mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2023-11-02T17:00:19.547330+00:00
This commit is contained in:
parent
e19566641b
commit
884d59adcf
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-39289",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-08-23T05:15:08.380",
|
||||
"lastModified": "2022-07-12T17:42:04.277",
|
||||
"lastModified": "2023-11-02T15:45:31.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,65 +85,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb800_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "859A2D0C-3E71-4ADC-B428-16F06C690C19"
|
||||
"matchCriteriaId": "012DBD5F-C5F7-472F-98F0-0EE481A1A39D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb800_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "1BE1B5B4-DA33-477A-B2A0-3EB9C9FC3D70"
|
||||
"matchCriteriaId": "46A74835-CD8C-4CD7-98B5-0820A02DEAA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb800_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "E0BB4A22-5C1E-483B-B4B5-EBB825F69ADB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "235EA0E4-4159-4B33-981A-142F18F19693"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "E8BF4EC9-F81D-43B6-9B82-ED684B324558"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "1AFD122C-BA89-4492-BA60-FB2469362AFB"
|
||||
"matchCriteriaId": "09DCDB3A-0E51-4C6E-8423-DD2F84C64478"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -155,552 +113,76 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D275CDC-0FE9-40C6-8CD4-3C836458C6C6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1601_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "32518B3C-AC1D-4C84-B93D-FECD87119CE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1601_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "92C9EA32-7245-4D9A-95AC-BEA84F831FBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1601_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "475A665D-717A-4D8A-B898-67727ADFA3C0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "DD46C88F-7504-4EF3-82A2-2B7E2C6295CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "2FC37DB1-5BBA-4B66-B6EB-F9807AEBC28B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "4B584B1A-E437-4D30-9129-EEB26EA6E6D0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "24406D4C-86C1-40C8-9176-965C34D98A27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "237C5CD4-B380-4200-AA3C-CEBE56769D95"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "F043174E-E5A2-4D8B-ABC2-6B58BA1928DD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "6288934F-DAF6-4703-BA16-641C9C9F7816"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "B903A687-C06B-46B1-B5C9-5022D0379B9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "22E922A0-F965-4EFF-85A6-A48957A62CA2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7751755B-A1A8-4538-94D1-A49FC40565A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "AFBC5B08-D2CC-4885-AA81-C893475663B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "2C816B51-1B3F-406F-9D06-F2B269CEED72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "F065BA00-4BEA-40DC-8E6F-F0D3DBB6135E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2710:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AFE5094-EA46-4389-880F-32E892BC703D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "565E3C8B-3A1C-4088-8E67-ABAFF6F23CE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "22B3B384-DD00-44FF-89A4-6955DBED6BEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "B96EDFE1-9F24-4B19-B1BA-4C616EE2DC40"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "411ACA2B-FEA7-4EE3-ADF2-89A730EBAC63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "2BA4A5D3-7732-48FD-954D-8E17A10E73C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "5267CB7C-FB43-430A-A72D-6FD818067AD4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "21CDAEB4-ED99-4B7E-BCDD-76EA6358827A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "7EA9B965-8579-4FC1-841C-C515DEE27B01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "745D4419-62B5-46C3-8105-CEA15D9487EF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79C621EF-0650-418D-B39D-C07FE4728DB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3701_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "2DBE522D-DCD5-49DC-A85B-924913567542"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3701_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "FA511394-9D61-450A-B83E-9646F0F0E14A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3701_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "61B03B05-4EEB-4C26-A9D5-973677509C44"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "BEC22B39-711E-4CE9-95AB-43F72CCDA470"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "37B221AA-E1BF-4468-86F5-75FCEBAF16F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "02220156-F8E2-451E-A109-E7531F20318D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3710:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78EBE526-E036-4FCC-B617-376ABC679111"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3711_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "FB50D57C-6597-4906-82BA-D3EA43CB1674"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3711_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "C8DD0B35-A9ED-40EE-99A7-D1E521715B15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3711_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "2042F74C-EAB3-4E7B-9EA3-D9D259B49F97"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3711:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "923D8D38-E3DB-47C0-92C3-AD1A05EEAC83"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3720_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "DC6FD8BD-83E6-49F0-BAFD-204DC811FD3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3720_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "E9E19441-52AA-45CE-BFDC-9AA5B77C93D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3720_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "D9283534-F223-41A3-A05E-E57712EBDC17"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3720:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2E345B5-CF76-4385-B4C3-B7F00DB0C52B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "AF973850-B710-4AE8-B843-9B98D615D09A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "7015FD33-A077-4EF7-9FA6-5BFCD1AF6FD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "9F7BA1B7-C9D3-4B1E-9639-E4F7C8580E11"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-39290",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-08-23T05:15:08.430",
