diff --git a/CVE-2013/CVE-2013-62xx/CVE-2013-6282.json b/CVE-2013/CVE-2013-62xx/CVE-2013-6282.json index 3a960eb16a1..4d88687f4f6 100644 --- a/CVE-2013/CVE-2013-62xx/CVE-2013-6282.json +++ b/CVE-2013/CVE-2013-62xx/CVE-2013-6282.json @@ -2,8 +2,8 @@ "id": "CVE-2013-6282", "sourceIdentifier": "cve@mitre.org", "published": "2013-11-20T13:19:43.023", - "lastModified": "2023-11-07T02:17:08.677", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:50:46.903", + "vulnStatus": "Analyzed", "evaluatorComment": "AV:L per https://www.codeaurora.org/projects/security-advisories/missing-access-checks-putusergetuser-kernel-api-cve-2013-6282", "cisaExploitAdd": "2022-09-15", "cisaActionDue": "2022-10-06", @@ -68,938 +68,22 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.5.4", - "matchCriteriaId": "2ED34215-DC52-40DF-8677-95AE9E869EE8" + "versionEndExcluding": "3.2.54", + "matchCriteriaId": "331E4B5F-B942-476E-95A1-C1DABD2E35F3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", - "matchCriteriaId": "D30AEC07-3CBD-4F4F-9646-BEAA1D98750B" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "3.4.12", + "matchCriteriaId": "BF770FE2-4B36-4697-9720-EBE0353241A7" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", - "matchCriteriaId": "C2AA8E68-691B-499C-AEDD-3C0BFFE70044" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", - "matchCriteriaId": "9440475B-5960-4066-A204-F30AAFC87846" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", - "matchCriteriaId": "53BCFBFB-6AF0-4525-8623-7633CC5E17DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", - "matchCriteriaId": "6ED4E86A-74F0-436A-BEB4-3F4EE93A5421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", - "matchCriteriaId": "BF0365B0-8E16-4F30-BD92-5DD538CC8135" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", - "matchCriteriaId": "079505E8-2942-4C33-93D1-35ADA4C39E72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "38989541-2360-4E0A-AE5A-3D6144AA6114" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "4E51646B-7A0E-40F3-B8C9-239C1DA81DD1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "42A8A507-F8E2-491C-A144-B2448A1DB26E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "901FC6F3-2C2A-4112-AE27-AB102BBE8DEE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "203AD334-DB9F-41B0-A4D1-A6C158EF8C40" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", - "matchCriteriaId": "B3611753-E440-410F-8250-600C996A4B8E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", - "matchCriteriaId": "9739BB47-EEAF-42F1-A557-2AE2EA9526A3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", - "matchCriteriaId": "5A95E3BB-0AFC-4C2E-B9BE-C975E902A266" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", - "matchCriteriaId": "482A6C9A-9B8E-4D1C-917A-F16370745E7C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "C6D87357-63E0-41D0-9F02-1BCBF9A77E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", - "matchCriteriaId": "3765A2D6-2D78-4FB1-989E-D5106BFA3F5E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F54257DB-7023-43C4-AC4D-9590B815CD92" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61FF5FCD-A4A1-4803-AC53-320A4C838AF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", - "matchCriteriaId": "9F096553-064F-46A2-877B-F32F163A0F49" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", - "matchCriteriaId": "C0D762D1-E3AD-40EA-8D39-83EEB51B5E85" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", - "matchCriteriaId": "A6187D19-7148-4B87-AD7E-244FF9EE0FA6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", - "matchCriteriaId": "99AC64C2-E391-485C-9CD7-BA09C8FA5E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", - "matchCriteriaId": "8CDA5E95-7805-441B-BEF7-4448EA45E964" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", - "matchCriteriaId": "51561053-6C28-4F38-BC9B-3F7A7508EB72" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", - "matchCriteriaId": "118F4A5B-C498-4FC3-BE28-50D18EBE4F22" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", - "matchCriteriaId": "BD38EBE6-FE1A-4B55-9FB5-07952253B7A5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", - "matchCriteriaId": "3A491E47-82AD-4055-9444-2EC0D6715326" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", - "matchCriteriaId": "13C5FD16-23B6-467F-9438-5B554922F974" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", - "matchCriteriaId": "9C67235F-5B51-4BF7-89EC-4810F720246F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", - "matchCriteriaId": "08405DEF-05F4-45F0-AC95-DBF914A36D93" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", - "matchCriteriaId": "1A7B9C4B-4A41-4175-9F07-191C1EE98C1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", - "matchCriteriaId": "B306E0A8-4D4A-4895-8128-A500D30A7E0C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", - "matchCriteriaId": "295C839A-F34E-4853-A926-55EABC639412" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", - "matchCriteriaId": "2AFD5F49-7EF9-4CFE-95BD-8FD19B500B0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", - "matchCriteriaId": "00B3DDDD-B2F6-4753-BA38-65A24017857D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", - "matchCriteriaId": "33FCD39E-F4BF-432D-9CF9-F195CF5844F3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", - "matchCriteriaId": "C7308690-CB0D-4758-B80F-D2ADCD2A9D66" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", - "matchCriteriaId": "313A470B-8A2B-478A-82B5-B27D2718331C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", - "matchCriteriaId": "83FF021E-07E3-41CC-AAE8-D99D7FF24B9D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", - "matchCriteriaId": "F72412E3-8DA9-4CC9-A426-B534202ADBA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", - "matchCriteriaId": "FCAA9D7A-3C3E-4C0B-9D38-EA80E68C2E46" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", - "matchCriteriaId": "4A9E3AE5-3FCF-4CBB-A30B-082BCFBFB0CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", - "matchCriteriaId": "CF715657-4C3A-4392-B85D-1BBF4DE45D89" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", - "matchCriteriaId": "4B63C618-AC3D-4EF7-AFDF-27B9BF482B78" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", - "matchCriteriaId": "C33DA5A9-5E40-4365-9602-82FB4DCD15B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", - "matchCriteriaId": "EFAFDB74-40BD-46FA-89AC-617EB2C7160B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", - "matchCriteriaId": "CF5F17DA-30A7-40CF-BD7C-CEDF06D64617" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", - "matchCriteriaId": "71A276F5-BD9D-4C1B-90DF-9B0C15B6F7DF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", - "matchCriteriaId": "F8F6EBEC-3C29-444B-BB85-6EF239B59EC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB91302-FD18-44CF-A8A8-B31483328539" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*", - "matchCriteriaId": "9B81DC2B-46FA-4640-AD6C-2A404D94BA0B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*", - "matchCriteriaId": "BA6A1663-BC4C-4FC9-B5EB-A52EDED17B26" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*", - "matchCriteriaId": "69C33D6C-6B9F-49F4-B505-E7B589CDEC50" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*", - "matchCriteriaId": "C464796B-2F31-4159-A132-82A0C74137B7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*", - "matchCriteriaId": "1D6C6E46-FE29-4D2D-A0EC-43DA5112BCC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*", - "matchCriteriaId": "1A370E91-73A1-4D62-8E7B-696B920203F8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*", - "matchCriteriaId": "340197CD-9645-4B7E-B976-F3F5A7D4C5BE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*", - "matchCriteriaId": "96030636-0C4A-4A10-B768-525D6A0E18CB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*", - "matchCriteriaId": "A42D8419-914F-4AD6-B0E9-C1290D514FF1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*", - "matchCriteriaId": "F4E2C88B-42EA-4F4F-B1F6-A9332EC6888B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*", - "matchCriteriaId": "2449D13B-3314-4182-832F-03F6B11AA31F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*", - "matchCriteriaId": "9A35B66C-F050-4462-A58E-FEE061B5582E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*", - "matchCriteriaId": "1B551164-0167-49BB-A3AE-4034BDA3DCB4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*", - "matchCriteriaId": "7244278E-49B6-4405-A14C-F3540C8F5AF8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*", - "matchCriteriaId": "B4C3E4B8-7274-4ABB-B7CE-6A39C183CE18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*", - "matchCriteriaId": "6501EDB9-4847-47F8-90EE-B295626E4CDC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*", - "matchCriteriaId": "2D676D48-7521-45E2-8563-6B966FF86A35" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*", - "matchCriteriaId": "3B69FA17-0AB9-4986-A5A7-2A4C1DD24222" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*", - "matchCriteriaId": "7BC35593-96C7-41F0-B738-1568F8129121" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*", - "matchCriteriaId": "38D23794-0E7C-4FA5-A7A8-CF940E3FA962" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*", - "matchCriteriaId": "008E1E7D-4C20-4560-9288-EF532ADB0029" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*", - "matchCriteriaId": "3B3A7044-A92E-47A9-A7BD-