diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json new file mode 100644 index 00000000000..1fab85f7dd9 --- /dev/null +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33220.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2022-33220", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:11.847", + "lastModified": "2023-09-05T07:15:11.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure in Automotive multimedia due to buffer over-read." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json new file mode 100644 index 00000000000..7313f139568 --- /dev/null +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33275.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2022-33275", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:11.983", + "lastModified": "2023-09-05T07:15:11.983", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption due to improper validation of array index in WLAN HAL when received lm_itemNum is out of range." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json new file mode 100644 index 00000000000..1d6ff137f62 --- /dev/null +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40524.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2022-40524", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.073", + "lastModified": "2023-09-05T07:15:12.073", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json new file mode 100644 index 00000000000..fd7901a22ab --- /dev/null +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40534.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2022-40534", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.157", + "lastModified": "2023-09-05T07:15:12.157", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption due to improper validation of array index in Audio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43903.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43903.json index 9387ecdc3a6..e8ea038b3c0 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43903.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43903.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43903", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-09-05T00:15:07.347", - "lastModified": "2023-09-05T00:15:07.347", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json new file mode 100644 index 00000000000..13f6fd4c636 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21636.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21636", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.247", + "lastModified": "2023-09-05T07:15:12.247", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory Corruption due to improper validation of array index in Linux while updating adn record." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json new file mode 100644 index 00000000000..a24d46f2e48 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21644.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21644", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.327", + "lastModified": "2023-09-05T07:15:12.327", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in RIL due to Integer Overflow while triggering qcril_uim_request_apdu request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json new file mode 100644 index 00000000000..9894626d701 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21646.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21646", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.410", + "lastModified": "2023-09-05T07:15:12.410", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS in Modem while processing invalid System Information Block 1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json new file mode 100644 index 00000000000..e872bdddaab --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21653.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21653", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.490", + "lastModified": "2023-09-05T07:15:12.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS in Modem while processing RRC reconfiguration message." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json new file mode 100644 index 00000000000..05c31f97bda --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21654.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21654", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.570", + "lastModified": "2023-09-05T07:15:12.570", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in Audio during playback session with audio effects enabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json new file mode 100644 index 00000000000..ebadf6e5b31 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21655.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21655", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.697", + "lastModified": "2023-09-05T07:15:12.697", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in Audio while validating and mapping metadata." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json new file mode 100644 index 00000000000..f8e5f1fd4bd --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21662.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21662", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.780", + "lastModified": "2023-09-05T07:15:12.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in Core Platform while printing the response buffer in log." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json new file mode 100644 index 00000000000..5f538b7d423 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21663.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21663", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.863", + "lastModified": "2023-09-05T07:15:12.863", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory Corruption while accessing metadata in Display." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json new file mode 100644 index 00000000000..0d11e5ecf27 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21664.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21664", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:12.940", + "lastModified": "2023-09-05T07:15:12.940", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory Corruption in Core Platform while printing the response buffer in log." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json new file mode 100644 index 00000000000..70af5369352 --- /dev/null +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21667.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-21667", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.020", + "lastModified": "2023-09-05T07:15:13.020", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22870.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22870.json index d61be65b2c7..d34eb89b0e7 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22870.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22870.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22870", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-09-05T01:15:07.360", - "lastModified": "2023-09-05T01:15:07.360", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25465.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25465.json index 226ad07d174..4b8ba66343c 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25465.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25465.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25465", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T10:15:07.940", - "lastModified": "2023-09-04T10:15:07.940", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28072.