.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7029.json index 17421b92f80..36755818077 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7029.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7029.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7029", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:59.103", - "lastModified": "2024-02-05T22:15:59.103", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0202.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0202.json index 22e79997138..7f2017129c2 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0202.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0202", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-02-05T21:15:11.450", - "lastModified": "2024-02-05T21:15:11.450", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0221.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0221.json index d5f204f3be2..ff30fdf40ed 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0221.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0221.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0221", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:59.297", - "lastModified": "2024-02-05T22:15:59.297", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0244.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0244.json new file mode 100644 index 00000000000..17de1b9b5b6 --- /dev/null +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0244.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2024-0244", + "sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "published": "2024-02-06T01:15:09.300", + "lastModified": "2024-02-06T01:15:09.300", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer overflow in CPCA PCFAX number process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*:Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS MF750C Series/Color imageCLASS X MF1333C firmware v03.07 and earlier sold in US. i-SENSYS MF754Cdw/C1333iF firmware v03.07 and earlier sold in Europe.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://canon.jp/support/support-info/240205vulnerability-response", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://psirt.canon/advisory-information/cp2024-001/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.canon-europe.com/support/product-security-latest-news/", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + }, + { + "url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers", + "source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0254.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0254.json index 7a5346811b6..d7814b43faa 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0254.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0254.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0254", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:59.630", - "lastModified": "2024-02-05T22:15:59.630", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0255.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0255.json index 2e6d81d04d4..1238f3e6c7f 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0255.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0255", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:59.810", - "lastModified": "2024-02-05T22:15:59.810", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0324.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0324.json index f3d02507f68..e5a10c2426d 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0324.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0324.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0324", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:59.980", - "lastModified": "2024-02-05T22:15:59.980", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0366.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0366.json index 11e71542540..71b8b4abdb9 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0366.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0366.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0366", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:00.150", - "lastModified": "2024-02-05T22:16:00.150", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0370.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0370.json index fe772b7f792..a791a3b61c2 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0370.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0370.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0370", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:00.320", - "lastModified": "2024-02-05T22:16:00.320", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0371.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0371.json index fab65cdddc2..5e1b3cd5562 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0371.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0371.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0371", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:00.483", - "lastModified": "2024-02-05T22:16:00.483", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0372.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0372.json index e5c84cab53a..3be7fc81d3e 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0372.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0372.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0372", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:00.667", - "lastModified": "2024-02-05T22:16:00.667", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0373.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0373.json index f473c6918cc..97f34f6857c 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0373.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0373", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:00.840", - "lastModified": "2024-02-05T22:16:00.840", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0374.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0374.json index 90f88da14f7..6bdd5d5e0a8 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0374.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0374.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0374", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:01.020", - "lastModified": "2024-02-05T22:16:01.020", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0380.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0380.json index 2a73ab014fc..e69b14e6a6f 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0380.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0380.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0380", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:01.190", - "lastModified": "2024-02-05T22:16:01.190", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0382.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0382.json index 179c904337f..bc48b5f82e9 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0382.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0382.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0382", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:01.360", - "lastModified": "2024-02-05T22:16:01.360", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0384.