mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-01-31T19:00:25.051961+00:00
This commit is contained in:
parent
4da8a5ef7b
commit
8efc4ea2fb
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-3156",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-01-26T21:15:12.987",
|
||||
"lastModified": "2024-01-30T21:15:08.140",
|
||||
"lastModified": "2024-01-31T18:15:45.590",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2022-04-06",
|
||||
"cisaActionDue": "2022-04-27",
|
||||
@ -507,6 +507,10 @@
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Feb/42",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,19 +2,80 @@
|
||||
"id": "CVE-2021-42145",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-24T19:15:08.420",
|
||||
"lastModified": "2024-01-24T19:43:42.640",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-31T18:56:08.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An assertion failure discovered in in check_certificate_request() in Contiki-NG tinyDTLS through master branch 53a0d97 allows attackers to cause a denial of service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un error de aserci\u00f3n descubierto en check_certificate_request() en Contiki-NG tinyDTLS a trav\u00e9s de la rama maestra 53a0d97 permite a los atacantes provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:contiki-ng:tinydtls:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2018-08-30",
|
||||
"matchCriteriaId": "E938DF84-2663-4516-87E3-B7E46789F6A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2024/Jan/18",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39046",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-08-31T06:15:07.467",
|
||||
"lastModified": "2024-01-30T21:15:08.370",
|
||||
"lastModified": "2024-01-31T18:15:45.807",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -238,6 +238,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/01/30/6",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2312",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:10.017",
|
||||
"lastModified": "2023-08-27T03:15:14.130",
|
||||
"lastModified": "2024-01-31T17:15:10.973",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -103,6 +103,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2929",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:09.997",
|
||||
"lastModified": "2023-11-25T11:15:15.580",
|
||||
"lastModified": "2024-01-31T17:15:11.073",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2930",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.067",
|
||||
"lastModified": "2023-11-25T11:15:15.670",
|
||||
"lastModified": "2024-01-31T17:15:11.153",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2931",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.117",
|
||||
"lastModified": "2023-11-25T11:15:15.740",
|
||||
"lastModified": "2024-01-31T17:15:11.213",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2932",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.167",
|
||||
"lastModified": "2023-11-25T11:15:15.810",
|
||||
"lastModified": "2024-01-31T17:15:11.270",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2933",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.210",
|
||||
"lastModified": "2023-11-25T11:15:15.953",
|
||||
"lastModified": "2024-01-31T17:15:11.323",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2934",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.257",
|
||||
"lastModified": "2023-11-25T11:15:16.073",
|
||||
"lastModified": "2024-01-31T17:15:11.383",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2935",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.307",
|
||||
"lastModified": "2023-11-25T11:15:16.207",
|
||||
"lastModified": "2024-01-31T17:15:11.440",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2936",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.350",
|
||||
"lastModified": "2023-11-25T11:15:16.297",
|
||||
"lastModified": "2024-01-31T17:15:11.500",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2937",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.393",
|
||||
"lastModified": "2023-11-25T11:15:16.367",
|
||||
"lastModified": "2024-01-31T17:15:11.553",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2938",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.433",
|
||||
"lastModified": "2023-11-25T11:15:16.453",
|
||||
"lastModified": "2024-01-31T17:15:11.607",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2939",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.477",
|
||||
"lastModified": "2023-11-25T11:15:16.533",
|
||||
"lastModified": "2024-01-31T17:15:11.687",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -97,6 +97,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2940",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.527",
|
||||
"lastModified": "2023-11-25T11:15:16.777",
|
||||
"lastModified": "2024-01-31T17:15:11.807",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2941",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.570",
|
||||
"lastModified": "2023-11-25T11:15:16.860",
|
||||
"lastModified": "2024-01-31T17:15:11.863",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5418",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3079",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-06-05T22:15:12.383",
|
||||
"lastModified": "2023-12-14T16:15:45.310",
|
||||
"lastModified": "2024-01-31T17:15:11.930",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-06-07",
|
||||
"cisaActionDue": "2023-06-28",
|
||||
@ -142,6 +142,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3214",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-06-13T18:15:22.170",
|
||||
"lastModified": "2023-11-25T11:15:18.360",
|
||||
"lastModified": "2024-01-31T17:15:12.020",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5428",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3215",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-06-13T18:15:22.223",
|
||||
"lastModified": "2023-11-25T11:15:18.457",
|
||||