35E5B575F5FD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*", - "matchCriteriaId": "783E2980-B6AB-489E-B157-B6A2E10A32CA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DFFE5A6-6A67-4992-84A3-C0F05FACDEAD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", - "matchCriteriaId": "13BBD2A3-AE10-48B9-8776-4FB1CAC37D44" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", - "matchCriteriaId": "B25680CC-8918-4F27-8D7E-A6579215450B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", - "matchCriteriaId": "92C48B4C-410C-4BA8-A28A-B2E928320FCC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", - "matchCriteriaId": "CB447523-855B-461E-8197-95169BE86EB0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B155BBDF-6DF6-4FF5-9C41-D8A5266DCC67" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "28476DEC-9630-4B40-9D4D-9BC151DC4CA4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "5646880A-2355-4BDD-89E7-825863A0311F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", - "matchCriteriaId": "7FF99148-267A-46F8-9927-A9082269BAF6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", - "matchCriteriaId": "A783C083-5D9C-48F9-B5A6-A97A9604FB19" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2B817A24-03AC-46CD-BEFA-505457FD2A5D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", - "matchCriteriaId": "51CF1BCE-090E-4B70-BA16-ACB74411293B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "187AAD67-10D7-4B57-B4C6-00443E246AF3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", - "matchCriteriaId": "F341CE88-C5BC-4CDD-9CB5-B6BAD7152E63" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", - "matchCriteriaId": "37ACE2A6-C229-4236-8E9F-235F008F3AA0" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D3220B70-917F-4F9F-8A3B-2BF581281E8D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", - "matchCriteriaId": "99372D07-C06A-41FA-9843-6D57F99AB5AF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", - "matchCriteriaId": "2B9DC110-D260-4DB4-B8B0-EF1D160ADA07" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", - "matchCriteriaId": "6192FE84-4D53-40D4-AF61-78CE7136141A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", - "matchCriteriaId": "42FEF3CF-1302-45EB-89CC-3786FE4BAC1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", - "matchCriteriaId": "AE6A6B58-2C89-4DE4-BA57-78100818095C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", - "matchCriteriaId": "1D467F87-2F13-4D26-9A93-E0BA526FEA24" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", - "matchCriteriaId": "FE348F7B-02DE-47D5-8011-F83DA9426021" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "E91594EA-F0A3-41B3-A9C6-F7864FC2F229" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9E1ECCDB-0208-48F6-B44F-16CC0ECE3503" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA8B5DE-372E-47E0-A0F6-BE286D509CC3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9A1CA083-2CF8-45AE-9E15-1AA3A8352E3B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", - "matchCriteriaId": "19D69A49-5290-4C5F-8157-719AD58D253D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", - "matchCriteriaId": "290BD969-42E7-47B0-B21B-06DE4865432C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", - "matchCriteriaId": "23A9E29E-DE78-4C73-9FBD-C2410F5FC8B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", - "matchCriteriaId": "018434C9-E75F-45CB-A169-DAB4B1D864D7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", - "matchCriteriaId": "DC0AC68F-EC58-4C4F-8CBC-A59ECC00CCDE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", - "matchCriteriaId": "C123C844-F6D7-471E-A62E-F756042FB1CD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", - "matchCriteriaId": "A11C38BB-7FA2-49B0-AAC9-83DB387A06DB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", - "matchCriteriaId": "61F3733C-E5F6-4855-B471-DF3FB823613B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", - "matchCriteriaId": "1DDCA75F-9A06-4457-9A45-38A38E7F7086" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", - "matchCriteriaId": "7AEA837E-7864-4003-8DB7-111ED710A7E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FE471F-2D1F-4A1D-A197-7E46B75787E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", - "matchCriteriaId": "FDA9E6AB-58DC-4EC5-A25C-11F9D0B38BF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "DC6B8DB3-B05B-41A2-B091-342D66AAE8F5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", - "matchCriteriaId": "958F0FF8-33EF-4A71-A0BD-572C85211DBA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA39F48-B02F-4C48-B304-DA9CCA055244" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", - "matchCriteriaId": "1FF841F3-48A7-41D7-9C45-A8170435A5EB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", - "matchCriteriaId": "EF506916-A6DC-4B1E-90E5-959492AF55F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", - "matchCriteriaId": "B3CDAD1F-2C6A-48C0-8FAB-C2659373FA25" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", - "matchCriteriaId": "4FFE4B22-C96A-43D0-B993-F51EDD9C5E0E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", - "matchCriteriaId": "F571CC8B-B212-4553-B463-1DB01D616E8A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", - "matchCriteriaId": "84E3E151-D437-48ED-A529-731EEFF88567" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", - "matchCriteriaId": "E9E3EA3C-CCA5-4433-86E0-3D02C4757A0A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", - "matchCriteriaId": "F7AC4F7D-9FA6-4CF1-B2E9-70BF7D4D177C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", - "matchCriteriaId": "3CE3A80D-9648-43CC-8F99-D741ED6552BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", - "matchCriteriaId": "C8A98C03-A465-41B4-A551-A26FEC7FFD94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", - "matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", - "matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", - "matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", - "matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", - "matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", - "matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", - "matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", - "matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "916E97D4-1FAB-42F5-826B-653B1C0909A8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", - "matchCriteriaId": "33FD2217-C5D0-48C1-AD74-3527127FEF9C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", - "matchCriteriaId": "2E92971F-B629-4E0A-9A50-8B235F9704B8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", - "matchCriteriaId": "EDD3A069-3829-4EE2-9D5A-29459F29D4C1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", - "matchCriteriaId": "A4A0964C-CEB2-41D7-A69C-1599B05B6171" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "0F960FA6-F904-4A4E-B483-44C70090E9A1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", - "matchCriteriaId": "261C1B41-C9E0-414F-8368-51C0C0B8AD38" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", - "matchCriteriaId": "5CCA261D-2B97-492F-89A0-5F209A804350" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", - "matchCriteriaId": "1B1C0C68-9194-473F-BE5E-EC7F184899FA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", - "matchCriteriaId": "D7A6AC9E-BEA6-44B0-B3B3-F0F94E32424A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", - "matchCriteriaId": "16038328-9399-4B85-B777-BA4757D02C9B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", - "matchCriteriaId": "16CA2757-FA8D-43D9-96E8-D3C0EB6E1DEF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", - "matchCriteriaId": "E8CB5481-5EAE-401E-BD7E-D3095CCA9E94" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A0F36FAC-141D-476D-84C5-A558C199F904" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "51D64824-25F6-4761-BD6A-29038A143744" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "E284C8A1-740F-454D-A774-99CD3A21B594" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C70D72AE-0CBF-4324-9935-57E28EC6279C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "F674B06B-7E86-4E41-9126-8152D0DDABAE" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7039B3EC-8B22-413E-B582-B4BEC6181241" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "35CF1DD2-80B9-4476-8963-5C3EF52B33F4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "BFB0B05B-A5CE-4B9C-AE7F-83062868D35B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "D166A66E-7454-47EC-BB56-861A9AFEAFE1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "7DA94F50-2A62-4300-BF4D-A342AAE35629" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "252D937B-50DC-444F-AE73-5FCF6203DF27" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "F6D8EE51-02C1-47BC-A92C-0A8ABEFD28FF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", - "matchCriteriaId": "7F20A5D7-3B38-4911-861A-04C8310D5916" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", - "matchCriteriaId": "D472DE3A-71D8-4F40-9DDE-85929A2B047D" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", - "matchCriteriaId": "B2AED943-65A8-4FDB-BBD0-CCEF8682A48C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", - "matchCriteriaId": "D4640185-F3D8-4575-A71D-4C889A93DE2C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", - "matchCriteriaId": "144CCF7C-025E-4879-B2E7-ABB8E4390