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28072.json index f43652703c4..823dd8070a5 100644 --- a/CVE-2023/CVE-2023-280xx/CVE-2023-28072.json +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28072.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28072", "sourceIdentifier": "security_alert@emc.com", "published": "2023-09-04T16:15:07.767", - "lastModified": "2023-09-04T16:15:07.767", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json new file mode 100644 index 00000000000..c001ba8e98b --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28538.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28538", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.113", + "lastModified": "2023-09-05T07:15:13.113", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WIN Product while invoking WinAcpi update driver in the UEFI region." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json new file mode 100644 index 00000000000..eff942e4bb1 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28543.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28543", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.197", + "lastModified": "2023-09-05T07:15:13.197", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A malformed DLC can trigger Memory Corruption in SNPE library due to out of bounds read, such as by loading an untrusted model (e.g. from a remote source)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json new file mode 100644 index 00000000000..dd9c243fee5 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28544.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28544", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.280", + "lastModified": "2023-09-05T07:15:13.280", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN while sending transmit command from HLOS to UTF handlers." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json new file mode 100644 index 00000000000..8a576d96d99 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28548.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28548", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.360", + "lastModified": "2023-09-05T07:15:13.360", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN HAL while processing Tx/Rx commands from QDART." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json new file mode 100644 index 00000000000..a9fa2b1a07b --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28549.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28549", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.437", + "lastModified": "2023-09-05T07:15:13.437", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN HAL while parsing Rx buffer in processing TLV payload." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json new file mode 100644 index 00000000000..0099a0ade97 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28557.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28557", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.517", + "lastModified": "2023-09-05T07:15:13.517", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN HAL while processing command parameters from untrusted WMI payload." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json new file mode 100644 index 00000000000..7c326b0c885 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28558.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28558", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.603", + "lastModified": "2023-09-05T07:15:13.603", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN handler while processing PhyID in Tx status handler." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json new file mode 100644 index 00000000000..f548f1cbd7e --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28559.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28559", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.687", + "lastModified": "2023-09-05T07:15:13.687", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN FW while processing command parameters from untrusted WMI payload." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json new file mode 100644 index 00000000000..3ace550911d --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28560.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28560", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.763", + "lastModified": "2023-09-05T07:15:13.763", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN HAL while processing devIndex from untrusted WMI payload." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json new file mode 100644 index 00000000000..45abc171a50 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28562.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28562", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.843", + "lastModified": "2023-09-05T07:15:13.843", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while handling payloads from remote ESL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json new file mode 100644 index 00000000000..5dba2951e67 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28564.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28564", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:13.923", + "lastModified": "2023-09-05T07:15:13.923", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN HAL while passing command parameters through WMI interfaces." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json new file mode 100644 index 00000000000..b199d5c19a1 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28565.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28565", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:14.000", + "lastModified": "2023-09-05T07:15:14.000", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN HAL while handling command streams through WMI interfaces." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json new file mode 100644 index 00000000000..4625ce0549b --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28567.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28567", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:14.083", + "lastModified": "2023-09-05T07:15:14.083", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN HAL while handling command through WMI interfaces." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json new file mode 100644 index 00000000000..6cbbbfd45d7 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28573.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28573", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:14.167", + "lastModified": "2023-09-05T07:15:14.167", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN HAL while parsing WMI command parameters." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json new file mode 100644 index 00000000000..bf55da173df --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28581.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28581", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:14.247", + "lastModified": "2023-09-05T07:15:14.247", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in WLAN Firmware while parsing receieved GTK Keys in GTK KDE." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json new file mode 100644 index 00000000000..7da63384ae4 --- /dev/null +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28584.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28584", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:14.323", + "lastModified": "2023-09-05T07:15:14.323", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS in WLAN Host when a mobile station receives invalid channel in CSA IE while doing channel switch announcement (CSA)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2813.