"lastModified": "2024-01-31T17:15:12.093",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -123,6 +123,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5428",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3216",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-06-13T18:15:22.273",
|
||||
"lastModified": "2023-11-25T11:15:18.547",
|
||||
"lastModified": "2024-01-31T17:15:12.160",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -123,6 +123,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5428",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3217",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-06-13T18:15:22.320",
|
||||
"lastModified": "2023-11-25T11:15:18.630",
|
||||
"lastModified": "2024-01-31T17:15:12.227",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -127,6 +127,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5428",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3420",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-06-26T21:15:09.557",
|
||||
"lastModified": "2023-07-04T04:15:11.653",
|
||||
"lastModified": "2024-01-31T17:15:12.290",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5440",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3421",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-06-26T21:15:09.597",
|
||||
"lastModified": "2023-09-25T19:15:09.827",
|
||||
"lastModified": "2024-01-31T17:15:12.373",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5440",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3422",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-06-26T21:15:09.640",
|
||||
"lastModified": "2023-07-04T04:15:12.673",
|
||||
"lastModified": "2024-01-31T17:15:12.510",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5440",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35836",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-23T23:15:08.000",
|
||||
"lastModified": "2024-01-24T13:49:03.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-31T18:38:16.887",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,23 +14,101 @@
|
||||
"value": "Se descubri\u00f3 un problema en SolaX Pocket WiFi 3 hasta 3.001.02. Un atacante dentro del alcance de RF puede obtener una copia en texto plano de la configuraci\u00f3n de red del dispositivo, incluido el Wi-Fi PSK, durante la instalaci\u00f3n y reconfiguraci\u00f3n del dispositivo. Si tiene \u00e9xito, el atacante puede infiltrarse a\u00fan m\u00e1s en las redes Wi-Fi del objetivo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:solax:pocket_wifi_3_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndIncluding": "3.009.03_20230504",
|
||||
"matchCriteriaId": "FAA04768-4E31-414A-A19C-855B1E1D8CCE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:solax:pocket_wifi_3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "112442CA-E44E-4C2B-95C3-9162E56B9F16"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.solaxpower.com/downloads/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.solaxpower.com/help/upgrading-the-pocket-wifi-firmware/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://yougottahackthat.com/blog/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://yougottahackthat.com/blog/1370/solax-inverters-pocket-wifi-using-poor-authentication",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-35837",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-23T23:15:08.050",
|
||||
"lastModified": "2024-01-24T13:49:03.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-31T18:25:21.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -14,23 +14,101 @@
|
||||
"value": "Se descubri\u00f3 un problema en SolaX Pocket WiFi 3 hasta 3.001.02. La autenticaci\u00f3n para la interfaz web se completa a trav\u00e9s de un AP WiFi no autenticado. La contrase\u00f1a administrativa para la interfaz web tiene una contrase\u00f1a predeterminada, igual al ID de registro del dispositivo. Este mismo ID de registro se utiliza como nombre SSID de WiFi. No existe ninguna rutina para forzar un cambio en esta contrase\u00f1a en el primer uso o para informar al usuario sobre su estado predeterminado. Una vez autenticado, un atacante puede reconfigurar el dispositivo o cargar un nuevo firmware, lo cual puede provocar una denegaci\u00f3n de servicio, ejecuci\u00f3n de c\u00f3digo o escalada de privilegios."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:solax:pocket_wifi_3_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndIncluding": "3.009.03_20230504",
|
||||
"matchCriteriaId": "FAA04768-4E31-414A-A19C-855B1E1D8CCE"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:solax:pocket_wifi_3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "112442CA-E44E-4C2B-95C3-9162E56B9F16"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.solaxpower.com/downloads/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.solaxpower.com/help/upgrading-the-pocket-wifi-firmware/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://yougottahackthat.com/blog/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://yougottahackthat.com/blog/1370/solax-inverters-pocket-wifi-using-poor-authentication",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37679",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-03T03:15:10.697",
|
||||
"lastModified": "2023-08-07T19:37:34.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T18:15:45.940",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -82,6 +82,10 @@
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ihteam.net/advisory/mirth-connect",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3727",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:31.320",
|
||||
"lastModified": "2023-08-12T06:16:32.627",
|
||||
"lastModified": "2024-01-31T17:15:12.590",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3728",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:31.490",
|
||||
"lastModified": "2023-08-12T06:16:40.940",
|
||||
"lastModified": "2024-01-31T17:15:12.677",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -86,6 +86,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3730",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:31.857",
|
||||
"lastModified": "2023-08-12T06:16:41.433",
|
||||