BE5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", - "matchCriteriaId": "B6FAA052-0B2B-40CE-8C98-919B8D08A5ED" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", - "matchCriteriaId": "4B5A53DE-9C83-4A6B-96F3-23C03BF445D9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", - "matchCriteriaId": "063EB879-CB05-4E33-AA90-9E43516839B5" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", - "matchCriteriaId": "2D25764F-4B02-4C65-954E-8C7D6632DE00" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", - "matchCriteriaId": "F31F5BF3-CD0A-465C-857F-273841BCD28A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", - "matchCriteriaId": "FF302C8A-079B-42B9-B455-CD9083BFA067" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", - "matchCriteriaId": "744999C0-33D3-4363-B3DB-E0D02CDD3918" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*", - "matchCriteriaId": "C2E77A76-2A60-45D8-9337-867BC22C5110" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*", - "matchCriteriaId": "C9F4AAE7-C870-46B7-B559-2949737BE777" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*", - "matchCriteriaId": "20FA2824-20B0-48B8-BB0A-4904C1D3E8AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*", - "matchCriteriaId": "9F9B347E-61AC-419F-9701-B862BBFA46F2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*", - "matchCriteriaId": "989F351C-8B7C-4C1B-AFA2-AE9431576368" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*", - "matchCriteriaId": "8D22172A-9FA7-42E0-8451-165D8E47A573" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*", - "matchCriteriaId": "CE31624C-94F9-45D8-9B4A-D0028F10602F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*", - "matchCriteriaId": "70967A83-28F6-4568-9ADA-6EF232E5BBC2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", - "matchCriteriaId": "962B0C45-AB29-4383-AC16-C6E8245D0FF7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "A0EE126B-74B2-4F79-BFE1-3DC169F3F9B2" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "392075E0-A9C7-4B4A-90F9-7F1ADFF5EFA7" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "3.5.5", + "matchCriteriaId": "FB59718F-6C77-44D9-AFB1-301715460C53" } ] } @@ -1009,7 +93,10 @@ "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8404663f81d212918ff85f493649a7991209fa04", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "http://www.codeaurora.org/projects/security-advisories/missing-access-checks-putusergetuser-kernel-api-cve-2013-6282", @@ -1020,19 +107,34 @@ }, { "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/11/14/11", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.securityfocus.com/bid/63734", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.ubuntu.com/usn/USN-2067-1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/torvalds/linux/commit/8404663f81d212918ff85f493649a7991209fa04", @@ -1044,7 +146,12 @@ }, { "url": "https://www.exploit-db.com/exploits/40975/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json index 7f3e5391cdc..bfdd1a30c7d 100644 --- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json +++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125070", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-08T18:15:09.917", - "lastModified": "2023-11-07T02:18:40.653", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:15:51.697", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { @@ -124,8 +124,7 @@ "url": "https://github.com/yanheven/console/commit/ba908ae88d5925f4f6783eb234cc4ea95017472b", "source": "cna@vuldb.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json index 5b134cf942f..56947ffedb5 100644 --- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json +++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125072", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-09T22:15:09.873", - "lastModified": "2023-11-07T02:18:41.083", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:32:23.447", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,23 +17,23 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.8, + "baseScore": 8.8, "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.8, + "exploitabilityScore": 2.8, "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { @@ -114,8 +114,7 @@ "url": "https://github.com/CherishSin/klattr/commit/f8e4ecfbb83aef577011b0b4aebe96fb6ec557f1", "source": "cna@vuldb.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json index 757976395f7..4088f9970b0 100644 --- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json +++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125073", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-10T16:15:10.657", - "lastModified": "2023-11-07T02:18:41.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:13:10.693", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json index b590b3a3b1b..7faa123b21c 100644 --- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json +++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125076", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-11T19:15:09.160", - "lastModified": "2023-11-07T02:18:42.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:40:13.590", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { @@ -113,8 +113,7 @@ "url": "https://github.com/NoxxieNl/Criminals/commit/0a60b31271d4cbf8babe4be993d2a3a1617f0897", "source": "cna@vuldb.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -129,7 +128,6 @@ "url": "https://vuldb.com/?id.218022", "source": "cna@vuldb.com", "tags": [ - "Permissions Required", "Third Party Advisory" ] } diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json index 6ddaaf378bd..15887bab979 100644 --- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json +++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125077", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-15T09:15:13.613", - "lastModified": "2023-11-07T02:18:42.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:16:54.423", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { @@ -114,8 +114,7 @@ "url": "https://github.com/pointhi/searx_stats/commit/281bd679a4474ddb222d16c1c380f252839cc18f", "source": "cna@vuldb.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -130,7 +129,6 @@ "url": "https://vuldb.com/?id.218351", "source": "cna@vuldb.com", "tags": [ - "Permissions Required", "Third Party Advisory" ] } diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json index de5277ff5a8..d2684326685 100644 --- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json +++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125078", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-15T09:15:13.693", - "lastModified": "2023-11-07T02:18:42.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:25:22.460", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { @@ -114,8 +114,7 @@ "url": "https://github.com/yanheven/console/commit/32a7b713468161282f2ea01d5e2faff980d924cd", "source": "cna@vuldb.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -130,7 +129,6 @@ "url": "https://vuldb.com/?id.218354", "source": "cna@vuldb.com", "tags": [ - "Permissions Required", "Third Party Advisory" ] } diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json index c0fbfa392a3..ed31329b72c 100644 --- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json +++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125080", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-16T18:15:10.147", - "lastModified": "2023-11-07T02:18:43.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:14:31.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { @@ -114,8 +114,7 @@ "url": "https://github.com/frontaccounting/faplanet/commit/a5dcd87f46080a624b1a9ad4b0dd035bbd24ac50", "source": "cna@vuldb.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -130,7 +129,6 @@ "url": "https://vuldb.com/?id.218398", "source": "cna@vuldb.com", "tags": [ - "Permissions Required", "Third Party Advisory" ] } diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json index f27acfb93b2..ecd2ec7fbd9 100644 --- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json +++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125083", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-19T10:15:11.490", - "lastModified": "2023-11-07T02:18:43.773", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:38:53.043", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { @@ -114,8 +114,7 @@ "url": "https://github.com/AnantLabs/google-enterprise-connector-dctm/commit/6fba04f18ab7764002a1da308e7cd9712b501cb7", "source": "cna@vuldb.com", "tags": [ - "Patch", - "Third Party Advisory" + "Patch" ] }, { @@ -130,7 +129,6 @@ "url": "https://vuldb.com/?id.218911", "source": "cna@vuldb.com", "tags": [ - "Permissions Required", "Third Party Advisory" ] } diff --git a/CVE-2022/CVE-2022-213xx/CVE-2022-21366.json b/CVE-2022/CVE-2022-213xx/CVE-2022-21366.json index 16d027bf7b0..6c8a74a439b 100644 --- a/CVE-2022/CVE-2022-213xx/CVE-2022-21366.json +++ b/CVE-2022/CVE-2022-213xx/CVE-2022-21366.