Auto-Update: 2024-01-31T19:00:25.051961+00:00

This commit is contained in:
cad-safe-bot 2024-01-31 19:00:28 +00:00
parent 4da8a5ef7b
commit 8efc4ea2fb
202 changed files with 3863 additions and 372 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-3156",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-26T21:15:12.987",
"lastModified": "2024-01-30T21:15:08.140",
"lastModified": "2024-01-31T18:15:45.590",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-04-06",
"cisaActionDue": "2022-04-27",
@ -507,6 +507,10 @@
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2021/Feb/42",
"source": "cve@mitre.org",

View File

@ -2,19 +2,80 @@
"id": "CVE-2021-42145",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-24T19:15:08.420",
"lastModified": "2024-01-24T19:43:42.640",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-31T18:56:08.913",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An assertion failure discovered in in check_certificate_request() in Contiki-NG tinyDTLS through master branch 53a0d97 allows attackers to cause a denial of service."
},
{
"lang": "es",
"value": "Un error de aserci\u00f3n descubierto en check_certificate_request() en Contiki-NG tinyDTLS a trav\u00e9s de la rama maestra 53a0d97 permite a los atacantes provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:contiki-ng:tinydtls:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2018-08-30",
"matchCriteriaId": "E938DF84-2663-4516-87E3-B7E46789F6A1"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://seclists.org/fulldisclosure/2024/Jan/18",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39046",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-31T06:15:07.467",
"lastModified": "2024-01-30T21:15:08.370",
"lastModified": "2024-01-31T18:15:45.807",
"vulnStatus": "Modified",
"descriptions": [
{
@ -238,6 +238,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/30/6",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2312",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:10.017",
"lastModified": "2023-08-27T03:15:14.130",
"lastModified": "2024-01-31T17:15:10.973",
"vulnStatus": "Modified",
"descriptions": [
{
@ -103,6 +103,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2929",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:09.997",
"lastModified": "2023-11-25T11:15:15.580",
"lastModified": "2024-01-31T17:15:11.073",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2930",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.067",
"lastModified": "2023-11-25T11:15:15.670",
"lastModified": "2024-01-31T17:15:11.153",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2931",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.117",
"lastModified": "2023-11-25T11:15:15.740",
"lastModified": "2024-01-31T17:15:11.213",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2932",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.167",
"lastModified": "2023-11-25T11:15:15.810",
"lastModified": "2024-01-31T17:15:11.270",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2933",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.210",
"lastModified": "2023-11-25T11:15:15.953",
"lastModified": "2024-01-31T17:15:11.323",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2934",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.257",
"lastModified": "2023-11-25T11:15:16.073",
"lastModified": "2024-01-31T17:15:11.383",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2935",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.307",
"lastModified": "2023-11-25T11:15:16.207",
"lastModified": "2024-01-31T17:15:11.440",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2936",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.350",
"lastModified": "2023-11-25T11:15:16.297",
"lastModified": "2024-01-31T17:15:11.500",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2937",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.393",
"lastModified": "2023-11-25T11:15:16.367",
"lastModified": "2024-01-31T17:15:11.553",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2938",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.433",
"lastModified": "2023-11-25T11:15:16.453",
"lastModified": "2024-01-31T17:15:11.607",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2939",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.477",
"lastModified": "2023-11-25T11:15:16.533",
"lastModified": "2024-01-31T17:15:11.687",
"vulnStatus": "Modified",
"descriptions": [
{
@ -97,6 +97,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2940",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.527",
"lastModified": "2023-11-25T11:15:16.777",
"lastModified": "2024-01-31T17:15:11.807",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2941",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.570",
"lastModified": "2023-11-25T11:15:16.860",
"lastModified": "2024-01-31T17:15:11.863",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5418",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3079",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-05T22:15:12.383",
"lastModified": "2023-12-14T16:15:45.310",
"lastModified": "2024-01-31T17:15:11.930",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-06-07",
"cisaActionDue": "2023-06-28",
@ -142,6 +142,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.couchbase.com/alerts/",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3214",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-13T18:15:22.170",
"lastModified": "2023-11-25T11:15:18.360",
"lastModified": "2024-01-31T17:15:12.020",
"vulnStatus": "Modified",
"descriptions": [
{
@ -122,6 +122,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5428",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3215",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-13T18:15:22.223",
"lastModified": "2023-11-25T11:15:18.457",
"lastModified": "2024-01-31T17:15:12.093",