|
||||
"lastModified": "2021-08-27T12:35:28.000",
|
||||
"lastModified": "2023-11-02T15:48:19.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,65 +85,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb800_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "859A2D0C-3E71-4ADC-B428-16F06C690C19"
|
||||
"matchCriteriaId": "012DBD5F-C5F7-472F-98F0-0EE481A1A39D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb800_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "1BE1B5B4-DA33-477A-B2A0-3EB9C9FC3D70"
|
||||
"matchCriteriaId": "46A74835-CD8C-4CD7-98B5-0820A02DEAA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb800_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "E0BB4A22-5C1E-483B-B4B5-EBB825F69ADB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "235EA0E4-4159-4B33-981A-142F18F19693"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "E8BF4EC9-F81D-43B6-9B82-ED684B324558"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "1AFD122C-BA89-4492-BA60-FB2469362AFB"
|
||||
"matchCriteriaId": "09DCDB3A-0E51-4C6E-8423-DD2F84C64478"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -155,552 +113,76 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D275CDC-0FE9-40C6-8CD4-3C836458C6C6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1601_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "32518B3C-AC1D-4C84-B93D-FECD87119CE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1601_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "92C9EA32-7245-4D9A-95AC-BEA84F831FBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1601_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "475A665D-717A-4D8A-B898-67727ADFA3C0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "DD46C88F-7504-4EF3-82A2-2B7E2C6295CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "2FC37DB1-5BBA-4B66-B6EB-F9807AEBC28B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "4B584B1A-E437-4D30-9129-EEB26EA6E6D0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "24406D4C-86C1-40C8-9176-965C34D98A27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "237C5CD4-B380-4200-AA3C-CEBE56769D95"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "F043174E-E5A2-4D8B-ABC2-6B58BA1928DD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "6288934F-DAF6-4703-BA16-641C9C9F7816"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "B903A687-C06B-46B1-B5C9-5022D0379B9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "22E922A0-F965-4EFF-85A6-A48957A62CA2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7751755B-A1A8-4538-94D1-A49FC40565A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "AFBC5B08-D2CC-4885-AA81-C893475663B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "2C816B51-1B3F-406F-9D06-F2B269CEED72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "F065BA00-4BEA-40DC-8E6F-F0D3DBB6135E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2710:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AFE5094-EA46-4389-880F-32E892BC703D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "565E3C8B-3A1C-4088-8E67-ABAFF6F23CE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "22B3B384-DD00-44FF-89A4-6955DBED6BEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "B96EDFE1-9F24-4B19-B1BA-4C616EE2DC40"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "411ACA2B-FEA7-4EE3-ADF2-89A730EBAC63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "2BA4A5D3-7732-48FD-954D-8E17A10E73C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "5267CB7C-FB43-430A-A72D-6FD818067AD4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "21CDAEB4-ED99-4B7E-BCDD-76EA6358827A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "7EA9B965-8579-4FC1-841C-C515DEE27B01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "745D4419-62B5-46C3-8105-CEA15D9487EF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79C621EF-0650-418D-B39D-C07FE4728DB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3701_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "2DBE522D-DCD5-49DC-A85B-924913567542"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3701_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "FA511394-9D61-450A-B83E-9646F0F0E14A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3701_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "61B03B05-4EEB-4C26-A9D5-973677509C44"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "BEC22B39-711E-4CE9-95AB-43F72CCDA470"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "37B221AA-E1BF-4468-86F5-75FCEBAF16F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "02220156-F8E2-451E-A109-E7531F20318D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3710:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78EBE526-E036-4FCC-B617-376ABC679111"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3711_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "FB50D57C-6597-4906-82BA-D3EA43CB1674"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3711_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "C8DD0B35-A9ED-40EE-99A7-D1E521715B15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3711_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "2042F74C-EAB3-4E7B-9EA3-D9D259B49F97"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3711:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "923D8D38-E3DB-47C0-92C3-AD1A05EEAC83"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3720_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "DC6FD8BD-83E6-49F0-BAFD-204DC811FD3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3720_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "E9E19441-52AA-45CE-BFDC-9AA5B77C93D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3720_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "D9283534-F223-41A3-A05E-E57712EBDC17"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3720:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2E345B5-CF76-4385-B4C3-B7F00DB0C52B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "AF973850-B710-4AE8-B843-9B98D615D09A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "7015FD33-A077-4EF7-9FA6-5BFCD1AF6FD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "9F7BA1B7-C9D3-4B1E-9639-E4F7C8580E11"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-39291",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-08-23T05:15:08.473",
|
||||
"lastModified": "2022-07-12T17:42:04.277",
|
||||