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21366", "sourceIdentifier": "secalert_us@oracle.com", "published": "2022-01-19T12:15:15.817", - "lastModified": "2023-09-08T00:15:09.733", - "vulnStatus": "Modified", + "lastModified": "2023-12-08T20:43:37.697", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -129,8 +129,23 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*", - "matchCriteriaId": "26FCA75B-4282-4E0F-95B4-640A82C8E91C" + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", + "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0F202E8-97E6-4BBB-A0B6-4CA3F5803C08" }, { "vulnerable": true, @@ -164,6 +179,11 @@ "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*", + "matchCriteriaId": "82E94B87-065E-475F-815C-F49978CE22FC" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*", diff --git a/CVE-2022/CVE-2022-370xx/CVE-2022-37050.json b/CVE-2022/CVE-2022-370xx/CVE-2022-37050.json index 1be36cd7496..5cf87a81a9e 100644 --- a/CVE-2022/CVE-2022-370xx/CVE-2022-37050.json +++ b/CVE-2022/CVE-2022-370xx/CVE-2022-37050.json @@ -2,8 +2,8 @@ "id": "CVE-2022-37050", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:23.657", - "lastModified": "2023-10-16T14:15:10.370", - "vulnStatus": "Modified", + "lastModified": "2023-12-08T20:57:31.813", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -61,6 +61,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ @@ -81,7 +96,11 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00022.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-370xx/CVE-2022-37051.json b/CVE-2022/CVE-2022-370xx/CVE-2022-37051.json index 7231582fceb..5784314c181 100644 --- a/CVE-2022/CVE-2022-370xx/CVE-2022-37051.json +++ b/CVE-2022/CVE-2022-370xx/CVE-2022-37051.json @@ -2,8 +2,8 @@ "id": "CVE-2022-37051", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:23.733", - "lastModified": "2023-10-16T14:15:10.450", - "vulnStatus": "Modified", + "lastModified": "2023-12-08T20:53:44.443", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -61,6 +61,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] } ], "references": [ @@ -81,7 +96,11 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00022.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1380.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1380.json index ae78516d9f4..01ceb620fa0 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1380.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1380.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1380", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-27T21:15:10.623", - "lastModified": "2023-11-07T04:03:23.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:45:02.020", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,7 +46,7 @@ ] }, { - "source": "53f830b8-0a3f-465b-8143-3b8a9948e749", + "source": "secalert@redhat.com", "type": "Secondary", "description": [ { @@ -310,6 +310,61 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" + } + ] + } + ] } ], "references": [ @@ -323,7 +378,11 @@ }, { "url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177883", @@ -337,15 +396,26 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230511-0001/", @@ -356,7 +426,10 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5480", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2023/03/14/1", diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2002.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2002.json index bf457947823..8e57615655b 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2002.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2002.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2002", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-26T17:15:14.113", - "lastModified": "2023-10-20T00:15:12.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T20:48:30.057", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -72,20 +72,51 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + } + ] + } + ] } ], "references": [ { "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5480", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2023/04/16/3", diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3138.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3138.json index c98c93967c6..89954afa866 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3138.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3138.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3138", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-28T21:15:10.247", - "lastModified": "2023-07-07T13:05:46.457", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-08T19:15:07.580", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -124,6 +124,10 @@ "Mailing List", "Patch" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0008/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34969.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34969.json index 9fce1d75c90..691cf0792a4 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34969.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34969.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34969", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-08T03:15:08.970", - "lastModified": "2023-11-15T03:26:56.447", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-08T19:15:07.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -140,6 +140,10 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0007/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35668.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35668.json index 0d0ddfe5820..06ad5eba23a 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35668.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35668.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35668", "sourceIdentifier": "security@android.com", "published": "2023-12-04T23:15:23.460", - "lastModified": "2023-12-08T17:47:02.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T19:01:04.863", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-610" + "value": "NVD-CWE-Other" } ] } diff --git a/CVE-2023/CVE-2023-414xx/CVE-2023-41419.json b/CVE-2023/CVE-2023-414xx/CVE-2023-41419.json index c95c2b76e31..9f1a5df7648 100644 --- a/CVE-2023/CVE-2023-414xx/CVE-2023-41419.json +++ b/CVE-2023/CVE-2023-414xx/CVE-2023-41419.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41419", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-25T12:15:11.210", - "lastModified": "2023-10-17T00:15:11.057", - "vulnStatus": "Modified", + "lastModified": "2023-12-08T20:51:32.543", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,7 +11,7 @@ }, { "lang": "es", - "value": "Un problema en Gevent Gevent anterior a la versi\u00f3n 23.9.1 permite a un atacante remoto escalar privilegios mediante un script manipulado al componente WSGIServer." + "value": "Un problema en Gevent anterior a la versi\u00f3n 23.9.0 permite a un atacante remoto escalar privilegios mediante un script manipulado al componente WSGIServer." } ], "metrics": { @@ -60,8 +60,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gevent:gevent:*:*:*:*:*:*:*:*", - "versionEndExcluding": "23.9.1", - "matchCriteriaId": "E720F67E-F3A2-48F4-96B1-B32F8B614A17" + "versionEndExcluding": "23.9.0", + "matchCriteriaId": "96BD5FDC-98C5-4018-B649-71B7884E3BFC" } ] } diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42556.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42556.json index d4a3b12ce27..745d3491368 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42556.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42556.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42556", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:15.030", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T20:13:16.467", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndExcluding": "14.0", + "matchCriteriaId": "792DB1B5-0C09-4E66-A407-E3F0E72496A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42557.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42557.json index 10c06ffa216..12691a9f192 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42557.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42557.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42557", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:15.220", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T20:16:19.493", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "14.0", + "matchCriteriaId": "B15E2F17-4050-4D0C-AA18-15D97D0D446F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42558.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42558.json index 7012909d7a5..32e5c6b8c97 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42558.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42558.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42558", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:15.390", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:57:46.590", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,112 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42559.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42559.json index 3009a60de6a..0e9df28514e 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42559.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42559.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42559", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:15.557", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T20:14:34.330", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.2 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndExcluding": "14.0", + "matchCriteriaId": "792DB1B5-0C09-4E66-A407-E3F0E72496A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42560.