"vulnStatus": "Modified",
"descriptions": [
{
@ -123,6 +123,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5428",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3216",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-13T18:15:22.273",
"lastModified": "2023-11-25T11:15:18.547",
"lastModified": "2024-01-31T17:15:12.160",
"vulnStatus": "Modified",
"descriptions": [
{
@ -123,6 +123,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5428",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3217",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-13T18:15:22.320",
"lastModified": "2023-11-25T11:15:18.630",
"lastModified": "2024-01-31T17:15:12.227",
"vulnStatus": "Modified",
"descriptions": [
{
@ -127,6 +127,10 @@
"url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5428",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3420",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-26T21:15:09.557",
"lastModified": "2023-07-04T04:15:11.653",
"lastModified": "2024-01-31T17:15:12.290",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5440",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3421",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-26T21:15:09.597",
"lastModified": "2023-09-25T19:15:09.827",
"lastModified": "2024-01-31T17:15:12.373",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5440",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3422",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-06-26T21:15:09.640",
"lastModified": "2023-07-04T04:15:12.673",
"lastModified": "2024-01-31T17:15:12.510",
"vulnStatus": "Modified",
"descriptions": [
{
@ -108,6 +108,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5440",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35836",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-23T23:15:08.000",
"lastModified": "2024-01-24T13:49:03.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-31T18:38:16.887",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,101 @@
"value": "Se descubri\u00f3 un problema en SolaX Pocket WiFi 3 hasta 3.001.02. Un atacante dentro del alcance de RF puede obtener una copia en texto plano de la configuraci\u00f3n de red del dispositivo, incluido el Wi-Fi PSK, durante la instalaci\u00f3n y reconfiguraci\u00f3n del dispositivo. Si tiene \u00e9xito, el atacante puede infiltrarse a\u00fan m\u00e1s en las redes Wi-Fi del objetivo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:solax:pocket_wifi_3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndIncluding": "3.009.03_20230504",
"matchCriteriaId": "FAA04768-4E31-414A-A19C-855B1E1D8CCE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:solax:pocket_wifi_3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "112442CA-E44E-4C2B-95C3-9162E56B9F16"
}
]
}
]
}
],
"references": [
{
"url": "https://www.solaxpower.com/downloads/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://www.solaxpower.com/help/upgrading-the-pocket-wifi-firmware/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://yougottahackthat.com/blog/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://yougottahackthat.com/blog/1370/solax-inverters-pocket-wifi-using-poor-authentication",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35837",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-23T23:15:08.050",
"lastModified": "2024-01-24T13:49:03.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-31T18:25:21.533",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,101 @@
"value": "Se descubri\u00f3 un problema en SolaX Pocket WiFi 3 hasta 3.001.02. La autenticaci\u00f3n para la interfaz web se completa a trav\u00e9s de un AP WiFi no autenticado. La contrase\u00f1a administrativa para la interfaz web tiene una contrase\u00f1a predeterminada, igual al ID de registro del dispositivo. Este mismo ID de registro se utiliza como nombre SSID de WiFi. No existe ninguna rutina para forzar un cambio en esta contrase\u00f1a en el primer uso o para informar al usuario sobre su estado predeterminado. Una vez autenticado, un atacante puede reconfigurar el dispositivo o cargar un nuevo firmware, lo cual puede provocar una denegaci\u00f3n de servicio, ejecuci\u00f3n de c\u00f3digo o escalada de privilegios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:solax:pocket_wifi_3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndIncluding": "3.009.03_20230504",
"matchCriteriaId": "FAA04768-4E31-414A-A19C-855B1E1D8CCE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:solax:pocket_wifi_3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "112442CA-E44E-4C2B-95C3-9162E56B9F16"
}
]
}
]
}
],
"references": [
{
"url": "https://www.solaxpower.com/downloads/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://www.solaxpower.com/help/upgrading-the-pocket-wifi-firmware/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://yougottahackthat.com/blog/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://yougottahackthat.com/blog/1370/solax-inverters-pocket-wifi-using-poor-authentication",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37679",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-03T03:15:10.697",
"lastModified": "2023-08-07T19:37:34.487",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T18:15:45.940",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -82,6 +82,10 @@
"Product"
]
},
{
"url": "http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.ihteam.net/advisory/mirth-connect",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3727",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:31.320",
"lastModified": "2023-08-12T06:16:32.627",
"lastModified": "2024-01-31T17:15:12.590",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3728",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:31.490",
"lastModified": "2023-08-12T06:16:40.940",
"lastModified": "2024-01-31T17:15:12.677",
"vulnStatus": "Modified",