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2813.json index 7806a293843..22e288ff8b9 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2813.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2813.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2813", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:08.997", - "lastModified": "2023-09-04T12:15:08.997", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29261.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29261.json index 2dcf6a03f68..744f3c12f40 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29261.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29261.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29261", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-09-05T01:15:07.783", - "lastModified": "2023-09-05T01:15:07.783", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30485.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30485.json index f7994a66c71..fd8127eb38f 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30485.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30485.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30485", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.140", - "lastModified": "2023-09-04T12:15:09.140", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30494.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30494.json index 6883f629d1b..25c544a1363 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30494.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30494.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30494", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:39.627", - "lastModified": "2023-09-04T11:15:39.627", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31220.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31220.json index 71d71e82ed9..f3eb3d25c8c 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31220.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31220.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31220", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.123", - "lastModified": "2023-09-04T11:15:40.123", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32102.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32102.json index c83e4ef408e..83c5eff6dc9 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32102.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32102.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32102", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.220", - "lastModified": "2023-09-04T12:15:09.220", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32296.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32296.json index 8d802975e1b..ff599e49e57 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32296.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32296.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32296", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.313", - "lastModified": "2023-09-04T12:15:09.313", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32338.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32338.json index 8207efccc79..27fbdf5b004 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32338.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32338.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32338", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-09-05T00:15:07.750", - "lastModified": "2023-09-05T00:15:07.750", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32578.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32578.json index e93f646f8b5..bfe130a922a 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32578.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32578.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32578", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.400", - "lastModified": "2023-09-04T12:15:09.400", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3221.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3221.json index 947d7725fb5..7a1194a4e48 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3221.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3221.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3221", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2023-09-04T13:15:32.853", - "lastModified": "2023-09-04T13:15:32.853", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3222.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3222.json index 7c2720d6c53..a5c5764a4b6 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3222.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3222.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3222", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2023-09-04T13:15:33.987", - "lastModified": "2023-09-04T13:15:33.987", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json new file mode 100644 index 00000000000..4d75658d493 --- /dev/null +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33015.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-33015", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:14.407", + "lastModified": "2023-09-05T07:15:14.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS in WLAN Firmware while interpreting MBSSID IE of a received beacon frame." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json new file mode 100644 index 00000000000..7c6219eb789 --- /dev/null +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33016.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-33016", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:14.487", + "lastModified": "2023-09-05T07:15:14.487", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS in WLAN firmware while parsing MLO (multi-link operation)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json new file mode 100644 index 00000000000..6ec50a2180d --- /dev/null +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33019.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-33019", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:14.560", + "lastModified": "2023-09-05T07:15:14.560", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS in WLAN Host while doing channel switch announcement (CSA), when a mobile station receives invalid channel in CSA IE." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json new file mode 100644 index 00000000000..f0d459abcb7 --- /dev/null +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33020.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-33020", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:14.640", + "lastModified": "2023-09-05T07:15:14.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS in WLAN Host when an invalid channel (like channel out of range) is received in STA during CSA IE." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json new file mode 100644 index 00000000000..7c29b04786e --- /dev/null +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33021.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-33021", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2023-09-05T07:15:14.717", + "lastModified": "2023-09-05T07:15:14.717", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in Graphics while processing user packets for command submission." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3499.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3499.json index da07e74f560..018572e4855 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3499.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3499.