"lastModified": "2024-01-31T17:15:12.737",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -86,6 +86,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3732",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:32.247",
|
||||
"lastModified": "2023-08-18T17:15:09.997",
|
||||
"lastModified": "2024-01-31T17:15:12.800",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,6 +90,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3733",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:32.443",
|
||||
"lastModified": "2023-08-12T06:17:57.680",
|
||||
"lastModified": "2024-01-31T17:15:12.870",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,6 +85,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-3734",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:32.607",
|
||||
"lastModified": "2023-08-12T06:18:29.297",
|
||||
"lastModified": "2024-01-31T17:15:12.930",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La implementaci\u00f3n inadecuada de Picture In Picture en Google Chrome anterior a la versi\u00f3n 115.0.5790.98 permit\u00eda a un atacante remoto falsificar potencialmente el contenido de la Omnibox (barra de URL) a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -85,6 +89,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-3735",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:32.773",
|
||||
"lastModified": "2023-08-12T06:18:29.783",
|
||||
"lastModified": "2024-01-31T17:15:13.000",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La implementaci\u00f3n inadecuada de las Solicitudes de Permiso de la API Web en Google Chrome anteriores a la versi\u00f3n 115.0.5790.98 permit\u00eda a un atacante remoto ocultar la interfaz de usuario de seguridad a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -85,6 +89,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-3736",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:33.013",
|
||||
"lastModified": "2023-08-12T06:19:05.223",
|
||||
"lastModified": "2024-01-31T17:15:13.063",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La implementaci\u00f3n inadecuada de las Pesta\u00f1as Personalizadas en Google Chrome en Android antes de la versi\u00f3n 115.0.5790.98 permit\u00eda a un atacante remoto filtrar datos de origen cruzado a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -97,6 +101,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-3737",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:33.177",
|
||||
"lastModified": "2023-08-12T06:19:06.317",
|
||||
"lastModified": "2024-01-31T17:15:13.123",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una implementaci\u00f3n inadecuada en Notificaciones en Google Chrome anterior a 115.0.5790.98 permit\u00eda a un atacante remoto falsificar el contenido de las notificaciones multimedia a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -85,6 +89,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3738",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:33.427",
|
||||
"lastModified": "2023-08-12T06:19:07.383",
|
||||
"lastModified": "2024-01-31T17:15:13.183",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,6 +84,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-3740",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:33.793",
|
||||
"lastModified": "2023-08-12T06:19:08.517",
|
||||
"lastModified": "2024-01-31T17:15:13.297",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n insuficiente de entradas no fiables en los Temas de Google Chrome anteriores a la versi\u00f3n 115.0.5790.98 permit\u00eda a un atacante remoto servir contenido malicioso a un usuario a trav\u00e9s de una URL de fondo manipulada. (Gravedad de seguridad de Chromium: Baja)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -85,6 +89,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4068",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.513",
|
||||
"lastModified": "2023-12-22T13:15:09.043",
|
||||
"lastModified": "2024-01-31T17:15:13.627",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4069",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.583",
|
||||
"lastModified": "2023-12-22T13:15:09.140",
|
||||
"lastModified": "2024-01-31T17:15:13.707",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4070",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.647",
|
||||
"lastModified": "2023-12-22T13:15:09.207",
|
||||
"lastModified": "2024-01-31T17:15:13.767",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4071",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.710",
|
||||
"lastModified": "2023-12-22T13:15:09.273",
|
||||
"lastModified": "2024-01-31T17:15:13.823",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4072",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.773",
|
||||
"lastModified": "2023-12-22T13:15:09.327",
|
||||
"lastModified": "2024-01-31T17:15:13.883",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -96,6 +96,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4073",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.840",
|
||||
"lastModified": "2023-12-22T13:15:09.387",
|
||||
"lastModified": "2024-01-31T17:15:13.947",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -133,6 +133,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4074",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.903",
|
||||
"lastModified": "2023-12-22T13:15:09.453",
|
||||
"lastModified": "2024-01-31T17:15:14.080",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4075",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.973",
|
||||
"lastModified": "2023-12-22T13:15:09.517",
|
||||
"lastModified": "2024-01-31T17:15:14.137",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4076",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:12.037",
|
||||
"lastModified": "2023-12-22T13:15:09.583",
|
||||
"lastModified": "2024-01-31T17:15:14.197",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4077",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:12.100",
|
||||
"lastModified": "2023-12-22T13:15:09.647",
|
||||
"lastModified": "2024-01-31T17:15:14.250",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4078",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:12.167",
|
||||