"descriptions": [
{
@ -86,6 +86,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3730",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:31.857",
"lastModified": "2023-08-12T06:16:41.433",
"lastModified": "2024-01-31T17:15:12.737",
"vulnStatus": "Modified",
"descriptions": [
{
@ -86,6 +86,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3732",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:32.247",
"lastModified": "2023-08-18T17:15:09.997",
"lastModified": "2024-01-31T17:15:12.800",
"vulnStatus": "Modified",
"descriptions": [
{
@ -90,6 +90,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3733",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:32.443",
"lastModified": "2023-08-12T06:17:57.680",
"lastModified": "2024-01-31T17:15:12.870",
"vulnStatus": "Modified",
"descriptions": [
{
@ -85,6 +85,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-3734",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:32.607",
"lastModified": "2023-08-12T06:18:29.297",
"lastModified": "2024-01-31T17:15:12.930",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "La implementaci\u00f3n inadecuada de Picture In Picture en Google Chrome anterior a la versi\u00f3n 115.0.5790.98 permit\u00eda a un atacante remoto falsificar potencialmente el contenido de la Omnibox (barra de URL) a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)"
}
],
"metrics": {
@ -85,6 +89,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-3735",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:32.773",
"lastModified": "2023-08-12T06:18:29.783",
"lastModified": "2024-01-31T17:15:13.000",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "La implementaci\u00f3n inadecuada de las Solicitudes de Permiso de la API Web en Google Chrome anteriores a la versi\u00f3n 115.0.5790.98 permit\u00eda a un atacante remoto ocultar la interfaz de usuario de seguridad a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)"
}
],
"metrics": {
@ -85,6 +89,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-3736",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:33.013",
"lastModified": "2023-08-12T06:19:05.223",
"lastModified": "2024-01-31T17:15:13.063",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "La implementaci\u00f3n inadecuada de las Pesta\u00f1as Personalizadas en Google Chrome en Android antes de la versi\u00f3n 115.0.5790.98 permit\u00eda a un atacante remoto filtrar datos de origen cruzado a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)"
}
],
"metrics": {
@ -97,6 +101,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-3737",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:33.177",
"lastModified": "2023-08-12T06:19:06.317",
"lastModified": "2024-01-31T17:15:13.123",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "Una implementaci\u00f3n inadecuada en Notificaciones en Google Chrome anterior a 115.0.5790.98 permit\u00eda a un atacante remoto falsificar el contenido de las notificaciones multimedia a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)"
}
],
"metrics": {
@ -85,6 +89,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3738",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:33.427",
"lastModified": "2023-08-12T06:19:07.383",
"lastModified": "2024-01-31T17:15:13.183",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,6 +84,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-3740",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-01T23:15:33.793",
"lastModified": "2023-08-12T06:19:08.517",
"lastModified": "2024-01-31T17:15:13.297",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)"
},
{
"lang": "es",
"value": "La validaci\u00f3n insuficiente de entradas no fiables en los Temas de Google Chrome anteriores a la versi\u00f3n 115.0.5790.98 permit\u00eda a un atacante remoto servir contenido malicioso a un usuario a trav\u00e9s de una URL de fondo manipulada. (Gravedad de seguridad de Chromium: Baja)"
}
],
"metrics": {
@ -85,6 +89,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4068",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.513",
"lastModified": "2023-12-22T13:15:09.043",
"lastModified": "2024-01-31T17:15:13.627",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4069",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.583",
"lastModified": "2023-12-22T13:15:09.140",
"lastModified": "2024-01-31T17:15:13.707",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4070",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.647",
"lastModified": "2023-12-22T13:15:09.207",
"lastModified": "2024-01-31T17:15:13.767",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4071",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.710",
"lastModified": "2023-12-22T13:15:09.273",
"lastModified": "2024-01-31T17:15:13.823",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4072",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.773",
"lastModified": "2023-12-22T13:15:09.327",
"lastModified": "2024-01-31T17:15:13.883",
"vulnStatus": "Modified",
"descriptions": [
{
@ -96,6 +96,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4073",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.840",
"lastModified": "2023-12-22T13:15:09.387",
"lastModified": "2024-01-31T17:15:13.947",
"vulnStatus": "Modified",
"descriptions": [
{
@ -133,6 +133,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4074",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.903",
"lastModified": "2023-12-22T13:15:09.453",
"lastModified": "2024-01-31T17:15:14.080",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4075",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.973",
"lastModified": "2023-12-22T13:15:09.517",
"lastModified": "2024-01-31T17:15:14.137",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4076",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:12.037",
"lastModified": "2023-12-22T13:15:09.583",