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42560.json index 7b3822ceee2..6c3adfde879 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42560.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42560.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42560", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:15.723", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:55:47.237", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndExcluding": "14.0", + "matchCriteriaId": "792DB1B5-0C09-4E66-A407-E3F0E72496A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42561.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42561.json index 4322b568939..f81e4c5bc2e 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42561.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42561.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42561", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:15.893", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:54:52.720", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndExcluding": "14.0", + "matchCriteriaId": "792DB1B5-0C09-4E66-A407-E3F0E72496A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42562.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42562.json index 5608b248318..de084e68376 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42562.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42562.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42562", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:16.060", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:53:59.103", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "14.0", + "matchCriteriaId": "B15E2F17-4050-4D0C-AA18-15D97D0D446F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42563.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42563.json index 07bdb8736fe..c170d365a9f 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42563.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42563.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42563", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:16.230", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:08:42.887", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "14.0", + "matchCriteriaId": "B15E2F17-4050-4D0C-AA18-15D97D0D446F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42564.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42564.json index 98f3e48698f..e9b3346cea9 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42564.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42564.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42564", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:16.400", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:10:09.737", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "14.0", + "matchCriteriaId": "B15E2F17-4050-4D0C-AA18-15D97D0D446F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42565.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42565.json index 4fa91744d7e..ea0222e84eb 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42565.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42565.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42565", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:16.553", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:12:46.580", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "14.0", + "matchCriteriaId": "F670E15F-E287-4B59-971F-0BBD93E337F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42566.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42566.json index 4c81f3cda5e..ba410ee5643 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42566.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42566.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42566", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:16.720", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:13:12.560", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndExcluding": "14.0", + "matchCriteriaId": "792DB1B5-0C09-4E66-A407-E3F0E72496A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42567.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42567.json index 2da8b58821d..564389a8f55 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42567.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42567.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42567", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:16.900", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:30:57.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,112 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-425xx/CVE-2023-42568.json b/CVE-2023/CVE-2023-425xx/CVE-2023-42568.json index 3dc6e2e8a46..00698439dcd 100644 --- a/CVE-2023/CVE-2023-425xx/CVE-2023-42568.json +++ b/CVE-2023/CVE-2023-425xx/CVE-2023-42568.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42568", "sourceIdentifier": "mobile.security@samsung.com", "published": "2023-12-05T03:15:17.070", - "lastModified": "2023-12-08T05:15:08.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-12-08T19:35:34.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -38,10 +58,119 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "13.0", + "matchCriteriaId": "98274110-F511-4004-8BC2-F04FC11BF251" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=12", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4399.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4399.json index ef321722d20..6ca64dd9362 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4399.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4399.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4399", "sourceIdentifier": "security@grafana.com", "published": "2023-10-17T08:15:09.553", - "lastModified": "2023-10-24T15:00:53.650", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-08T19:15:07.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -127,6 +127,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0003/", + "source": "security@grafana.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46246.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46246.json index a46f4e20f96..113916377ce 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46246.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46246.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46246", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-27T19:15:41.417", - "lastModified": "2023-11-07T18:09:05.533", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-08T19:15:07.680", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -121,6 +121,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0006/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46493.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46493.json new file mode 100644 index 00000000000..cbc1c59d11a --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46493.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46493", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-08T20:15:07.203", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Directory Traversal vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the readDirSync function in fileBrowser/browser.js." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-46493/", + "source": "cve@mitre.org" + }, + { + "url": "https://devhub.checkmarx.com/cve-details/Cxa4d94170-be41/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46494.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46494.json new file mode 100644 index 00000000000..db4c63eca5d --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46494.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46494", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-08T20:15:07.257", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.5 allows a remote attacker to obtain sensitive information via a crafted request to the ProductGrid function in admin/productGrid/Grid.jsx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-46494/", + "source": "cve@mitre.org" + }, + { + "url": "https://devhub.checkmarx.com/cve-details/Cx8ecec391-2014/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46495.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46495.json new file mode 100644 index 00000000000..45c5dbd1d31 --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46495.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46495", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-08T20:15:07.313", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the sortBy parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-46495/", + "source": "cve@mitre.org" + }, + { + "url": "https://devhub.checkmarx.com/cve-details/Cxbc6d4599-c1bd/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46496.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46496.json new file mode 100644 index 00000000000..7062ed27c61 --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46496.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46496", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-08T20:15:07.373", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Directory Traversal vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the DELETE function in api/files endpoint." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-46496/", + "source": "cve@mitre.org" + }, + { + "url": "https://devhub.checkmarx.com/cve-details/Cx943be66a-54cc/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46497.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46497.json new file mode 100644 index 00000000000..5d7ed9817cd --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46497.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46497", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-08T20:15:07.420", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Directory Traversal vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the mkdirSync function in the folderCreate/createFolder.js endpoint." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-46497/", + "source": "cve@mitre.org" + }, + { + "url": "https://devhub.checkmarx.com/cve-details/Cx16846793-56b6/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46498.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46498.json new file mode 100644 index 00000000000..fd1320796a4 --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46498.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46498", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-08T20:15:07.473", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information and execute arbitrary code via the /deleteCustomer/route.json file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://devhub.checkmarx.com/cve-details/Cx8b24ace3-0c9a/", + "source": "cve@mitre.org" + }, + { + "url": "https://devhub.checkmarx.com/cve-details/cve-2023-46498/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46499.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46499.json new file mode 100644 index 00000000000..a2e4321e82f --- /dev/null +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46499.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46499", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-12-08T20:15:07.523", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in EverShop NPM versions before v.1.0.0-rc.5 allows a remote attacker to obtain sensitive information via a crafted scripts to the Admin Panel." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://devhub.checkmarx.com/cve-details/Cx0f8b38be-d5de/", + "source": "cve@mitre.org" + }, + { + "url": "https://devhub.checkmarx.com/cve-details/cve-2023-46499/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46724.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46724.json index 6e444a96967..6c1991c39bb 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46724.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46724.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46724", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-01T20:15:08.800", - "lastModified": "2023-11-09T15:07:11.393", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-08T19:15:07.787", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -145,6 +145,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0001/", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json index 04f0906e099..3fe1e619c3f 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4692", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-25T18:17:41.743", - "lastModified": "2023-11-25T12:15:07.517", + "lastModified": "2023-12-08T19:15:08.003", "vulnStatus": "Modified", "descriptions": [ { @@ -159,6 +159,10 @@ { "url": "https://security.gentoo.org/glsa/202311-14", "source": "secalert@redhat.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0002/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json index c42800d5fc0..541260d8970 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4693", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-25T18:17:41.817", - "lastModified": "2023-11-25T12:15:07.637", + "lastModified": "2023-12-08T19:15:08.110", "vulnStatus": "Modified", "descriptions": [ { @@ -159,6 +159,10 @@ { "url": "https://security.gentoo.org/glsa/202311-14", "source": "secalert@redhat.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0002/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48311.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48311.json new file mode 100644 index 00000000000..414c8296889 --- /dev/null +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48311.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-48311", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-12-08T20:15:07.573", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying `DockerSpawner.allowed_images` configuration allow users to launch _any_ pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit `3ba4b665b` which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set `DockerSpawner.allowed_images` to a non-empty list containing only the default image will result in the intended default behavior." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jupyterhub/dockerspawner/commit/3ba4b665b6ca6027ea7a032d7ca3eab977574626", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jupyterhub/dockerspawner/security/advisories/GHSA-hfgr-h3vc-p6c2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48315.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48315.json index c9ab2821f57..9d038be12bb 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48315.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48315.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48315", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-05T01:15:07.230", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:04:07.240", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -54,10 +74,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_rtos_netx_duo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.0", + "matchCriteriaId": "401B08CC-CEC4-458C-B00D-5083B8DDC38A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/azure-rtos/netxduo/security/advisories/GHSA-rj6h-jjg2-7gf3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48316.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48316.json index f31a612fd7e..5ca6a0fa3b4 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48316.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48316.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48316", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-05T01:15:07.503", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:11:52.763", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -54,10 +84,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_rtos_netx_duo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.0", + "matchCriteriaId": "401B08CC-CEC4-458C-B00D-5083B8DDC38A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/azure-rtos/netxduo/security/advisories/GHSA-3cmf-r288-xhwq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48691.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48691.json index 829a041b045..d5895e65f81 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48691.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48691.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48691", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-05T01:15:07.747", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:17:35.883", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_rtos_netx_duo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.0", + "matchCriteriaId": "401B08CC-CEC4-458C-B00D-5083B8DDC38A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/azure-rtos/netxduo/security/advisories/GHSA-fwmg-rj6g-w99p", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48692.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48692.json index b6dd5b69408..90f60f2f5b9 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48692.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48692.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48692", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-05T01:15:07.957", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:20:21.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -54,10 +74,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_rtos_netx_duo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.0", + "matchCriteriaId": "401B08CC-CEC4-458C-B00D-5083B8DDC38A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/azure-rtos/netxduo/security/advisories/GHSA-m2rx-243p-9w64", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48693.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48693.json index 335c06dae36..40a691a2533 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48693.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48693.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48693", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-05T01:15:08.167", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:24:21.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_rtos_threadx:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.0", + "matchCriteriaId": "B89FF198-9D9D-4CAA-86CC-D176C81A998B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/azure-rtos/threadx/security/advisories/GHSA-p7w6-62rq-vrf9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48694.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48694.json index 1fb6c42f902..14239b7fd61 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48694.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48694.