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0384.json index e0ccb47a3e0..3dff69b55e5 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0384.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0384.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0384", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:01.527", - "lastModified": "2024-02-05T22:16:01.527", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0428.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0428.json index 0ae07da4d12..eb44d8b7cb0 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0428.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0428.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0428", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:01.710", - "lastModified": "2024-02-05T22:16:01.710", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0448.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0448.json index b4c593a9346..fcd7c6b1c8e 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0448.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0448.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0448", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:01.890", - "lastModified": "2024-02-05T22:16:01.890", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0508.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0508.json index fde90e3ce56..d55c8e41125 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0508.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0508.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0508", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:02.067", - "lastModified": "2024-02-05T22:16:02.067", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0509.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0509.json index 893d2083e9f..90e8ed59d65 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0509.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0509.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0509", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:02.260", - "lastModified": "2024-02-05T22:16:02.260", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0585.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0585.json index 8bc7a151029..5a94dde44ec 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0585.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0585.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0585", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:02.433", - "lastModified": "2024-02-05T22:16:02.433", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0586.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0586.json index 24e7e5ebf76..22198432632 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0586.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0586.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0586", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:02.607", - "lastModified": "2024-02-05T22:16:02.607", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0597.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0597.json index 264b0637bc5..693f0780887 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0597.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0597.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0597", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:02.777", - "lastModified": "2024-02-05T22:16:02.777", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0612.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0612.json index 83cc350868c..7420c4e9d4b 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0612.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0612.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0612", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:03.003", - "lastModified": "2024-02-05T22:16:03.003", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0630.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0630.json index 4b14f4c8506..4fbf829ff28 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0630.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0630.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0630", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:03.170", - "lastModified": "2024-02-05T22:16:03.170", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0659.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0659.json index ffbbd23297d..8617918fed9 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0659.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0659.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0659", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:03.343", - "lastModified": "2024-02-05T22:16:03.343", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0660.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0660.json index 169001c1d76..f9994e69e80 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0660.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0660.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0660", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:03.520", - "lastModified": "2024-02-05T22:16:03.520", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0668.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0668.json index 56e4b0a3e2b..2ec55691f2f 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0668.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0668.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0668", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:03.700", - "lastModified": "2024-02-05T22:16:03.700", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0678.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0678.json index 4b53cb65555..bf6a969877a 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0678.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0678.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0678", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:03.867", - "lastModified": "2024-02-05T22:16:03.867", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0691.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0691.json index 39c3ff985c1..0bde246ed41 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0691.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0691.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0691", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:04.037", - "lastModified": "2024-02-05T22:16:04.037", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0699.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0699.json index 926b4befbed..12c17dbf8b7 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0699.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0699", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:04.210", - "lastModified": "2024-02-05T22:16:04.210", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0701.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0701.json index 2542370a9ec..1240bff31a6 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0701.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0701.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0701", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:04.380", - "lastModified": "2024-02-05T22:16:04.380", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0709.