"lastModified": "2023-12-22T13:15:09.707",
|
||||
"lastModified": "2024-01-31T17:15:14.310",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,19 +2,79 @@
|
||||
"id": "CVE-2023-41474",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-25T20:15:36.993",
|
||||
"lastModified": "2024-01-25T21:52:01.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-31T18:54:51.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Directory Traversal vulnerability in Ivanti Avalanche 6.3.4.153 allows a remote authenticated attacker to obtain sensitive information via the javax.faces.resource component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de directory traversal en Ivanti Avalanche 6.3.4.153 permite a un atacante remoto autenticado obtener informaci\u00f3n confidencial a trav\u00e9s del componente javax.faces.resource."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4.153:*:*:*:premise:*:*:*",
|
||||
"matchCriteriaId": "F5A7D50A-DD35-40B6-B4AD-8703DB016E90"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/JBalanza/CVE-2023-41474",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-43208",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-10-26T17:15:09.033",
|
||||
"lastModified": "2023-11-04T01:50:43.173",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T18:15:46.020",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -69,6 +69,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.horizon3.ai/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4349",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:10.950",
|
||||
"lastModified": "2023-08-27T03:15:14.293",
|
||||
"lastModified": "2024-01-31T17:15:14.370",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -116,6 +116,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4350",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.103",
|
||||
"lastModified": "2023-08-27T03:15:14.490",
|
||||
"lastModified": "2024-01-31T17:15:14.447",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,6 +129,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4351",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.260",
|
||||
"lastModified": "2023-08-27T03:15:14.647",
|
||||
"lastModified": "2024-01-31T17:15:14.517",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4352",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.463",
|
||||
"lastModified": "2023-10-30T19:41:46.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:14.573",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +136,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4353",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.613",
|
||||
"lastModified": "2023-08-27T03:15:15.140",
|
||||
"lastModified": "2024-01-31T17:15:14.650",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4354",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.763",
|
||||
"lastModified": "2023-10-12T02:56:56.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:14.710",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -144,6 +144,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4355",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:11.923",
|
||||
"lastModified": "2023-10-13T01:01:41.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:14.840",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -144,6 +144,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4356",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.090",
|
||||
"lastModified": "2023-08-27T03:15:16.880",
|
||||
"lastModified": "2024-01-31T17:15:14.917",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4357",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.247",
|
||||
"lastModified": "2023-08-27T03:15:23.483",
|
||||
"lastModified": "2024-01-31T17:15:14.977",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4358",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.397",
|
||||
"lastModified": "2023-08-27T03:15:23.727",
|
||||
"lastModified": "2024-01-31T17:15:15.053",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4359",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.637",
|
||||
"lastModified": "2023-08-27T03:15:23.957",
|
||||
"lastModified": "2024-01-31T17:15:15.147",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,6 +129,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4360",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.863",
|
||||
"lastModified": "2023-08-27T03:15:25.467",
|
||||
"lastModified": "2024-01-31T17:15:15.233",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4361",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:12.960",
|
||||
"lastModified": "2023-08-27T03:15:26.063",
|
||||
"lastModified": "2024-01-31T17:15:15.307",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,6 +129,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4362",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.030",
|
||||
"lastModified": "2023-08-27T03:15:27.143",
|
||||
"lastModified": "2024-01-31T17:15:15.390",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -112,6 +112,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4363",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.113",
|
||||
"lastModified": "2023-08-27T03:15:28.827",
|
||||
"lastModified": "2024-01-31T17:15:15.463",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,6 +129,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4364",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.217",
|
||||
"lastModified": "2023-08-27T03:15:29.733",
|
||||
"lastModified": "2024-01-31T17:15:15.540",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4365",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.290",
|
||||
"lastModified": "2023-08-27T03:15:30.660",
|
||||
"lastModified": "2024-01-31T17:15:15.610",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4366",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.413",
|
||||
"lastModified": "2023-08-27T03:15:31.313",
|
||||
"lastModified": "2024-01-31T17:15:15.737",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -117,6 +117,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4367",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.520",