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48694", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-05T01:15:08.393", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:32:12.633", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -54,10 +74,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_rtos_usbx:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.0", + "matchCriteriaId": "8DFED452-108C-4B30-95FD-076DB22072F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/azure-rtos/usbx/security/advisories/GHSA-qjw8-7w86-44qj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48696.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48696.json index 933e4d81cc2..976bd2e1b37 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48696.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48696.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48696", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-05T01:15:08.877", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:36:56.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -54,10 +74,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_rtos_usbx:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.0", + "matchCriteriaId": "8DFED452-108C-4B30-95FD-076DB22072F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/azure-rtos/usbx/security/advisories/GHSA-h733-98hq-f884", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48697.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48697.json index e899ea58419..b00eff4c663 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48697.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48697.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48697", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-05T01:15:09.120", - "lastModified": "2023-12-05T13:51:04.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-08T19:41:59.550", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -58,10 +78,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_rtos_usbx:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.0", + "matchCriteriaId": "8DFED452-108C-4B30-95FD-076DB22072F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/azure-rtos/usbx/security/advisories/GHSA-p2p9-wp2q-wjv4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49782.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49782.json new file mode 100644 index 00000000000..4c01283e1bf --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49782.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-49782", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-12-08T20:15:07.783", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Collabora Online is a collaborative online office suite based on LibreOffice technology. Users of Nextcloud with `Collabora Online - Built-in CODE Server` app can be vulnerable to attack via proxy.php. The bug was fixed in Collabora Online - Built-in CODE Server (richdocumentscode) release 23.5.601. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://apps.nextcloud.com/apps/richdocumentscode", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-8xm5-pgfr-8mjr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49788.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49788.json new file mode 100644 index 00000000000..77449897846 --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49788.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-49788", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-12-08T20:15:07.993", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Collabora Online is a collaborative online office suite based on LibreOffice technology. Unlike a standalone dedicated Collabora Online server, the Built-in CODE Server (richdocumentscode) is run without chroot sandboxing. Vulnerable versions of the richdocumentscode app can be susceptible to attack via modified client->server commands to overwrite files outside the sub directory the server has provided for the transient session. Files which can be accessed are limited to those that the server process has access to. The bug was fixed in Collabora Online - Built-in CODE Server (richdocumentscode) release 23.5.602. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-501" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-3r69-xvf7-v94j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json index c1771fb095f..2bc81e39db5 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5088", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-03T14:15:08.560", - "lastModified": "2023-11-13T19:21:54.123", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-08T19:15:08.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -145,6 +145,10 @@ "Mailing List", "Patch" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0005/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5178.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5178.json index afac9b4031b..a496c7b90d5 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5178.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5178.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5178", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-01T17:15:11.920", - "lastModified": "2023-12-05T13:15:07.387", + "lastModified": "2023-12-08T19:15:08.323", "vulnStatus": "Modified", "descriptions": [ { @@ -207,6 +207,10 @@ "Mailing List", "Patch" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20231208-0004/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json index 35b2ffe3383..861ed0d2674 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5808.json @@ -2,12 +2,12 @@ "id": "CVE-2023-5808", "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", "published": "2023-12-05T00:15:09.840", - "lastModified": "2023-12-08T17:18:15.347", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-08T20:15:08.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in Storage, Server or combined Server+Storage administrative roles are able to access HNAS configuration backup and diagnostic data, that would normally be barred to those specific administrative roles." + "value": "SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in a Storage administrative role are able to access HNAS configuration backup and diagnostic data, that would normally be barred to that specific administrative role." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6507.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6507.json new file mode 100644 index 00000000000..0e050467881 --- /dev/null +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6507.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-6507", + "sourceIdentifier": "cna@python.org", + "published": "2023-12-08T19:15:08.440", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue was found in CPython 3.12.0 `subprocess` module on POSIX platforms. The issue was fixed in CPython 3.12.1 and does not affect other stable releases.\n\nWhen using the `extra_groups=` parameter with an empty list as a value (ie `extra_groups=[]`) the logic regressed to not call `setgroups(0, NULL)` before calling `exec()`, thus not dropping the original processes' groups before starting the new process. There is no issue when the parameter isn't used or when any value is used besides an empty list.\n\nThis issue only impacts CPython processes run with sufficient privilege to make the `setgroups` system call (typically `root`).\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@python.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cna@python.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/python/cpython/issues/112334", + "source": "cna@python.org" + }, + { + "url": "https://github.com/python/cpython/pull/112617", + "source": "cna@python.org" + }, + { + "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/AUL7QFHBLILGISS7U63B47AYSSGJJQZD/", + "source": "cna@python.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6606.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6606.json index 57434d13c20..e78f6a9bb3c 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6606.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6606.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6606", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-08T17:15:07.733", - "lastModified": "2023-12-08T17:15:07.733", - "vulnStatus": "Received", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6610.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6610.json index 57df10bec68..5b2e83d2fc8 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6610.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6610.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6610", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-08T17:15:07.933", - "lastModified": "2023-12-08T17:15:07.933", - "vulnStatus": "Received", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6615.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6615.json index bd4a924bde0..628cd1ac920 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6615.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6615.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6615", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-08T17:15:08.143", - "lastModified": "2023-12-08T17:15:08.143", - "vulnStatus": "Received", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6616.