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0709.json index 8804035d497..a66067c7756 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0709.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0709.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0709", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:04.553", - "lastModified": "2024-02-05T22:16:04.553", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0761.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0761.json index 6b9975d4d13..fa66ca86aaf 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0761.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0761.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0761", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:04.733", - "lastModified": "2024-02-05T22:16:04.733", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0790.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0790.json index e869ff2269a..a22834f1ec7 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0790.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0790.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0790", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:04.907", - "lastModified": "2024-02-05T22:16:04.907", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0791.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0791.json index 3e26ae198f8..d2d1e2d9d0a 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0791.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0791.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0791", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:05.077", - "lastModified": "2024-02-05T22:16:05.077", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0796.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0796.json index 1beec1b4749..a5dce9530bd 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0796.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0796.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0796", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:05.243", - "lastModified": "2024-02-05T22:16:05.243", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0797.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0797.json index 640b31020be..c7b55ec5de9 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0797.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0797", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:05.407", - "lastModified": "2024-02-05T22:16:05.407", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0823.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0823.json index 10676ed692d..e691cf98753 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0823.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0823.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0823", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:05.577", - "lastModified": "2024-02-05T22:16:05.577", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0834.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0834.json index b0340660ce4..8e23668ccae 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0834.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0834.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0834", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:05.750", - "lastModified": "2024-02-05T22:16:05.750", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0835.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0835.json index 5719ad5feee..06d4cb1bce1 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0835.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0835.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0835", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:05.917", - "lastModified": "2024-02-05T22:16:05.917", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0859.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0859.json index b82e8f91c8e..16ab76e5752 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0859.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0859.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0859", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:06.090", - "lastModified": "2024-02-05T22:16:06.090", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0869.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0869.json index 9dfef949593..23328189ac6 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0869.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0869.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0869", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:06.267", - "lastModified": "2024-02-05T22:16:06.267", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0954.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0954.json index 321c35e10c0..47e41e925cc 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0954.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0954.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0954", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:06.433", - "lastModified": "2024-02-05T22:16:06.433", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0961.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0961.json index 1c1e21c3ddb..bee65fbfe4e 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0961.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0961.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0961", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:06.597", - "lastModified": "2024-02-05T22:16:06.597", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0964.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0964.json index 39ae8149e26..0cd33fa0731 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0964.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0964.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0964", "sourceIdentifier": "security@huntr.dev", "published": "2024-02-05T23:15:08.190", - "lastModified": "2024-02-05T23:15:08.190", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0969.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0969.json index e7556b690b9..b302c5635c8 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0969.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0969.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0969", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:06.767", - "lastModified": "2024-02-05T22:16:06.767", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1046.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1046.json index 33a917b55a8..b96955f4b3e 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1046.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1046.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1046", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:06.930", - "lastModified": "2024-02-05T22:16:06.930", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1052.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1052.json index e4b6be2032f..8bf339b9877 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1052.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1052", "sourceIdentifier": "security@hashicorp.com", "published": "2024-02-05T21:15:11.640", - "lastModified": "2024-02-05T21:15:11.640", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1072.