"lastModified": "2023-11-02T15:47:22.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,65 +85,23 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb800_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "859A2D0C-3E71-4ADC-B428-16F06C690C19"
|
||||
"matchCriteriaId": "012DBD5F-C5F7-472F-98F0-0EE481A1A39D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb800_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "1BE1B5B4-DA33-477A-B2A0-3EB9C9FC3D70"
|
||||
"matchCriteriaId": "46A74835-CD8C-4CD7-98B5-0820A02DEAA0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb800_firmware:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "E0BB4A22-5C1E-483B-B4B5-EBB825F69ADB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "235EA0E4-4159-4B33-981A-142F18F19693"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "E8BF4EC9-F81D-43B6-9B82-ED684B324558"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1600_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "1AFD122C-BA89-4492-BA60-FB2469362AFB"
|
||||
"matchCriteriaId": "09DCDB3A-0E51-4C6E-8423-DD2F84C64478"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -155,552 +113,76 @@
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1600:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D275CDC-0FE9-40C6-8CD4-3C836458C6C6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1601_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "32518B3C-AC1D-4C84-B93D-FECD87119CE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1601_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "92C9EA32-7245-4D9A-95AC-BEA84F831FBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1601_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "475A665D-717A-4D8A-B898-67727ADFA3C0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "DD46C88F-7504-4EF3-82A2-2B7E2C6295CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "2FC37DB1-5BBA-4B66-B6EB-F9807AEBC28B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "4B584B1A-E437-4D30-9129-EEB26EA6E6D0"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "24406D4C-86C1-40C8-9176-965C34D98A27"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "237C5CD4-B380-4200-AA3C-CEBE56769D95"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb1810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "F043174E-E5A2-4D8B-ABC2-6B58BA1928DD"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "6288934F-DAF6-4703-BA16-641C9C9F7816"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "B903A687-C06B-46B1-B5C9-5022D0379B9A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "22E922A0-F965-4EFF-85A6-A48957A62CA2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7751755B-A1A8-4538-94D1-A49FC40565A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "AFBC5B08-D2CC-4885-AA81-C893475663B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "2C816B51-1B3F-406F-9D06-F2B269CEED72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "F065BA00-4BEA-40DC-8E6F-F0D3DBB6135E"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2710:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AFE5094-EA46-4389-880F-32E892BC703D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "565E3C8B-3A1C-4088-8E67-ABAFF6F23CE0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "22B3B384-DD00-44FF-89A4-6955DBED6BEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "B96EDFE1-9F24-4B19-B1BA-4C616EE2DC40"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "411ACA2B-FEA7-4EE3-ADF2-89A730EBAC63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "2BA4A5D3-7732-48FD-954D-8E17A10E73C6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb2810_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "5267CB7C-FB43-430A-A72D-6FD818067AD4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "21CDAEB4-ED99-4B7E-BCDD-76EA6358827A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "7EA9B965-8579-4FC1-841C-C515DEE27B01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3700_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "745D4419-62B5-46C3-8105-CEA15D9487EF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79C621EF-0650-418D-B39D-C07FE4728DB9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3701_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "2DBE522D-DCD5-49DC-A85B-924913567542"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3701_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "FA511394-9D61-450A-B83E-9646F0F0E14A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3701_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "61B03B05-4EEB-4C26-A9D5-973677509C44"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "BEC22B39-711E-4CE9-95AB-43F72CCDA470"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "37B221AA-E1BF-4468-86F5-75FCEBAF16F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3710_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "02220156-F8E2-451E-A109-E7531F20318D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3710:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "78EBE526-E036-4FCC-B617-376ABC679111"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3711_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "FB50D57C-6597-4906-82BA-D3EA43CB1674"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3711_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "C8DD0B35-A9ED-40EE-99A7-D1E521715B15"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3711_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "2042F74C-EAB3-4E7B-9EA3-D9D259B49F97"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3711:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "923D8D38-E3DB-47C0-92C3-AD1A05EEAC83"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3720_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "DC6FD8BD-83E6-49F0-BAFD-204DC811FD3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3720_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "E9E19441-52AA-45CE-BFDC-9AA5B77C93D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3720_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "D9283534-F223-41A3-A05E-E57712EBDC17"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3720:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C2E345B5-CF76-4385-B4C3-B7F00DB0C52B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.3.0.113",
|
||||
"matchCriteriaId": "AF973850-B710-4AE8-B843-9B98D615D09A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0.0",
|
||||
"versionEndExcluding": "4.4.0.111",
|
||||
"matchCriteriaId": "7015FD33-A077-4EF7-9FA6-5BFCD1AF6FD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netmodule:nb3800_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.5.0.0",