"lastModified": "2024-01-31T17:15:14.197",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4077",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:12.100",
"lastModified": "2023-12-22T13:15:09.647",
"lastModified": "2024-01-31T17:15:14.250",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4078",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:12.167",
"lastModified": "2023-12-22T13:15:09.707",
"lastModified": "2024-01-31T17:15:14.310",
"vulnStatus": "Modified",
"descriptions": [
{
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com"

View File

@ -2,19 +2,79 @@
"id": "CVE-2023-41474",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-25T20:15:36.993",
"lastModified": "2024-01-25T21:52:01.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-31T18:54:51.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal vulnerability in Ivanti Avalanche 6.3.4.153 allows a remote authenticated attacker to obtain sensitive information via the javax.faces.resource component."
},
{
"lang": "es",
"value": "La vulnerabilidad de directory traversal en Ivanti Avalanche 6.3.4.153 permite a un atacante remoto autenticado obtener informaci\u00f3n confidencial a trav\u00e9s del componente javax.faces.resource."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:avalanche:6.3.4.153:*:*:*:premise:*:*:*",
"matchCriteriaId": "F5A7D50A-DD35-40B6-B4AD-8703DB016E90"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/JBalanza/CVE-2023-41474",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43208",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-26T17:15:09.033",
"lastModified": "2023-11-04T01:50:43.173",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T18:15:46.020",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -69,6 +69,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.horizon3.ai/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4349",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:10.950",
"lastModified": "2023-08-27T03:15:14.293",
"lastModified": "2024-01-31T17:15:14.370",
"vulnStatus": "Modified",
"descriptions": [
{
@ -116,6 +116,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4350",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:11.103",
"lastModified": "2023-08-27T03:15:14.490",
"lastModified": "2024-01-31T17:15:14.447",
"vulnStatus": "Modified",
"descriptions": [
{
@ -129,6 +129,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4351",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:11.260",
"lastModified": "2023-08-27T03:15:14.647",
"lastModified": "2024-01-31T17:15:14.517",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4352",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:11.463",
"lastModified": "2023-10-30T19:41:46.627",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:14.573",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -136,6 +136,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4353",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:11.613",
"lastModified": "2023-08-27T03:15:15.140",
"lastModified": "2024-01-31T17:15:14.650",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4354",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:11.763",
"lastModified": "2023-10-12T02:56:56.870",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:14.710",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -144,6 +144,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4355",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:11.923",
"lastModified": "2023-10-13T01:01:41.827",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:14.840",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -144,6 +144,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4356",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:12.090",
"lastModified": "2023-08-27T03:15:16.880",
"lastModified": "2024-01-31T17:15:14.917",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4357",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:12.247",
"lastModified": "2023-08-27T03:15:23.483",
"lastModified": "2024-01-31T17:15:14.977",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4358",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:12.397",
"lastModified": "2023-08-27T03:15:23.727",
"lastModified": "2024-01-31T17:15:15.053",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4359",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:12.637",
"lastModified": "2023-08-27T03:15:23.957",
"lastModified": "2024-01-31T17:15:15.147",
"vulnStatus": "Modified",
"descriptions": [
{
@ -129,6 +129,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4360",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:12.863",
"lastModified": "2023-08-27T03:15:25.467",
"lastModified": "2024-01-31T17:15:15.233",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4361",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:12.960",
"lastModified": "2023-08-27T03:15:26.063",
"lastModified": "2024-01-31T17:15:15.307",
"vulnStatus": "Modified",
"descriptions": [
{
@ -129,6 +129,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4362",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:13.030",
"lastModified": "2023-08-27T03:15:27.143",
"lastModified": "2024-01-31T17:15:15.390",
"vulnStatus": "Modified",
"descriptions": [
{
@ -112,6 +112,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4363",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:13.113",
"lastModified": "2023-08-27T03:15:28.827",
"lastModified": "2024-01-31T17:15:15.463",
"vulnStatus": "Modified",
"descriptions": [
{
@ -129,6 +129,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4364",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:13.217",
"lastModified": "2023-08-27T03:15:29.733",
"lastModified": "2024-01-31T17:15:15.540",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4365",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:13.290",
"lastModified": "2023-08-27T03:15:30.660",