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1072.json index fe52bbac48f..fc5a3dbd497 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1072.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1072.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1072", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:07.100", - "lastModified": "2024-02-05T22:16:07.100", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1075.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1075.json index b2616b7cbd7..0e04a63270e 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1075.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1075.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1075", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:07.283", - "lastModified": "2024-02-05T22:16:07.283", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1086.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1086.json index 4cd6b81b012..62aa5ac7e98 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1086.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1086.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1086", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-01-31T13:15:10.827", - "lastModified": "2024-02-05T20:41:24.390", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-06T02:15:08.303", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -133,6 +133,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/", + "source": "cve-coordination@google.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1092.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1092.json index 6349aea42f9..81015615c8c 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1092.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1092.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1092", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:07.460", - "lastModified": "2024-02-05T22:16:07.460", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1121.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1121.json index 47339b0f668..730eefdf5b4 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1121.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1121.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1121", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:07.640", - "lastModified": "2024-02-05T22:16:07.640", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1177.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1177.json index 99ab623f75e..33e577774d2 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1177.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1177.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1177", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:07.813", - "lastModified": "2024-02-05T22:16:07.813", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1208.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1208.json index 3f29256db11..6ed2e75d0a2 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1208.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1208.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1208", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:07.977", - "lastModified": "2024-02-05T22:16:07.977", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1209.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1209.json index 5414b8c1037..7f214335f5e 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1209.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1209.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1209", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:08.143", - "lastModified": "2024-02-05T22:16:08.143", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1210.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1210.json index fdd7c0e423e..dd47b2338b3 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1210.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1210.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1210", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:16:08.310", - "lastModified": "2024-02-05T22:16:08.310", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21626.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21626.json index c07d5e84dae..a6919362d85 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21626.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21626.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21626", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-31T22:15:53.780", - "lastModified": "2024-02-05T17:15:09.383", + "lastModified": "2024-02-06T02:15:08.420", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -78,6 +78,10 @@ { "url": "https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv", "source": "security-advisories@github.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYMO3BANINS6RGFQFKPRG4FIOJ7GWYTL/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22202.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22202.json index 0f44fd98efc..716a586e794 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22202.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22202", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-05T20:15:55.390", - "lastModified": "2024-02-05T20:15:55.390", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22208.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22208.json index a451ceb37b3..7c25d433293 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22208.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22208.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22208", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-05T21:15:11.830", - "lastModified": "2024-02-05T21:15:11.830", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22319.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22319.json index 62f9ad26f89..a92f1bc6d25 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22319.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22319.json @@ -2,12 +2,16 @@ "id": "CVE-2024-22319", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-02T03:15:10.573", - "lastModified": "2024-02-02T04:58:55.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-02-06T01:15:09.500", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", - "value": "IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 could allow a remote attacker to conduct an LDAP injection. By sending a request with a specially crafted request, an attacker could exploit this vulnerability to inject unsanitized content into the LDAP filter. IBM X-Force ID: 279145." + "value": "\nIBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 is susceptible to remote code execution attack via JNDI injection when passing an unchecked argument to a certain API. IBM X-Force ID: 279145.\n\n" + }, + { + "lang": "es", + "value": "IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1 y 8.12.0.1 podr\u00eda permitir a un atacante remoto realizar una inyecci\u00f3n LDAP. Al enviar una solicitud especialmente manipulada, un atacante podr\u00eda aprovechar esta vulnerabilidad para inyectar contenido no sanitizado en el filtro LDAP. ID de IBM X-Force: 279145." } ], "metrics": { @@ -41,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-90" + "value": "CWE-74" } ] } diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22567.