|
||||
"versionEndExcluding": "4.5.0.105",
|
||||
"matchCriteriaId": "9F7BA1B7-C9D3-4B1E-9639-E4F7C8580E11"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
47
CVE-2022/CVE-2022-49xx/CVE-2022-4900.json
Normal file
47
CVE-2022/CVE-2022-49xx/CVE-2022-4900.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2022-4900",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-02T16:15:08.700",
|
||||
"lastModified": "2023-11-02T16:15:08.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2022-4900",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179880",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0861",
|
||||
"sourceIdentifier": "research@onekey.com",
|
||||
"published": "2023-02-16T09:15:10.237",
|
||||
"lastModified": "2023-02-24T18:11:38.997",
|
||||
"lastModified": "2023-11-02T15:44:53.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -78,6 +78,7 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -112,6 +113,57 @@
|
||||
"matchCriteriaId": "B543F356-8395-4F7E-A3C8-1A5DB362533C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0408E588-146F-4AD2-9D58-A12EBA83A697"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0862",
|
||||
"sourceIdentifier": "research@onekey.com",
|
||||
"published": "2023-02-16T10:15:11.983",
|
||||
"lastModified": "2023-02-24T18:13:08.803",
|
||||
"lastModified": "2023-11-02T15:47:45.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -78,6 +78,7 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -112,6 +113,57 @@
|
||||
"matchCriteriaId": "B543F356-8395-4F7E-A3C8-1A5DB362533C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B550124-772B-4384-BA89-72B68E01F61E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0408E588-146F-4AD2-9D58-A12EBA83A697"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
|
47
CVE-2023/CVE-2023-384xx/CVE-2023-38469.json
Normal file
47
CVE-2023/CVE-2023-384xx/CVE-2023-38469.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-38469",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-02T15:15:08.167",
|
||||
"lastModified": "2023-11-02T15:15:08.167",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-38469",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2191687",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2023/CVE-2023-384xx/CVE-2023-38470.json
Normal file
47
CVE-2023/CVE-2023-384xx/CVE-2023-38470.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-38470",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-02T15:15:08.237",
|
||||
"lastModified": "2023-11-02T15:15:08.237",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-38470",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2191690",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2023/CVE-2023-384xx/CVE-2023-38471.json
Normal file
47
CVE-2023/CVE-2023-384xx/CVE-2023-38471.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-38471",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-02T15:15:08.300",
|
||||
"lastModified": "2023-11-02T15:15:08.300",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-38471",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2191691",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2023/CVE-2023-384xx/CVE-2023-38472.json
Normal file
47
CVE-2023/CVE-2023-384xx/CVE-2023-38472.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-38472",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-02T15:15:08.363",
|
||||
"lastModified": "2023-11-02T15:15:08.363",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-38472",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2191692",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2023/CVE-2023-384xx/CVE-2023-38473.json
Normal file
47
CVE-2023/CVE-2023-384xx/CVE-2023-38473.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-38473",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-11-02T16:15:08.773",
|
||||
"lastModified": "2023-11-02T16:15:08.773",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-38473",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2191694",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41072",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-10-25T19:15:09.757",
|
||||
"lastModified": "2023-10-26T00:15:10.803",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:05:05.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,123 @@
|
||||
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.1, iOS 17.1 y iPadOS 17.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "387C5D63-833F-4407-A402-501DEF4E15AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "F53A32D0-DB67-40D7-B14E-3963E696A77E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.1",
|
||||
"matchCriteriaId": "F9F52915-10F1-4514-B839-F6DC74B53555"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/19",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/24",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213982",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213982",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41077",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-10-25T19:15:09.810",
|
||||
"lastModified": "2023-10-26T00:15:10.847",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:14:27.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,19 +14,85 @@
|
||||
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.1",
|
||||
"matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/26",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213985",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213985",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41254",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-10-25T19:15:09.860",
|
||||
"lastModified": "2023-10-26T00:15:10.890",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:20:39.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,67 +14,220 @@
|
||||
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.2",
|
||||
"matchCriteriaId": "3DFB829A-82EA-40BB-81F9-AD4F69F24ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "387C5D63-833F-4407-A402-501DEF4E15AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.2",
|
||||
"matchCriteriaId": "5EB9EAAE-441A-4844-BCB2-1716FD9ACE85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "F53A32D0-DB67-40D7-B14E-3963E696A77E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.1",
|
||||
"matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.1",
|
||||
"matchCriteriaId": "F9F52915-10F1-4514-B839-F6DC74B53555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.1",