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3499", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:09.493", - "lastModified": "2023-09-04T12:15:09.493", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35892.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35892.json index f999e620885..6536411f33d 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35892.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35892.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35892", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-09-05T00:15:07.833", - "lastModified": "2023-09-05T00:15:07.833", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35906.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35906.json index 44c7b16e7f5..006b86c92d8 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35906.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35906.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35906", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-09-05T01:15:07.920", - "lastModified": "2023-09-05T01:15:07.920", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36307.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36307.json index d82a3a9cef8..b8f0cf9814c 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36307.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36307.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36307", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-05T05:15:07.983", - "lastModified": "2023-09-05T05:15:07.983", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36308.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36308.json index f78f3e535e0..4602304d14d 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36308.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36308.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36308", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-05T04:15:08.703", - "lastModified": "2023-09-05T04:15:08.703", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36382.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36382.json index e7c315c9e2f..3b4da838031 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36382.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36382.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36382", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T10:15:08.730", - "lastModified": "2023-09-04T10:15:08.730", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37393.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37393.json index 8452760b727..ecf020a2836 100644 --- a/CVE-2023/CVE-2023-373xx/CVE-2023-37393.json +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37393.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37393", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.383", - "lastModified": "2023-09-04T11:15:40.383", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json index 92f5663fd25..d01b2254ea7 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3814.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3814", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:09.570", - "lastModified": "2023-09-04T12:15:09.570", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39162.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39162.json index 4b7ecfb67e8..c30da94ca4f 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39162.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39162.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39162", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T10:15:08.913", - "lastModified": "2023-09-04T10:15:08.913", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json index 73f2376e311..da08d695f4c 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39164", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T10:15:09.097", - "lastModified": "2023-09-04T10:15:09.097", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39918.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39918.json index 885cade15a3..60ad1c13f60 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39918.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39918.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39918", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.483", - "lastModified": "2023-09-04T11:15:40.483", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39919.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39919.json index 3a171a68033..6e442f2dc22 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39919.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39919.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39919", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.627", - "lastModified": "2023-09-04T11:15:40.627", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39987.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39987.json index b054504c6d6..14397fe4699 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39987.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39987.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39987", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.737", - "lastModified": "2023-09-04T11:15:40.737", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39988.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39988.json index ffa32463c06..bf514ca785d 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39988.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39988.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39988", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.840", - "lastModified": "2023-09-04T11:15:40.840", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39991.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39991.json index 8e70e799f13..401927f62e2 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39991.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39991.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39991", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.933", - "lastModified": "2023-09-04T11:15:40.933", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json index a26560b1d0e..52abc2c39e8 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39992", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:41.030", - "lastModified": "2023-09-04T11:15:41.030", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40015.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40015.json index 7954894757e..23d98c3087f 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40015.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40015.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40015", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-04T18:15:07.880", - "lastModified": "2023-09-04T18:15:07.880", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40196.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40196.json index dc452689e39..cd263b2af11 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40196.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40196.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40196", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.647", - "lastModified": "2023-09-04T12:15:09.647", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40197.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40197.json index e3596fb4c80..de1e6f6afb3 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40197.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40197.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40197", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.737", - "lastModified": "2023-09-04T12:15:09.737", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40205.