|
||||
"lastModified": "2023-08-27T03:15:31.833",
|
||||
"lastModified": "2024-01-31T17:15:15.890",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -116,6 +116,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4368",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-15T18:15:13.597",
|
||||
"lastModified": "2023-08-27T03:15:32.420",
|
||||
"lastModified": "2024-01-31T17:15:15.970",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -112,6 +112,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5479",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-44312",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-01-31T09:15:43.693",
|
||||
"lastModified": "2024-01-31T14:05:19.990",
|
||||
"lastModified": "2024-01-31T18:15:46.110",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/01/31/5",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/dkvlgnrmc17qzjdy9k0cr60wpzcssk1s",
|
||||
"source": "security@apache.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-44313",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-01-31T09:15:43.920",
|
||||
"lastModified": "2024-01-31T14:05:19.990",
|
||||
"lastModified": "2024-01-31T18:15:46.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,6 +51,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/01/31/4",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/kxovd455o9h4f2v811hcov2qknbwld5r",
|
||||
"source": "security@apache.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4427",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-23T00:15:09.073",
|
||||
"lastModified": "2023-10-13T01:12:47.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:16.043",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -141,6 +141,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5483",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4428",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-23T00:15:09.157",
|
||||
"lastModified": "2023-10-30T19:41:27.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:16.127",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5483",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4429",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-23T00:15:09.227",
|
||||
"lastModified": "2023-10-30T19:41:10.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:16.200",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5483",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4430",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-23T00:15:09.290",
|
||||
"lastModified": "2023-10-30T19:40:57.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:16.270",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5483",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4431",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-23T00:15:09.353",
|
||||
"lastModified": "2023-10-13T01:13:53.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:16.343",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -152,6 +152,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5483",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4572",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-29T20:15:10.480",
|
||||
"lastModified": "2023-10-30T19:38:38.793",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:16.437",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5487",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
63
CVE-2023/CVE-2023-471xx/CVE-2023-47116.json
Normal file
63
CVE-2023/CVE-2023-471xx/CVE-2023-47116.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-47116",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-01-31T17:15:13.370",
|
||||
"lastModified": "2024-01-31T17:15:13.370",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Label Studio is a popular open source data labeling tool. The vulnerability affects all versions of Label Studio prior to 1.11.0 and was tested on version 1.8.2. Label Studio's SSRF protections that can be enabled by setting the `SSRF_PROTECTION_ENABLED` environment variable can be bypassed to access internal web servers. This is because the current SSRF validation is done by executing a single DNS lookup to verify that the IP address is not in an excluded subnet range. This protection can be bypassed by either using HTTP redirection or performing a DNS rebinding attack."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HumanSignal/label-studio/commit/55dd6af4716b92f2bb213fe461d1ffbc380c6a64",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4761",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.583",
|
||||
"lastModified": "2023-12-22T13:15:09.790",
|
||||
"lastModified": "2024-01-31T17:15:16.553",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -160,6 +160,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4762",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.677",
|
||||
"lastModified": "2023-12-22T13:15:09.940",
|
||||
"lastModified": "2024-01-31T17:15:16.667",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -165,6 +165,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4763",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.777",
|
||||
"lastModified": "2023-12-22T13:15:10.020",
|
||||
"lastModified": "2024-01-31T17:15:16.743",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -124,6 +124,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4764",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.883",
|
||||
"lastModified": "2023-12-22T13:15:10.100",
|
||||
"lastModified": "2024-01-31T17:15:16.827",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -124,6 +124,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4900",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T21:15:08.537",
|
||||
"lastModified": "2023-10-17T20:12:54.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:16.900",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -162,6 +162,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5499",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4901",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T21:15:08.603",
|
||||