|
||||
"matchCriteriaId": "F88E7355-ECFB-4EB0-9579-0C954C25355F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/19",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/24",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/25",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/26",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213981",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213982",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213985",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213988",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213981",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213982",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213985",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213988",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41975",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-10-25T19:15:09.907",
|
||||
"lastModified": "2023-10-26T00:15:10.947",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:22:55.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,43 +14,147 @@
|
||||
"value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Es posible que un sitio web pueda acceder al micr\u00f3fono sin que se muestre el indicador de uso del micr\u00f3fono."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.0",
|
||||
"versionEndExcluding": "12.7.1",
|
||||
"matchCriteriaId": "7C0B29FA-3C4E-4F6E-A39E-D7B46CD5A614"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.6.1",
|
||||
"matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.1",
|
||||
"matchCriteriaId": "F9F52915-10F1-4514-B839-F6DC74B53555"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/21",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/24",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/26",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213983",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213985",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213983",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213985",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41976",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-10-25T19:15:09.957",
|
||||
"lastModified": "2023-10-26T00:15:10.997",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:25:34.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,55 +14,201 @@
|
||||
"value": "Se solucion\u00f3 un problema de use-after-free con una gesti\u00f3n de memoria mejorada. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. El procesamiento de contenido web puede dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "84250563-E42D-4F36-ACB0-081804E27FA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.2",
|
||||
"matchCriteriaId": "3DFB829A-82EA-40BB-81F9-AD4F69F24ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "387C5D63-833F-4407-A402-501DEF4E15AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.2",
|
||||
"matchCriteriaId": "5EB9EAAE-441A-4844-BCB2-1716FD9ACE85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "F53A32D0-DB67-40D7-B14E-3963E696A77E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.1",
|
||||
"matchCriteriaId": "F9F52915-10F1-4514-B839-F6DC74B53555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "6B71C095-CFB3-42E1-8582-0AD365DA7855"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.1",
|
||||
"matchCriteriaId": "F88E7355-ECFB-4EB0-9579-0C954C25355F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/19",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/22",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/24",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/25",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/27",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213981",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213982",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213986",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213987",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213988",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41977",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-10-25T19:15:10.013",
|
||||
"lastModified": "2023-10-26T00:15:11.047",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:26:41.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,31 +14,121 @@
|
||||
"value": "El problema se solucion\u00f3 mejorando el manejo de los cach\u00e9s. Este problema se solucion\u00f3 en macOS Sonoma 14.1, iOS 16.7.2 y iPadOS 16.7.2. Visitar un sitio web malicioso puede revelar el historial de navegaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.2",
|
||||
"matchCriteriaId": "3DFB829A-82EA-40BB-81F9-AD4F69F24ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.2",
|
||||
"matchCriteriaId": "5EB9EAAE-441A-4844-BCB2-1716FD9ACE85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.1",
|
||||
"matchCriteriaId": "F9F52915-10F1-4514-B839-F6DC74B53555"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/24",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213981",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213981",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41982",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-10-25T19:15:10.060",
|
||||
"lastModified": "2023-10-26T00:15:11.093",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:27:31.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,55 +14,189 @@
|
||||
"value": "Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1. Un atacante con acceso f\u00edsico puede utilizar Siri para acceder a datos confidenciales del usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.2",
|
||||
"matchCriteriaId": "3DFB829A-82EA-40BB-81F9-AD4F69F24ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "387C5D63-833F-4407-A402-501DEF4E15AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.2",
|
||||
"matchCriteriaId": "5EB9EAAE-441A-4844-BCB2-1716FD9ACE85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "F53A32D0-DB67-40D7-B14E-3963E696A77E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.1",
|
||||
"matchCriteriaId": "F9F52915-10F1-4514-B839-F6DC74B53555"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.1",
|
||||