"lastModified": "2024-01-31T17:15:15.610",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4366",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:13.413",
"lastModified": "2023-08-27T03:15:31.313",
"lastModified": "2024-01-31T17:15:15.737",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4367",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:13.520",
"lastModified": "2023-08-27T03:15:31.833",
"lastModified": "2024-01-31T17:15:15.890",
"vulnStatus": "Modified",
"descriptions": [
{
@ -116,6 +116,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4368",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-15T18:15:13.597",
"lastModified": "2023-08-27T03:15:32.420",
"lastModified": "2024-01-31T17:15:15.970",
"vulnStatus": "Modified",
"descriptions": [
{
@ -112,6 +112,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5479",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44312",
"sourceIdentifier": "security@apache.org",
"published": "2024-01-31T09:15:43.693",
"lastModified": "2024-01-31T14:05:19.990",
"lastModified": "2024-01-31T18:15:46.110",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/31/5",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/dkvlgnrmc17qzjdy9k0cr60wpzcssk1s",
"source": "security@apache.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44313",
"sourceIdentifier": "security@apache.org",
"published": "2024-01-31T09:15:43.920",
"lastModified": "2024-01-31T14:05:19.990",
"lastModified": "2024-01-31T18:15:46.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/31/4",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/kxovd455o9h4f2v811hcov2qknbwld5r",
"source": "security@apache.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4427",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-23T00:15:09.073",
"lastModified": "2023-10-13T01:12:47.790",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:16.043",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -141,6 +141,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5483",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4428",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-23T00:15:09.157",
"lastModified": "2023-10-30T19:41:27.130",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:16.127",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5483",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4429",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-23T00:15:09.227",
"lastModified": "2023-10-30T19:41:10.943",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:16.200",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5483",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4430",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-23T00:15:09.290",
"lastModified": "2023-10-30T19:40:57.993",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:16.270",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5483",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4431",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-23T00:15:09.353",
"lastModified": "2023-10-13T01:13:53.427",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:16.343",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -152,6 +152,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5483",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4572",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-29T20:15:10.480",
"lastModified": "2023-10-30T19:38:38.793",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:16.437",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5487",
"source": "chrome-cve-admin@google.com",

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-47116",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-01-31T17:15:13.370",
"lastModified": "2024-01-31T17:15:13.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Label Studio is a popular open source data labeling tool. The vulnerability affects all versions of Label Studio prior to 1.11.0 and was tested on version 1.8.2. Label Studio's SSRF protections that can be enabled by setting the `SSRF_PROTECTION_ENABLED` environment variable can be bypassed to access internal web servers. This is because the current SSRF validation is done by executing a single DNS lookup to verify that the IP address is not in an excluded subnet range. This protection can be bypassed by either using HTTP redirection or performing a DNS rebinding attack."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/HumanSignal/label-studio/commit/55dd6af4716b92f2bb213fe461d1ffbc380c6a64",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4761",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.583",
"lastModified": "2023-12-22T13:15:09.790",
"lastModified": "2024-01-31T17:15:16.553",
"vulnStatus": "Modified",
"descriptions": [
{
@ -160,6 +160,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4762",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.677",
"lastModified": "2023-12-22T13:15:09.940",
"lastModified": "2024-01-31T17:15:16.667",
"vulnStatus": "Modified",
"descriptions": [
{
@ -165,6 +165,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4763",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.777",
"lastModified": "2023-12-22T13:15:10.020",
"lastModified": "2024-01-31T17:15:16.743",
"vulnStatus": "Modified",
"descriptions": [
{
@ -124,6 +124,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4764",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.883",
"lastModified": "2023-12-22T13:15:10.100",
"lastModified": "2024-01-31T17:15:16.827",
"vulnStatus": "Modified",
"descriptions": [
{
@ -124,6 +124,10 @@
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4900",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.537",
"lastModified": "2023-10-17T20:12:54.150",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:16.900",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -162,6 +162,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4901",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.603",