"lastModified": "2023-10-17T20:13:09.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:16.987",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -145,6 +145,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5499",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4902",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T21:15:08.657",
|
||||
"lastModified": "2023-10-17T20:13:29.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:17.070",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5499",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4903",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T21:15:08.717",
|
||||
"lastModified": "2023-10-17T20:14:02.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:17.143",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -162,6 +162,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5499",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4904",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T21:15:08.777",
|
||||
"lastModified": "2023-10-17T19:51:00.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:17.417",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5499",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4905",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T21:15:08.837",
|
||||
"lastModified": "2023-10-17T19:54:42.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:17.590",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5499",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4906",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T21:15:08.893",
|
||||
"lastModified": "2023-10-17T20:02:16.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:17.670",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5499",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4907",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T21:15:08.950",
|
||||
"lastModified": "2023-10-17T20:02:45.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:17.750",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -162,6 +162,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5499",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4908",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T21:15:09.010",
|
||||
"lastModified": "2023-10-17T20:02:51.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:17.827",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5499",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4909",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-12T21:15:09.073",
|
||||
"lastModified": "2023-10-17T20:14:06.793",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:17.910",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -150,6 +150,10 @@
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5499",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
55
CVE-2023/CVE-2023-501xx/CVE-2023-50165.json
Normal file
55
CVE-2023/CVE-2023-501xx/CVE-2023-50165.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-50165",
|
||||
"sourceIdentifier": "security@pega.com",
|
||||
"published": "2024-01-31T18:15:46.320",
|
||||
"lastModified": "2024-01-31T18:15:46.320",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pega Platform versions 8.2.1 to Infinity 23.1.0 are affected by an Generated PDF issue that could expose file contents."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@pega.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@pega.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.pega.com/support-doc/pega-security-advisory-g23-vulnerability-remediation-note",
|
||||
"source": "security@pega.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-501xx/CVE-2023-50166.json
Normal file
55
CVE-2023/CVE-2023-501xx/CVE-2023-50166.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-50166",
|
||||
"sourceIdentifier": "security@pega.com",
|
||||
"published": "2024-01-31T18:15:46.513",
|
||||
"lastModified": "2024-01-31T18:15:46.513",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pega Platform from 8.5.4 to 8.8.3 is affected by an XSS issue with an unauthenticated user and the redirect parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@pega.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@pega.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.pega.com/support-doc/pega-security-advisory-h23-vulnerability-remediation-note",
|
||||
"source": "security@pega.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5186",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-28T16:15:10.760",
|
||||
"lastModified": "2023-10-12T02:46:12.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:17.980",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -153,6 +153,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5508",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5187",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-28T16:15:10.883",
|
||||
"lastModified": "2023-10-12T02:45:40.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-01-31T17:15:18.097",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -153,6 +153,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202401-34",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5508",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-52355",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-25T20:15:38.353",
|
||||
"lastModified": "2024-01-25T21:52:01.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-01-31T17:59:49.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 un fallo de falta de memoria en libtiff que podr\u00eda activarse al pasar un archivo tiff dise\u00f1ado a la API TIFFRasterScanlineSize64(). Este fallo permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de una entrada manipulada con un tama\u00f1o inferior a 379 KB."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
@ -46,18 +80,68 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2023-11-11",
|
||||
"matchCriteriaId": "167987A3-B58C-44D8-8594-C992CB238723"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-52355",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251326",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/libtiff/libtiff/-/issues/621",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user