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40205.json index acca0726a72..c349d9db64f 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40205.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40205.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40205", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.823", - "lastModified": "2023-09-04T12:15:09.823", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40206.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40206.json index 3a50b796ef3..bf7a1664cb3 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40206.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40206.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40206", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:41.133", - "lastModified": "2023-09-04T11:15:41.133", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40208.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40208.json index 1db581ab658..e1add46106f 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40208.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40208.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40208", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:41.227", - "lastModified": "2023-09-04T11:15:41.227", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40214.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40214.json index 87eadbfbaca..673e4aef2e3 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40214.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40214.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40214", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.917", - "lastModified": "2023-09-04T12:15:09.917", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4019.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4019.json index 5bd9bdcbfb9..36646943d04 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4019.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4019.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4019", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.037", - "lastModified": "2023-09-04T12:15:10.037", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4059.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4059.json index 7136103e2e7..c38b53dd11f 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4059.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4059.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4059", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.110", - "lastModified": "2023-09-04T12:15:10.110", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41052.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41052.json index aeadc2d5bf0..835dfcefcb5 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41052.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41052.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41052", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-04T18:15:08.657", - "lastModified": "2023-09-04T18:15:08.657", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41054.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41054.json index 1031d264cd9..75b283db322 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41054.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41054.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41054", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-04T18:15:08.977", - "lastModified": "2023-09-04T18:15:08.977", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41055.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41055.json index 966ebe9de06..ebe5fec939f 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41055.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41055.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41055", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-04T18:15:09.203", - "lastModified": "2023-09-04T18:15:09.203", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41057.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41057.json index 9646106eb32..753e955c2d2 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41057.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41057.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41057", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-04T18:15:09.397", - "lastModified": "2023-09-04T18:15:09.397", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41058.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41058.json index 5ed7757951d..50ccb9ef93b 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41058.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41058.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41058", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-04T23:15:47.513", - "lastModified": "2023-09-04T23:15:47.513", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41908.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41908.json new file mode 100644 index 00000000000..75c713263dc --- /dev/null +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41908.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-41908", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-09-05T07:15:14.810", + "lastModified": "2023-09-05T07:15:14.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cerebrate before 1.15 lacks the Secure attribute for the session cookie." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/cerebrate-project/cerebrate/commit/9be81055651649658243b5aa274b175064bfc6db", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/cerebrate-project/cerebrate/compare/v1.14...v1.15", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json new file mode 100644 index 00000000000..6045cca5d9f --- /dev/null +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41909.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-41909", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-09-05T07:15:14.877", + "lastModified": "2023-09-05T07:15:14.877", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in FRRouting FRR through 9.0. bgp_nlri_parse_flowspec in bgpd/bgp_flowspec.c processes malformed requests with no attributes, leading to a NULL pointer dereference." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FRRouting/frr/pull/13222/commits/cfd04dcb3e689754a72507d086ba3b9709fc5ed8", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41910.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41910.json new file mode 100644 index 00000000000..e04d5536d5d --- /dev/null +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41910.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-41910", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-09-05T07:15:14.927", + "lastModified": "2023-09-05T07:15:14.927", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/lldpd/lldpd/commit/a9aeabdf879c25c584852a0bb5523837632f099b", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/lldpd/lldpd/releases/tag/1.0.17", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4151.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4151.json index 59055f6ddbf..a52fe69b68c 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4151.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4151.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4151", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.187", - "lastModified": "2023-09-04T12:15:10.187", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4216.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4216.json index 48d212fa8b9..1190015957b 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4216.