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6616.json index 32a6e1a31a0..35ea07419c7 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6616.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6616.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6616", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-08T17:15:08.367", - "lastModified": "2023-12-08T17:15:08.367", - "vulnStatus": "Received", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6617.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6617.json index c4a26a0de2f..a7c98d3f82b 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6617.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6617.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6617", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-08T17:15:08.600", - "lastModified": "2023-12-08T17:15:08.600", - "vulnStatus": "Received", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6618.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6618.json index fb09fcf26d7..0c1a34c0d88 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6618.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6618.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6618", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-08T17:15:08.827", - "lastModified": "2023-12-08T17:15:08.827", - "vulnStatus": "Received", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6619.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6619.json index e4f691fd385..27ff41b5dc3 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6619.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6619.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6619", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-08T18:15:06.930", - "lastModified": "2023-12-08T18:15:06.930", - "vulnStatus": "Received", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6622.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6622.json index ee07fce1442..ef29b86fb82 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6622.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6622.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6622", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-08T18:15:07.163", - "lastModified": "2023-12-08T18:15:07.163", - "vulnStatus": "Received", + "lastModified": "2023-12-08T20:18:15.033", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 128487668d1..9d21adc1962 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-08T19:00:18.480736+00:00 +2023-12-08T21:00:18.914884+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-08T18:54:42.680000+00:00 +2023-12-08T20:57:31.813000+00:00 ``` ### Last Data Feed Release @@ -29,52 +29,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -232630 +232641 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `11` -* [CVE-2023-6606](CVE-2023/CVE-2023-66xx/CVE-2023-6606.json) (`2023-12-08T17:15:07.733`) -* [CVE-2023-6610](CVE-2023/CVE-2023-66xx/CVE-2023-6610.json) (`2023-12-08T17:15:07.933`) -* [CVE-2023-6615](CVE-2023/CVE-2023-66xx/CVE-2023-6615.json) (`2023-12-08T17:15:08.143`) -* [CVE-2023-6616](CVE-2023/CVE-2023-66xx/CVE-2023-6616.json) (`2023-12-08T17:15:08.367`) -* [CVE-2023-6617](CVE-2023/CVE-2023-66xx/CVE-2023-6617.json) (`2023-12-08T17:15:08.600`) -* [CVE-2023-6618](CVE-2023/CVE-2023-66xx/CVE-2023-6618.json) (`2023-12-08T17:15:08.827`) -* [CVE-2023-6619](CVE-2023/CVE-2023-66xx/CVE-2023-6619.json) (`2023-12-08T18:15:06.930`) -* [CVE-2023-6622](CVE-2023/CVE-2023-66xx/CVE-2023-6622.json) (`2023-12-08T18:15:07.163`) +* [CVE-2023-6507](CVE-2023/CVE-2023-65xx/CVE-2023-6507.json) (`2023-12-08T19:15:08.440`) +* [CVE-2023-46493](CVE-2023/CVE-2023-464xx/CVE-2023-46493.json) (`2023-12-08T20:15:07.203`) +* [CVE-2023-46494](CVE-2023/CVE-2023-464xx/CVE-2023-46494.json) (`2023-12-08T20:15:07.257`) +* [CVE-2023-46495](CVE-2023/CVE-2023-464xx/CVE-2023-46495.json) (`2023-12-08T20:15:07.313`) +* [CVE-2023-46496](CVE-2023/CVE-2023-464xx/CVE-2023-46496.json) (`2023-12-08T20:15:07.373`) +* [CVE-2023-46497](CVE-2023/CVE-2023-464xx/CVE-2023-46497.json) (`2023-12-08T20:15:07.420`) +* [CVE-2023-46498](CVE-2023/CVE-2023-464xx/CVE-2023-46498.json) (`2023-12-08T20:15:07.473`) +* [CVE-2023-46499](CVE-2023/CVE-2023-464xx/CVE-2023-46499.json) (`2023-12-08T20:15:07.523`) +* [CVE-2023-48311](CVE-2023/CVE-2023-483xx/CVE-2023-48311.json) (`2023-12-08T20:15:07.573`) +* [CVE-2023-49782](CVE-2023/CVE-2023-497xx/CVE-2023-49782.json) (`2023-12-08T20:15:07.783`) +* [CVE-2023-49788](CVE-2023/CVE-2023-497xx/CVE-2023-49788.json) (`2023-12-08T20:15:07.993`) ### CVEs modified in the last Commit -Recently modified CVEs: `42` +Recently modified CVEs: `55` -* [CVE-2023-5944](CVE-2023/CVE-2023-59xx/CVE-2023-5944.json) (`2023-12-08T17:28:11.723`) -* [CVE-2023-49293](CVE-2023/CVE-2023-492xx/CVE-2023-49293.json) (`2023-12-08T17:28:27.917`) -* [CVE-2023-49288](CVE-2023/CVE-2023-492xx/CVE-2023-49288.json) (`2023-12-08T17:29:23.270`) -* [CVE-2023-49286](CVE-2023/CVE-2023-492xx/CVE-2023-49286.json) (`2023-12-08T17:30:06.817`) -* [CVE-2023-49285](CVE-2023/CVE-2023-492xx/CVE-2023-49285.json) (`2023-12-08T17:30:27.670`) -* [CVE-2023-24052](CVE-2023/CVE-2023-240xx/CVE-2023-24052.json) (`2023-12-08T17:38:12.703`) -* [CVE-2023-35668](CVE-2023/CVE-2023-356xx/CVE-2023-35668.json) (`2023-12-08T17:47:02.357`) -* [CVE-2023-40073](CVE-2023/CVE-2023-400xx/CVE-2023-40073.json) (`2023-12-08T17:50:29.510`) -* [CVE-2023-40074](CVE-2023/CVE-2023-400xx/CVE-2023-40074.json) (`2023-12-08T17:51:45.870`) -* [CVE-2023-40075](CVE-2023/CVE-2023-400xx/CVE-2023-40075.json) (`2023-12-08T17:55:45.390`) -* [CVE-2023-47100](CVE-2023/CVE-2023-471xx/CVE-2023-47100.json) (`2023-12-08T17:57:01.690`) -* [CVE-2023-40076](CVE-2023/CVE-2023-400xx/CVE-2023-40076.json) (`2023-12-08T17:57:47.650`) -* [CVE-2023-40078](CVE-2023/CVE-2023-400xx/CVE-2023-40078.json) (`2023-12-08T18:00:30.370`) -* [CVE-2023-40077](CVE-2023/CVE-2023-400xx/CVE-2023-40077.json) (`2023-12-08T18:01:28.773`) -* [CVE-2023-40079](CVE-2023/CVE-2023-400xx/CVE-2023-40079.json) (`2023-12-08T18:05:46.703`) -* [CVE-2023-40080](CVE-2023/CVE-2023-400xx/CVE-2023-40080.json) (`2023-12-08T18:10:39.777`) -* [CVE-2023-40081](CVE-2023/CVE-2023-400xx/CVE-2023-40081.json) (`2023-12-08T18:14:18.023`) -* [CVE-2023-5915](CVE-2023/CVE-2023-59xx/CVE-2023-5915.json) (`2023-12-08T18:24:27.517`) -* [CVE-2023-40082](CVE-2023/CVE-2023-400xx/CVE-2023-40082.json) (`2023-12-08T18:24:29.763`) -* [CVE-2023-40083](CVE-2023/CVE-2023-400xx/CVE-2023-40083.json) (`2023-12-08T18:31:19.213`) -* [CVE-2023-45253](CVE-2023/CVE-2023-452xx/CVE-2023-45253.json) (`2023-12-08T18:31:28.750`) -* [CVE-2023-45252](CVE-2023/CVE-2023-452xx/CVE-2023-45252.json) (`2023-12-08T18:45:28.017`) -* [CVE-2023-48695](CVE-2023/CVE-2023-486xx/CVE-2023-48695.json) (`2023-12-08T18:51:23.953`) -* [CVE-2023-28811](CVE-2023/CVE-2023-288xx/CVE-2023-28811.json) (`2023-12-08T18:53:08.613`) -* [CVE-2023-34982](CVE-2023/CVE-2023-349xx/CVE-2023-34982.json) (`2023-12-08T18:53:18.187`) +* [CVE-2023-48693](CVE-2023/CVE-2023-486xx/CVE-2023-48693.json) (`2023-12-08T19:24:21.413`) +* [CVE-2023-42567](CVE-2023/CVE-2023-425xx/CVE-2023-42567.json) (`2023-12-08T19:30:57.537`) +* [CVE-2023-48694](CVE-2023/CVE-2023-486xx/CVE-2023-48694.json) (`2023-12-08T19:32:12.633`) +* [CVE-2023-42568](CVE-2023/CVE-2023-425xx/CVE-2023-42568.json) (`2023-12-08T19:35:34.093`) +* [CVE-2023-48696](CVE-2023/CVE-2023-486xx/CVE-2023-48696.json) (`2023-12-08T19:36:56.413`) +* [CVE-2023-48697](CVE-2023/CVE-2023-486xx/CVE-2023-48697.json) (`2023-12-08T19:41:59.550`) +* [CVE-2023-42562](CVE-2023/CVE-2023-425xx/CVE-2023-42562.json) (`2023-12-08T19:53:59.103`) +* [CVE-2023-42561](CVE-2023/CVE-2023-425xx/CVE-2023-42561.json) (`2023-12-08T19:54:52.720`) +* [CVE-2023-42560](CVE-2023/CVE-2023-425xx/CVE-2023-42560.json) (`2023-12-08T19:55:47.237`) +* [CVE-2023-42558](CVE-2023/CVE-2023-425xx/CVE-2023-42558.json) (`2023-12-08T19:57:46.590`) +* [CVE-2023-42556](CVE-2023/CVE-2023-425xx/CVE-2023-42556.json) (`2023-12-08T20:13:16.467`) +* [CVE-2023-42559](CVE-2023/CVE-2023-425xx/CVE-2023-42559.json) (`2023-12-08T20:14:34.330`) +* [CVE-2023-5808](CVE-2023/CVE-2023-58xx/CVE-2023-5808.json) (`2023-12-08T20:15:08.200`) +* [CVE-2023-42557](CVE-2023/CVE-2023-425xx/CVE-2023-42557.json) (`2023-12-08T20:16:19.493`) +* [CVE-2023-6606](CVE-2023/CVE-2023-66xx/CVE-2023-6606.json) (`2023-12-08T20:18:15.033`) +* [CVE-2023-6610](CVE-2023/CVE-2023-66xx/CVE-2023-6610.json) (`2023-12-08T20:18:15.033`) +* [CVE-2023-6615](CVE-2023/CVE-2023-66xx/CVE-2023-6615.json) (`2023-12-08T20:18:15.033`) +* [CVE-2023-6616](CVE-2023/CVE-2023-66xx/CVE-2023-6616.json) (`2023-12-08T20:18:15.033`) +* [CVE-2023-6617](CVE-2023/CVE-2023-66xx/CVE-2023-6617.json) (`2023-12-08T20:18:15.033`) +* [CVE-2023-6618](CVE-2023/CVE-2023-66xx/CVE-2023-6618.json) (`2023-12-08T20:18:15.033`) +* [CVE-2023-6619](CVE-2023/CVE-2023-66xx/CVE-2023-6619.json) (`2023-12-08T20:18:15.033`) +* [CVE-2023-6622](CVE-2023/CVE-2023-66xx/CVE-2023-6622.json) (`2023-12-08T20:18:15.033`) +* [CVE-2023-1380](CVE-2023/CVE-2023-13xx/CVE-2023-1380.json) (`2023-12-08T20:45:02.020`) +* [CVE-2023-2002](CVE-2023/CVE-2023-20xx/CVE-2023-2002.json) (`2023-12-08T20:48:30.057`) +* [CVE-2023-41419](CVE-2023/CVE-2023-414xx/CVE-2023-41419.json) (`2023-12-08T20:51:32.543`) ## Download and Usage