"matchCriteriaId": "F88E7355-ECFB-4EB0-9579-0C954C25355F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/19",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/24",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/25",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213981",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213982",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213988",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213981",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213982",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/kb/HT213988",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41983",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-10-25T19:15:10.110",
|
||||
"lastModified": "2023-10-26T00:15:11.143",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:30:23.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,39 +14,157 @@
|
||||
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1. El procesamiento de contenido web puede dar lugar a una Denegaci\u00f3n de Servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "84250563-E42D-4F36-ACB0-081804E27FA4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.2",
|
||||
"matchCriteriaId": "3DFB829A-82EA-40BB-81F9-AD4F69F24ABA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "387C5D63-833F-4407-A402-501DEF4E15AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.7.2",
|
||||
"matchCriteriaId": "5EB9EAAE-441A-4844-BCB2-1716FD9ACE85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "17.0",
|
||||
"versionEndExcluding": "17.1",
|
||||
"matchCriteriaId": "F53A32D0-DB67-40D7-B14E-3963E696A77E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.1",
|
||||
"matchCriteriaId": "F9F52915-10F1-4514-B839-F6DC74B53555"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/19",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/23",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/24",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Oct/27",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213981",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213982",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213984",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213986",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-453xx/CVE-2023-45338.json
Normal file
59
CVE-2023/CVE-2023-453xx/CVE-2023-45338.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-45338",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-11-02T15:15:08.433",
|
||||
"lastModified": "2023-11-02T15:15:08.433",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the routers/add-ticket.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/hann",
|
||||
"source": "help@fluidattacks.com"
|
||||
},
|
||||
{
|
||||
"url": "https://projectworlds.in/",
|
||||
"source": "help@fluidattacks.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-453xx/CVE-2023-45345.json
Normal file
59
CVE-2023/CVE-2023-453xx/CVE-2023-45345.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-45345",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-11-02T15:15:08.537",
|
||||
"lastModified": "2023-11-02T15:15:08.537",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_deleted' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/hann",
|
||||
"source": "help@fluidattacks.com"
|
||||
},
|
||||
{
|
||||
"url": "https://projectworlds.in/",
|
||||
"source": "help@fluidattacks.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-453xx/CVE-2023-45346.json
Normal file
59
CVE-2023/CVE-2023-453xx/CVE-2023-45346.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-45346",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-11-02T15:15:08.640",
|
||||
"lastModified": "2023-11-02T15:15:08.640",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_role' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/hann",
|
||||
"source": "help@fluidattacks.com"
|
||||
},
|
||||
{
|
||||
"url": "https://projectworlds.in/",
|
||||
"source": "help@fluidattacks.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-453xx/CVE-2023-45347.json
Normal file
59
CVE-2023/CVE-2023-453xx/CVE-2023-45347.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-45347",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-11-02T15:15:08.747",
|
||||
"lastModified": "2023-11-02T15:15:08.747",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_verified' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/hann",
|
||||
"source": "help@fluidattacks.com"
|
||||
},
|
||||
{
|
||||
"url": "https://projectworlds.in/",
|
||||
"source": "help@fluidattacks.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45990",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-25T18:17:35.553",
|
||||
"lastModified": "2023-10-25T20:31:55.900",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:56:06.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,11 +14,67 @@
|
||||
"value": "La vulnerabilidad de permisos inseguros en WenwenaiCMS v.1.0 permite a un atacante remoto escalar privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wenwen-ai:wenwenai_cms:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "01A97BCE-49D0-460F-9ED6-67F77C20CBAA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PwnCYN/Wenwenai/issues/2",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46070",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-10-25T18:17:35.860",
|
||||
"lastModified": "2023-10-25T20:31:55.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-11-02T15:44:40.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:egeorjon:eg-attachments:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.1.3",
|
||||
"matchCriteriaId": "A57C589D-8681-4F75-9BF3-B1B7833DDEDE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/eg-attachments/wordpress-eg-attachments-plugin-2-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46137",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-10-25T21:15:10.237",
|
||||
"lastModified": "2023-10-25T23:05:15.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-11-02T15:57:53.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -39,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-444"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -50,10 +80,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:twistedmatrix:twisted:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "22.8.0",
|
||||
"matchCriteriaId": "40A991C8-3D50-4216-99C2-A5FC733D28D0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/twisted/twisted/security/advisories/GHSA-xc8x-vp79-p3wm",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46306",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-22T21:15:07.930",
|
||||
"lastModified": "2023-10-23T11:35:01.280",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:47:02.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