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22567.json index 431a4f04bb4..687bd8ddd4e 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22567.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22567", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T20:15:55.620", - "lastModified": "2024-02-05T20:15:55.620", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22773.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22773.json new file mode 100644 index 00000000000..4e7730b40dd --- /dev/null +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22773.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-22773", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-06T01:15:09.647", + "lastModified": "2024-02-06T01:15:09.647", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Intelbras Roteador ACtion RF 1200 1.2.2 esposes the Password in Cookie resulting in Login Bypass." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/%40wagneralves_87750/poc-cve-2024-22773-febf0d3a5433", + "source": "cve@mitre.org" + }, + { + "url": "https://www.youtube.com/watch?v=-r0TWJq55DU&t=7s", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22852.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22852.json new file mode 100644 index 00000000000..4c9cc462956 --- /dev/null +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22852.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-22852", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-06T02:15:08.663", + "lastModified": "2024-02-06T02:15:08.663", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "D-Link Go-RT-AC750 GORTAC750_A1_FW_v101b03 contains a stack-based buffer overflow via the function genacgi_main. This vulnerability allows attackers to enable telnet service via a specially crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Beckaf/vunl/blob/main/D-Link/AC750/1/1.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22853.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22853.json new file mode 100644 index 00000000000..6995a89fc51 --- /dev/null +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22853.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-22853", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-06T02:15:08.757", + "lastModified": "2024-02-06T02:15:08.757", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 has a hardcoded password for the Alphanetworks account, which allows remote attackers to obtain root access via a telnet session." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Beckaf/vunl/blob/main/D-Link/AC750/2/2.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23049.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23049.json index a65fa870809..7cf4abe85a2 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23049.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23049", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T23:15:08.463", - "lastModified": "2024-02-05T23:15:08.463", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json index a054cf9e3cc..2481aface49 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23206.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23206", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:10.840", - "lastModified": "2024-01-26T21:17:32.107", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-06T02:15:08.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -157,6 +157,10 @@ "Third Party Advisory" ] }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/05/8", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/en-us/HT214055", "source": "product-security@apple.com", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json index 7d0a8f2c6f8..8d3ae6adf8e 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23213", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:11.183", - "lastModified": "2024-01-30T16:26:53.437", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-06T02:15:08.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -158,6 +158,10 @@ "Third Party Advisory" ] }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/05/8", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/en-us/HT214055", "source": "product-security@apple.com", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json index 6821f19aa96..0123dc25188 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23222", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:11.500", - "lastModified": "2024-02-04T10:15:08.623", + "lastModified": "2024-02-06T02:15:09.010", "vulnStatus": "Modified", "cisaExploitAdd": "2024-01-23", "cisaActionDue": "2024-02-13", @@ -181,6 +181,10 @@ "Third Party Advisory" ] }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/02/05/8", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/en-us/HT214055", "source": "product-security@apple.com", diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23849.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23849.json index e217c87f3c0..9b1ab81d32d 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23849.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23849.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23849", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-23T09:15:36.050", - "lastModified": "2024-01-30T00:23:43.143", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-06T02:15:09.113", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -69,6 +69,10 @@ } ], "references": [ + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/", + "source": "cve@mitre.org" + }, { "url": "https://lore.kernel.org/netdev/1705715319-19199-1-git-send-email-sharath.srinivasan%40oracle.com/", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24112.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24112.json new file mode 100644 index 00000000000..a50687d4411 --- /dev/null +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24112.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-24112", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-06T01:15:09.700", + "lastModified": "2024-02-06T01:15:09.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "xmall v1.1 was discovered to contain a SQL injection vulnerability via the orderDir parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Exrick/xmall/issues/78", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24396.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24396.json index f28f1faaff4..26aa7ff037c 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24396.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24396.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24396", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T19:15:08.557", - "lastModified": "2024-02-05T19:15:08.557", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-243xx/CVE-2024-24398.json b/CVE-2024/CVE-2024-243xx/CVE-2024-24398.json index d89851deac7..1db96afc072 100644 --- a/CVE-2024/CVE-2024-243xx/CVE-2024-24398.json +++ b/CVE-2024/CVE-2024-243xx/CVE-2024-24398.