"lastModified": "2023-10-17T20:13:09.360",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:16.987",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -145,6 +145,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4902",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.657",
"lastModified": "2023-10-17T20:13:29.797",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:17.070",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4903",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.717",
"lastModified": "2023-10-17T20:14:02.777",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:17.143",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -162,6 +162,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4904",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.777",
"lastModified": "2023-10-17T19:51:00.467",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:17.417",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4905",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.837",
"lastModified": "2023-10-17T19:54:42.733",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:17.590",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4906",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.893",
"lastModified": "2023-10-17T20:02:16.117",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:17.670",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4907",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:08.950",
"lastModified": "2023-10-17T20:02:45.343",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:17.750",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -162,6 +162,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4908",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:09.010",
"lastModified": "2023-10-17T20:02:51.120",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:17.827",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4909",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T21:15:09.073",
"lastModified": "2023-10-17T20:14:06.793",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:17.910",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Mailing List"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5499",
"source": "chrome-cve-admin@google.com",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-50165",
"sourceIdentifier": "security@pega.com",
"published": "2024-01-31T18:15:46.320",
"lastModified": "2024-01-31T18:15:46.320",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Pega Platform versions 8.2.1 to Infinity 23.1.0 are affected by an Generated PDF issue that could expose file contents."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@pega.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security@pega.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://support.pega.com/support-doc/pega-security-advisory-g23-vulnerability-remediation-note",
"source": "security@pega.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-50166",
"sourceIdentifier": "security@pega.com",
"published": "2024-01-31T18:15:46.513",
"lastModified": "2024-01-31T18:15:46.513",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Pega Platform from 8.5.4 to 8.8.3 is affected by an XSS issue with an unauthenticated user and the redirect parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@pega.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@pega.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.pega.com/support-doc/pega-security-advisory-h23-vulnerability-remediation-note",
"source": "security@pega.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5186",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-28T16:15:10.760",
"lastModified": "2023-10-12T02:46:12.913",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:17.980",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -153,6 +153,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5508",
"source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5187",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-28T16:15:10.883",
"lastModified": "2023-10-12T02:45:40.760",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-31T17:15:18.097",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -153,6 +153,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202401-34",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5508",
"source": "chrome-cve-admin@google.com",

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-52355",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-25T20:15:38.353",
"lastModified": "2024-01-25T21:52:01.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-31T17:59:49.903",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An out-of-memory flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFRasterScanlineSize64() API. This flaw allows a remote attacker to cause a denial of service via a crafted input with a size smaller than 379 KB."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un fallo de falta de memoria en libtiff que podr\u00eda activarse al pasar un archivo tiff dise\u00f1ado a la API TIFFRasterScanlineSize64(). Este fallo permite que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de una entrada manipulada con un tama\u00f1o inferior a 379 KB."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -46,18 +80,68 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023-11-11",
"matchCriteriaId": "167987A3-B58C-44D8-8594-C992CB238723"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-52355",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251326",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://gitlab.com/libtiff/libtiff/-/issues/621",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

Some files were not shown because too many files have changed in this diff Show More