@ -38,18 +58,112 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "4.6.0.105",
|
||||
"matchCriteriaId": "0B651903-7598-4F86-B2C1-53923B573509"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netmodule:netmodule_router_software:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.7.0.0",
|
||||
"versionEndExcluding": "4.7.0.103",
|
||||
"matchCriteriaId": "B543F356-8395-4F7E-A3C8-1A5DB362533C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1601:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C90BC32-C405-4178-B944-9CF39C212C46"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A80AE348-C415-4B5F-B359-26E2F2A132F7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb1810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A3CF8E81-2EB5-4CDC-9FC9-CEAF4E1E7514"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EFF579A1-A31C-47F3-912A-43F5B4894497"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb2810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41310FAF-CD23-4126-942D-DA950A96DF3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3701:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "962F7AFA-76A3-4F83-AA2C-AB168C644104"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:nb3800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7120564A-4FE0-403E-A976-9658A665E51A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netmodule:ng800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0408E588-146F-4AD2-9D58-A12EBA83A697"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46396",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-25T18:17:37.957",
|
||||
"lastModified": "2023-10-25T20:31:55.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-11-02T15:03:59.683",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,11 +14,67 @@
|
||||
"value": "Audimex 15.0.0 es vulnerable a Cross Site Scripting (XSS) en /audimex/cgi-bin/wal.fcgi a trav\u00e9s de filtros de b\u00fasqueda de par\u00e1metros de la empresa."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:web-audimex:audimex:15.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AA50C86-D230-4BE1-9E11-787C36B05E7A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/13PK6RnYdq7fJKw47ssgLEsQvzHOJttLL/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-467xx/CVE-2023-46725.json
Normal file
67
CVE-2023/CVE-2023-467xx/CVE-2023-46725.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-46725",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-11-02T15:15:08.847",
|
||||
"lastModified": "2023-11-02T15:15:08.847",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FoodCoopShop is open source software for food coops and local shops. Versions prior to 3.6.1 are vulnerable to server-side request forgery. In the Network module, a manufacturer account can use the `/api/updateProducts.json` endpoint to make the server send a request to an arbitrary host. This means that the server can be used as a proxy into the internal network where the server is. Furthermore, the checks on a valid image are not adequate, leading to a time of check time of use issue. For example, by using a custom server that returns 200 on HEAD requests, then return a valid image on first GET request and then a 302 redirect to final target on second GET request, the server will copy whatever file is at the redirect destination, making this a full SSRF. Version 3.6.1 fixes this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/foodcoopshop/foodcoopshop/commit/0d5bec5c4c22e1affe7fd321a30e3f3a4d99e808",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/foodcoopshop/foodcoopshop/pull/972",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/foodcoopshop/foodcoopshop/security/advisories/GHSA-jhww-fx2j-3rf7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://pastebin.com/8K5Brwbq",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5085",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-10-25T18:17:42.660",
|
||||
"lastModified": "2023-10-25T20:31:55.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-11-02T15:48:39.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -39,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -50,14 +80,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:advanced_menu_widget_project:advanced_menu_widget:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "0.4.1",
|
||||
"matchCriteriaId": "E605C073-53C1-4B9C-893A-AC8E70F05D0B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/advanced-menu-widget/trunk/class-advanced-menu-widget.php?rev=1471917#L74",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5da2dac6-940c-419e-853f-6cfd5d53d427?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5745",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-10-25T18:17:44.700",
|
||||
"lastModified": "2023-10-25T20:31:55.900",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-02T15:43:50.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -16,6 +16,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -39,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -50,14 +80,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:halgatewood:reusable_text_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.5.3",
|
||||
"matchCriteriaId": "02BFBAC8-32BE-49DD-AC7B-E040E8E58AEA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/reusable-text-blocks/tags/1.5.3/text-blocks.php#L319",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0d627ee7-1175-4621-a477-1e9ec2d05eee?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
80
README.md
80
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-02T15:00:19.430882+00:00
|
||||
2023-11-02T17:00:19.547330+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-02T14:58:19.950000+00:00
|
||||
2023-11-02T16:15:08.773000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,58 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
229624
|
||||
229635
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `34`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
* [CVE-2023-45334](CVE-2023/CVE-2023-453xx/CVE-2023-45334.json) (`2023-11-02T14:15:12.397`)
|
||||
* [CVE-2023-45335](CVE-2023/CVE-2023-453xx/CVE-2023-45335.json) (`2023-11-02T14:15:12.473`)
|
||||
* [CVE-2023-45336](CVE-2023/CVE-2023-453xx/CVE-2023-45336.json) (`2023-11-02T14:15:12.543`)
|
||||
* [CVE-2023-45337](CVE-2023/CVE-2023-453xx/CVE-2023-45337.json) (`2023-11-02T14:15:12.627`)
|
||||
* [CVE-2023-45339](CVE-2023/CVE-2023-453xx/CVE-2023-45339.json) (`2023-11-02T14:15:12.713`)
|
||||