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24398", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-06T00:15:08.183", - "lastModified": "2024-02-06T00:15:08.183", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24543.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24543.json index 40604534725..f223d90d4ec 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24543.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24543.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24543", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T21:15:12.073", - "lastModified": "2024-02-05T21:15:12.073", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24559.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24559.json index 3a92bd04c19..7fb3dc6a2cf 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24559.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24559.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24559", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-05T21:15:12.127", - "lastModified": "2024-02-05T21:15:12.127", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24574.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24574.json index 09790742a10..53477535aeb 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24574.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24574.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24574", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-05T21:15:12.340", - "lastModified": "2024-02-05T21:15:12.340", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24595.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24595.json index 13e8874ccac..552280ad75e 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24595.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24595.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24595", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-02-05T22:16:08.480", - "lastModified": "2024-02-05T22:16:08.480", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24807.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24807.json index 4b3609a89ed..bd2dcb4e5dd 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24807.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24807", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-05T21:15:12.557", - "lastModified": "2024-02-05T21:15:12.557", - "vulnStatus": "Received", + "lastModified": "2024-02-06T01:00:55.997", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 88f46b91212..658d70cee65 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-06T00:55:24.628150+00:00 +2024-02-06T03:00:25.770920+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-06T00:15:08.183000+00:00 +2024-02-06T02:15:09.113000+00:00 ``` ### Last Data Feed Release @@ -23,29 +23,66 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-02-05T01:00:28.280189+00:00 +2024-02-06T01:00:28.243779+00:00 ``` ### Total Number of included CVEs ```plain -237681 +237697 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `16` -* [CVE-2023-47354](CVE-2023/CVE-2023-473xx/CVE-2023-47354.json) (`2024-02-06T00:15:08.110`) -* [CVE-2024-0964](CVE-2024/CVE-2024-09xx/CVE-2024-0964.json) (`2024-02-05T23:15:08.190`) -* [CVE-2024-23049](CVE-2024/CVE-2024-230xx/CVE-2024-23049.json) (`2024-02-05T23:15:08.463`) -* [CVE-2024-24398](CVE-2024/CVE-2024-243xx/CVE-2024-24398.json) (`2024-02-06T00:15:08.183`) +* [CVE-2023-46359](CVE-2023/CVE-2023-463xx/CVE-2023-46359.json) (`2024-02-06T01:15:07.877`) +* [CVE-2023-46360](CVE-2023/CVE-2023-463xx/CVE-2023-46360.json) (`2024-02-06T01:15:07.930`) +* [CVE-2023-47022](CVE-2023/CVE-2023-470xx/CVE-2023-47022.json) (`2024-02-06T01:15:07.987`) +* [CVE-2023-47353](CVE-2023/CVE-2023-473xx/CVE-2023-47353.json) (`2024-02-06T01:15:08.037`) +* [CVE-2023-47889](CVE-2023/CVE-2023-478xx/CVE-2023-47889.json) (`2024-02-06T01:15:08.087`) +* [CVE-2023-6229](CVE-2023/CVE-2023-62xx/CVE-2023-6229.json) (`2024-02-06T01:15:08.137`) +* [CVE-2023-6230](CVE-2023/CVE-2023-62xx/CVE-2023-6230.json) (`2024-02-06T01:15:08.350`) +* [CVE-2023-6231](CVE-2023/CVE-2023-62xx/CVE-2023-6231.json) (`2024-02-06T01:15:08.547`) +* [CVE-2023-6232](CVE-2023/CVE-2023-62xx/CVE-2023-6232.json) (`2024-02-06T01:15:08.740`) +* [CVE-2023-6233](CVE-2023/CVE-2023-62xx/CVE-2023-6233.json) (`2024-02-06T01:15:08.930`) +* [CVE-2023-6234](CVE-2023/CVE-2023-62xx/CVE-2023-6234.json) (`2024-02-06T01:15:09.107`) +* [CVE-2024-0244](CVE-2024/CVE-2024-02xx/CVE-2024-0244.json) (`2024-02-06T01:15:09.300`) +* [CVE-2024-22773](CVE-2024/CVE-2024-227xx/CVE-2024-22773.json) (`2024-02-06T01:15:09.647`) +* [CVE-2024-24112](CVE-2024/CVE-2024-241xx/CVE-2024-24112.json) (`2024-02-06T01:15:09.700`) +* [CVE-2024-22852](CVE-2024/CVE-2024-228xx/CVE-2024-22852.json) (`2024-02-06T02:15:08.663`) +* [CVE-2024-22853](CVE-2024/CVE-2024-228xx/CVE-2024-22853.json) (`2024-02-06T02:15:08.757`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `119` +* [CVE-2024-0859](CVE-2024/CVE-2024-08xx/CVE-2024-0859.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-0869](CVE-2024/CVE-2024-08xx/CVE-2024-0869.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-0954](CVE-2024/CVE-2024-09xx/CVE-2024-0954.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-0961](CVE-2024/CVE-2024-09xx/CVE-2024-0961.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-0969](CVE-2024/CVE-2024-09xx/CVE-2024-0969.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-1046](CVE-2024/CVE-2024-10xx/CVE-2024-1046.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-1072](CVE-2024/CVE-2024-10xx/CVE-2024-1072.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-1075](CVE-2024/CVE-2024-10xx/CVE-2024-1075.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-1092](CVE-2024/CVE-2024-10xx/CVE-2024-1092.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-1121](CVE-2024/CVE-2024-11xx/CVE-2024-1121.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-1177](CVE-2024/CVE-2024-11xx/CVE-2024-1177.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-1208](CVE-2024/CVE-2024-12xx/CVE-2024-1208.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-1209](CVE-2024/CVE-2024-12xx/CVE-2024-1209.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-1210](CVE-2024/CVE-2024-12xx/CVE-2024-1210.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-24595](CVE-2024/CVE-2024-245xx/CVE-2024-24595.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-0964](CVE-2024/CVE-2024-09xx/CVE-2024-0964.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-23049](CVE-2024/CVE-2024-230xx/CVE-2024-23049.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-24398](CVE-2024/CVE-2024-243xx/CVE-2024-24398.json) (`2024-02-06T01:00:55.997`) +* [CVE-2024-22319](CVE-2024/CVE-2024-223xx/CVE-2024-22319.json) (`2024-02-06T01:15:09.500`) +* [CVE-2024-1086](CVE-2024/CVE-2024-10xx/CVE-2024-1086.json) (`2024-02-06T02:15:08.303`) +* [CVE-2024-21626](CVE-2024/CVE-2024-216xx/CVE-2024-21626.json) (`2024-02-06T02:15:08.420`) +* [CVE-2024-23206](CVE-2024/CVE-2024-232xx/CVE-2024-23206.json) (`2024-02-06T02:15:08.810`) +* [CVE-2024-23213](CVE-2024/CVE-2024-232xx/CVE-2024-23213.json) (`2024-02-06T02:15:08.903`) +* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-06T02:15:09.010`) +* [CVE-2024-23849](CVE-2024/CVE-2024-238xx/CVE-2024-23849.json) (`2024-02-06T02:15:09.113`) ## Download and Usage