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4216.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4216", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.257", - "lastModified": "2023-09-04T12:15:10.257", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4253.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4253.json index 5d744744d89..ba9d9521808 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4253.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4253.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4253", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.333", - "lastModified": "2023-09-04T12:15:10.333", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4254.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4254.json index b502a1807bc..5e90c6bcf2a 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4254.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4254.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4254", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.403", - "lastModified": "2023-09-04T12:15:10.403", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4269.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4269.json index 5d4c5ef4947..88b38fe6229 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4269.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4269.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4269", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.470", - "lastModified": "2023-09-04T12:15:10.470", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4279.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4279.json index 6fec3ff2e5a..6b96d592205 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4279.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4279.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4279", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.547", - "lastModified": "2023-09-04T12:15:10.547", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4284.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4284.json index f4906ff2455..a5c3efb10b6 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4284.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4284.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4284", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.627", - "lastModified": "2023-09-04T12:15:10.627", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4298.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4298.json index 16955f81fb1..c6da8474748 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4298.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4298.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4298", "sourceIdentifier": "contact@wpscan.com", "published": "2023-09-04T12:15:10.693", - "lastModified": "2023-09-04T12:15:10.693", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4587.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4587.json index 9d04f736020..4cb42d30222 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4587.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4587.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4587", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2023-09-04T12:15:10.760", - "lastModified": "2023-09-04T12:15:10.760", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4613.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4613.json index c6a4b38adda..7dbbc1f2833 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4613.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4613.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4613", "sourceIdentifier": "product.security@lge.com", "published": "2023-09-04T09:15:07.510", - "lastModified": "2023-09-04T11:15:41.360", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4614.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4614.json index 769552d7f33..ca4f22720c4 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4614.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4614.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4614", "sourceIdentifier": "product.security@lge.com", "published": "2023-09-04T11:15:41.560", - "lastModified": "2023-09-04T11:15:41.560", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4615.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4615.json index 3bbab81e175..f864129b40c 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4615.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4615.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4615", "sourceIdentifier": "product.security@lge.com", "published": "2023-09-04T11:15:41.657", - "lastModified": "2023-09-04T11:15:41.657", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4616.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4616.json index 827e9fc3896..aeb0c7375eb 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4616.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4616.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4616", "sourceIdentifier": "product.security@lge.com", "published": "2023-09-04T11:15:41.747", - "lastModified": "2023-09-04T11:15:41.747", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4636.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4636.json index 6689fd2f72d..8d422a6c297 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4636.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4636.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4636", "sourceIdentifier": "security@wordfence.com", "published": "2023-09-05T03:15:12.293", - "lastModified": "2023-09-05T03:15:12.293", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json index 779911c7ad0..1f52cf67c5f 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4733.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4733", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-04T14:15:07.563", - "lastModified": "2023-09-04T14:15:07.563", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json new file mode 100644 index 00000000000..ed1ab2f14b4 --- /dev/null +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-4748", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-09-05T06:15:07.760", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Yongyou UFIDA-NC up to 20230807. This issue affects some unknown processing of the file PrintTemplateFileServlet.java. The manipulation of the argument filePath leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-238637 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/houseoforange/mybugs/blob/main/Yongyou-UFIDA-NC-Arbitrary-File-Read.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.238637", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.238637", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json index 80358600153..2944c787629 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4750.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4750", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-04T14:15:08.263", - "lastModified": "2023-09-04T14:15:08.263", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json index 0f615c0ee10..7ab243c54aa 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4752.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4752", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-04T14:15:08.450", - "lastModified": "2023-09-04T14:15:08.450", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4754.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4754.json index 29b547cc0cb..6610335c749 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4754.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4754.