* [CVE-2023-45340](CVE-2023/CVE-2023-453xx/CVE-2023-45340.json) (`2023-11-02T14:15:12.793`)
|
||||
* [CVE-2023-45341](CVE-2023/CVE-2023-453xx/CVE-2023-45341.json) (`2023-11-02T14:15:12.870`)
|
||||
* [CVE-2023-45342](CVE-2023/CVE-2023-453xx/CVE-2023-45342.json) (`2023-11-02T14:15:12.957`)
|
||||
* [CVE-2023-45343](CVE-2023/CVE-2023-453xx/CVE-2023-45343.json) (`2023-11-02T14:15:13.033`)
|
||||
* [CVE-2023-45344](CVE-2023/CVE-2023-453xx/CVE-2023-45344.json) (`2023-11-02T14:15:13.113`)
|
||||
* [CVE-2023-5919](CVE-2023/CVE-2023-59xx/CVE-2023-5919.json) (`2023-11-02T14:15:13.190`)
|
||||
* [CVE-2023-46475](CVE-2023/CVE-2023-464xx/CVE-2023-46475.json) (`2023-11-02T13:15:08.413`)
|
||||
* [CVE-2023-26452](CVE-2023/CVE-2023-264xx/CVE-2023-26452.json) (`2023-11-02T14:15:10.647`)
|
||||
* [CVE-2023-26453](CVE-2023/CVE-2023-264xx/CVE-2023-26453.json) (`2023-11-02T14:15:10.737`)
|
||||
* [CVE-2023-26454](CVE-2023/CVE-2023-264xx/CVE-2023-26454.json) (`2023-11-02T14:15:10.807`)
|
||||
* [CVE-2023-26455](CVE-2023/CVE-2023-264xx/CVE-2023-26455.json) (`2023-11-02T14:15:10.873`)
|
||||
* [CVE-2023-26456](CVE-2023/CVE-2023-264xx/CVE-2023-26456.json) (`2023-11-02T14:15:10.940`)
|
||||
* [CVE-2023-29043](CVE-2023/CVE-2023-290xx/CVE-2023-29043.json) (`2023-11-02T14:15:11.017`)
|
||||
* [CVE-2023-29044](CVE-2023/CVE-2023-290xx/CVE-2023-29044.json) (`2023-11-02T14:15:11.087`)
|
||||
* [CVE-2023-29045](CVE-2023/CVE-2023-290xx/CVE-2023-29045.json) (`2023-11-02T14:15:11.153`)
|
||||
* [CVE-2023-29046](CVE-2023/CVE-2023-290xx/CVE-2023-29046.json) (`2023-11-02T14:15:11.217`)
|
||||
* [CVE-2023-29047](CVE-2023/CVE-2023-290xx/CVE-2023-29047.json) (`2023-11-02T14:15:11.280`)
|
||||
* [CVE-2023-42802](CVE-2023/CVE-2023-428xx/CVE-2023-42802.json) (`2023-11-02T14:15:11.440`)
|
||||
* [CVE-2023-45323](CVE-2023/CVE-2023-453xx/CVE-2023-45323.json) (`2023-11-02T14:15:11.540`)
|
||||
* [CVE-2023-45324](CVE-2023/CVE-2023-453xx/CVE-2023-45324.json) (`2023-11-02T14:15:11.627`)
|
||||
* [CVE-2022-4900](CVE-2022/CVE-2022-49xx/CVE-2022-4900.json) (`2023-11-02T16:15:08.700`)
|
||||
* [CVE-2023-38469](CVE-2023/CVE-2023-384xx/CVE-2023-38469.json) (`2023-11-02T15:15:08.167`)
|
||||
* [CVE-2023-38470](CVE-2023/CVE-2023-384xx/CVE-2023-38470.json) (`2023-11-02T15:15:08.237`)
|
||||
* [CVE-2023-38471](CVE-2023/CVE-2023-384xx/CVE-2023-38471.json) (`2023-11-02T15:15:08.300`)
|
||||
* [CVE-2023-38472](CVE-2023/CVE-2023-384xx/CVE-2023-38472.json) (`2023-11-02T15:15:08.363`)
|
||||
* [CVE-2023-45338](CVE-2023/CVE-2023-453xx/CVE-2023-45338.json) (`2023-11-02T15:15:08.433`)
|
||||
* [CVE-2023-45345](CVE-2023/CVE-2023-453xx/CVE-2023-45345.json) (`2023-11-02T15:15:08.537`)
|
||||
* [CVE-2023-45346](CVE-2023/CVE-2023-453xx/CVE-2023-45346.json) (`2023-11-02T15:15:08.640`)
|
||||
* [CVE-2023-45347](CVE-2023/CVE-2023-453xx/CVE-2023-45347.json) (`2023-11-02T15:15:08.747`)
|
||||
* [CVE-2023-46725](CVE-2023/CVE-2023-467xx/CVE-2023-46725.json) (`2023-11-02T15:15:08.847`)
|
||||
* [CVE-2023-38473](CVE-2023/CVE-2023-384xx/CVE-2023-38473.json) (`2023-11-02T16:15:08.773`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `14`
|
||||
Recently modified CVEs: `20`
|
||||
|
||||
* [CVE-2023-46542](CVE-2023/CVE-2023-465xx/CVE-2023-46542.json) (`2023-11-02T13:09:06.287`)
|
||||
* [CVE-2023-26219](CVE-2023/CVE-2023-262xx/CVE-2023-26219.json) (`2023-11-02T13:37:04.960`)
|
||||
* [CVE-2023-40413](CVE-2023/CVE-2023-404xx/CVE-2023-40413.json) (`2023-11-02T13:42:12.037`)
|
||||
* [CVE-2023-40416](CVE-2023/CVE-2023-404xx/CVE-2023-40416.json) (`2023-11-02T13:42:32.227`)
|
||||
* [CVE-2023-40421](CVE-2023/CVE-2023-404xx/CVE-2023-40421.json) (`2023-11-02T13:43:35.880`)
|
||||
* [CVE-2023-40423](CVE-2023/CVE-2023-404xx/CVE-2023-40423.json) (`2023-11-02T13:47:56.877`)
|
||||
* [CVE-2023-40408](CVE-2023/CVE-2023-404xx/CVE-2023-40408.json) (`2023-11-02T13:55:14.533`)
|
||||
* [CVE-2023-40425](CVE-2023/CVE-2023-404xx/CVE-2023-40425.json) (`2023-11-02T13:59:35.740`)
|
||||
* [CVE-2023-32359](CVE-2023/CVE-2023-323xx/CVE-2023-32359.json) (`2023-11-02T14:03:20.657`)
|
||||
* [CVE-2023-40445](CVE-2023/CVE-2023-404xx/CVE-2023-40445.json) (`2023-11-02T14:05:24.197`)
|
||||
* [CVE-2023-40444](CVE-2023/CVE-2023-404xx/CVE-2023-40444.json) (`2023-11-02T14:10:10.940`)
|
||||
* [CVE-2023-3972](CVE-2023/CVE-2023-39xx/CVE-2023-3972.json) (`2023-11-02T14:15:11.350`)
|
||||
* [CVE-2023-40447](CVE-2023/CVE-2023-404xx/CVE-2023-40447.json) (`2023-11-02T14:55:49.397`)
|
||||
* [CVE-2023-40449](CVE-2023/CVE-2023-404xx/CVE-2023-40449.json) (`2023-11-02T14:58:19.950`)
|
||||
* [CVE-2021-39289](CVE-2021/CVE-2021-392xx/CVE-2021-39289.json) (`2023-11-02T15:45:31.337`)
|
||||
* [CVE-2021-39291](CVE-2021/CVE-2021-392xx/CVE-2021-39291.json) (`2023-11-02T15:47:22.630`)
|
||||
* [CVE-2021-39290](CVE-2021/CVE-2021-392xx/CVE-2021-39290.json) (`2023-11-02T15:48:19.867`)
|
||||
* [CVE-2023-46396](CVE-2023/CVE-2023-463xx/CVE-2023-46396.json) (`2023-11-02T15:03:59.683`)
|
||||
* [CVE-2023-41072](CVE-2023/CVE-2023-410xx/CVE-2023-41072.json) (`2023-11-02T15:05:05.677`)
|
||||
* [CVE-2023-41077](CVE-2023/CVE-2023-410xx/CVE-2023-41077.json) (`2023-11-02T15:14:27.267`)
|
||||
* [CVE-2023-41254](CVE-2023/CVE-2023-412xx/CVE-2023-41254.json) (`2023-11-02T15:20:39.743`)
|
||||
* [CVE-2023-41975](CVE-2023/CVE-2023-419xx/CVE-2023-41975.json) (`2023-11-02T15:22:55.217`)
|
||||
* [CVE-2023-41976](CVE-2023/CVE-2023-419xx/CVE-2023-41976.json) (`2023-11-02T15:25:34.153`)
|
||||
* [CVE-2023-41977](CVE-2023/CVE-2023-419xx/CVE-2023-41977.json) (`2023-11-02T15:26:41.280`)
|
||||
* [CVE-2023-41982](CVE-2023/CVE-2023-419xx/CVE-2023-41982.json) (`2023-11-02T15:27:31.617`)
|
||||
* [CVE-2023-41983](CVE-2023/CVE-2023-419xx/CVE-2023-41983.json) (`2023-11-02T15:30:23.233`)
|
||||
* [CVE-2023-5745](CVE-2023/CVE-2023-57xx/CVE-2023-5745.json) (`2023-11-02T15:43:50.047`)
|
||||
* [CVE-2023-46070](CVE-2023/CVE-2023-460xx/CVE-2023-46070.json) (`2023-11-02T15:44:40.137`)
|
||||
* [CVE-2023-0861](CVE-2023/CVE-2023-08xx/CVE-2023-0861.json) (`2023-11-02T15:44:53.700`)
|
||||
* [CVE-2023-46306](CVE-2023/CVE-2023-463xx/CVE-2023-46306.json) (`2023-11-02T15:47:02.097`)
|
||||
* [CVE-2023-0862](CVE-2023/CVE-2023-08xx/CVE-2023-0862.json) (`2023-11-02T15:47:45.223`)
|
||||
* [CVE-2023-5085](CVE-2023/CVE-2023-50xx/CVE-2023-5085.json) (`2023-11-02T15:48:39.863`)
|
||||
* [CVE-2023-45990](CVE-2023/CVE-2023-459xx/CVE-2023-45990.json) (`2023-11-02T15:56:06.930`)
|
||||
* [CVE-2023-46137](CVE-2023/CVE-2023-461xx/CVE-2023-46137.json) (`2023-11-02T15:57:53.777`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user