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4754", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-04T09:15:07.897", - "lastModified": "2023-09-04T09:15:07.897", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4755.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4755.json index e284783739d..52f836ad2b8 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4755.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4755.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4755", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-04T14:15:08.593", - "lastModified": "2023-09-04T14:15:08.593", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4756.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4756.json index 783fd08e977..a35069c3b6c 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4756.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4756.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4756", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-04T09:15:07.990", - "lastModified": "2023-09-04T09:15:07.990", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4758.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4758.json index 0deccee1d08..490406f6e79 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4758.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4758.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4758", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-04T16:15:08.143", - "lastModified": "2023-09-04T16:15:08.143", - "vulnStatus": "Received", + "lastModified": "2023-09-05T06:50:39.603", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 648ec0dfde8..e97b23bcdcd 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-05T06:00:25.814920+00:00 +2023-09-05T08:00:25.999709+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-05T05:15:07.983000+00:00 +2023-09-05T07:15:14.927000+00:00 ``` ### Last Data Feed Release @@ -29,27 +29,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -224142 +224181 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `39` -* [CVE-2023-36308](CVE-2023/CVE-2023-363xx/CVE-2023-36308.json) (`2023-09-05T04:15:08.703`) -* [CVE-2023-40936](CVE-2023/CVE-2023-409xx/CVE-2023-40936.json) (`2023-09-05T04:15:09.200`) -* [CVE-2023-40937](CVE-2023/CVE-2023-409xx/CVE-2023-40937.json) (`2023-09-05T04:15:09.260`) -* [CVE-2023-36307](CVE-2023/CVE-2023-363xx/CVE-2023-36307.json) (`2023-09-05T05:15:07.983`) +* [CVE-2023-21667](CVE-2023/CVE-2023-216xx/CVE-2023-21667.json) (`2023-09-05T07:15:13.020`) +* [CVE-2023-28538](CVE-2023/CVE-2023-285xx/CVE-2023-28538.json) (`2023-09-05T07:15:13.113`) +* [CVE-2023-28543](CVE-2023/CVE-2023-285xx/CVE-2023-28543.json) (`2023-09-05T07:15:13.197`) +* [CVE-2023-28544](CVE-2023/CVE-2023-285xx/CVE-2023-28544.json) (`2023-09-05T07:15:13.280`) +* [CVE-2023-28548](CVE-2023/CVE-2023-285xx/CVE-2023-28548.json) (`2023-09-05T07:15:13.360`) +* [CVE-2023-28549](CVE-2023/CVE-2023-285xx/CVE-2023-28549.json) (`2023-09-05T07:15:13.437`) +* [CVE-2023-28557](CVE-2023/CVE-2023-285xx/CVE-2023-28557.json) (`2023-09-05T07:15:13.517`) +* [CVE-2023-28558](CVE-2023/CVE-2023-285xx/CVE-2023-28558.json) (`2023-09-05T07:15:13.603`) +* [CVE-2023-28559](CVE-2023/CVE-2023-285xx/CVE-2023-28559.json) (`2023-09-05T07:15:13.687`) +* [CVE-2023-28560](CVE-2023/CVE-2023-285xx/CVE-2023-28560.json) (`2023-09-05T07:15:13.763`) +* [CVE-2023-28562](CVE-2023/CVE-2023-285xx/CVE-2023-28562.json) (`2023-09-05T07:15:13.843`) +* [CVE-2023-28564](CVE-2023/CVE-2023-285xx/CVE-2023-28564.json) (`2023-09-05T07:15:13.923`) +* [CVE-2023-28565](CVE-2023/CVE-2023-285xx/CVE-2023-28565.json) (`2023-09-05T07:15:14.000`) +* [CVE-2023-28567](CVE-2023/CVE-2023-285xx/CVE-2023-28567.json) (`2023-09-05T07:15:14.083`) +* [CVE-2023-28573](CVE-2023/CVE-2023-285xx/CVE-2023-28573.json) (`2023-09-05T07:15:14.167`) +* [CVE-2023-28581](CVE-2023/CVE-2023-285xx/CVE-2023-28581.json) (`2023-09-05T07:15:14.247`) +* [CVE-2023-28584](CVE-2023/CVE-2023-285xx/CVE-2023-28584.json) (`2023-09-05T07:15:14.323`) +* [CVE-2023-33015](CVE-2023/CVE-2023-330xx/CVE-2023-33015.json) (`2023-09-05T07:15:14.407`) +* [CVE-2023-33016](CVE-2023/CVE-2023-330xx/CVE-2023-33016.json) (`2023-09-05T07:15:14.487`) +* [CVE-2023-33019](CVE-2023/CVE-2023-330xx/CVE-2023-33019.json) (`2023-09-05T07:15:14.560`) +* [CVE-2023-33020](CVE-2023/CVE-2023-330xx/CVE-2023-33020.json) (`2023-09-05T07:15:14.640`) +* [CVE-2023-33021](CVE-2023/CVE-2023-330xx/CVE-2023-33021.json) (`2023-09-05T07:15:14.717`) +* [CVE-2023-41908](CVE-2023/CVE-2023-419xx/CVE-2023-41908.json) (`2023-09-05T07:15:14.810`) +* [CVE-2023-41909](CVE-2023/CVE-2023-419xx/CVE-2023-41909.json) (`2023-09-05T07:15:14.877`) +* [CVE-2023-41910](CVE-2023/CVE-2023-419xx/CVE-2023-41910.json) (`2023-09-05T07:15:14.927`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `66` -* [CVE-2019-13473](CVE-2019/CVE-2019-134xx/CVE-2019-13473.json) (`2023-09-05T05:15:07.517`) -* [CVE-2019-13474](CVE-2019/CVE-2019-134xx/CVE-2019-13474.json) (`2023-09-05T05:15:07.703`) -* [CVE-2022-48554](CVE-2022/CVE-2022-485xx/CVE-2022-48554.json) (`2023-09-05T05:15:07.883`) -* [CVE-2023-38199](CVE-2023/CVE-2023-381xx/CVE-2023-38199.json) (`2023-09-05T04:15:09.017`) +* [CVE-2023-4284](CVE-2023/CVE-2023-42xx/CVE-2023-4284.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-4298](CVE-2023/CVE-2023-42xx/CVE-2023-4298.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-4587](CVE-2023/CVE-2023-45xx/CVE-2023-4587.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-3221](CVE-2023/CVE-2023-32xx/CVE-2023-3221.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-3222](CVE-2023/CVE-2023-32xx/CVE-2023-3222.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-4733](CVE-2023/CVE-2023-47xx/CVE-2023-4733.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-4750](CVE-2023/CVE-2023-47xx/CVE-2023-4750.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-4752](CVE-2023/CVE-2023-47xx/CVE-2023-4752.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-4755](CVE-2023/CVE-2023-47xx/CVE-2023-4755.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-28072](CVE-2023/CVE-2023-280xx/CVE-2023-28072.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-4758](CVE-2023/CVE-2023-47xx/CVE-2023-4758.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-40015](CVE-2023/CVE-2023-400xx/CVE-2023-40015.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-41052](CVE-2023/CVE-2023-410xx/CVE-2023-41052.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-41054](CVE-2023/CVE-2023-410xx/CVE-2023-41054.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-41055](CVE-2023/CVE-2023-410xx/CVE-2023-41055.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-41057](CVE-2023/CVE-2023-410xx/CVE-2023-41057.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-41058](CVE-2023/CVE-2023-410xx/CVE-2023-41058.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-32338](CVE-2023/CVE-2023-323xx/CVE-2023-32338.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-35892](CVE-2023/CVE-2023-358xx/CVE-2023-35892.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-22870](CVE-2023/CVE-2023-228xx/CVE-2023-22870.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-29261](CVE-2023/CVE-2023-292xx/CVE-2023-29261.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-35906](CVE-2023/CVE-2023-359xx/CVE-2023-35906.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-4636](CVE-2023/CVE-2023-46xx/CVE-2023-4636.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-36308](CVE-2023/CVE-2023-363xx/CVE-2023-36308.json) (`2023-09-05T06:50:39.603`) +* [CVE-2023-36307](CVE-2023/CVE-2023-363xx/CVE-2023-36307.json) (`2023-09-05T06:50:39.603`) ## Download and Usage