From 9c0662a3c825a8ad83a5dbcfcef5b412c1ea72ac Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 8 Nov 2023 05:00:23 +0000 Subject: [PATCH] Auto-Update: 2023-11-08T05:00:19.628323+00:00 --- CVE-2023/CVE-2023-223xx/CVE-2023-22338.json | 51 ++++++- CVE-2023/CVE-2023-228xx/CVE-2023-22840.json | 51 ++++++- CVE-2023/CVE-2023-340xx/CVE-2023-34058.json | 16 +- CVE-2023/CVE-2023-340xx/CVE-2023-34059.json | 16 +- CVE-2023/CVE-2023-426xx/CVE-2023-42635.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42636.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42637.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42638.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42639.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42641.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42642.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42643.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42644.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42646.json | 154 +++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42648.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42649.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42650.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42651.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42652.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-426xx/CVE-2023-42654.json | 149 ++++++++++++++++++- CVE-2023/CVE-2023-433xx/CVE-2023-43339.json | 6 +- CVE-2023/CVE-2023-438xx/CVE-2023-43871.json | 10 +- CVE-2023/CVE-2023-441xx/CVE-2023-44115.json | 36 +++++ CVE-2023/CVE-2023-459xx/CVE-2023-45996.json | 76 +++++++++- CVE-2023/CVE-2023-463xx/CVE-2023-46356.json | 66 ++++++++- CVE-2023/CVE-2023-467xx/CVE-2023-46768.json | 36 +++++ CVE-2023/CVE-2023-467xx/CVE-2023-46769.json | 36 +++++ CVE-2023/CVE-2023-467xx/CVE-2023-46770.json | 24 +++ CVE-2023/CVE-2023-54xx/CVE-2023-5480.json | 8 +- CVE-2023/CVE-2023-54xx/CVE-2023-5482.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5801.json | 36 +++++ CVE-2023/CVE-2023-58xx/CVE-2023-5849.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5850.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5851.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5852.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5853.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5854.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5855.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5856.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5857.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5858.json | 8 +- CVE-2023/CVE-2023-58xx/CVE-2023-5859.json | 8 +- README.md | 66 +++++---- 43 files changed, 2865 insertions(+), 154 deletions(-) create mode 100644 CVE-2023/CVE-2023-441xx/CVE-2023-44115.json create mode 100644 CVE-2023/CVE-2023-467xx/CVE-2023-46768.json create mode 100644 CVE-2023/CVE-2023-467xx/CVE-2023-46769.json create mode 100644 CVE-2023/CVE-2023-467xx/CVE-2023-46770.json create mode 100644 CVE-2023/CVE-2023-58xx/CVE-2023-5801.json diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22338.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22338.json index 6132c9c81ae..40af40be528 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22338.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22338.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22338", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:16.780", - "lastModified": "2023-11-07T04:06:50.737", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-08T03:08:52.440", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "6dda929c-bb53-4a77-a76d-48e79601a1ce", + "source": "secure@intel.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -66,7 +66,7 @@ ] }, { - "source": "6dda929c-bb53-4a77-a76d-48e79601a1ce", + "source": "secure@intel.com", "type": "Secondary", "description": [ { @@ -92,6 +92,31 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -104,15 +129,27 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22840.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22840.json index 7a7921d649d..3faaa4272e4 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22840.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22840.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22840", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:17.750", - "lastModified": "2023-11-07T04:07:27.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-08T03:10:49.553", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "6dda929c-bb53-4a77-a76d-48e79601a1ce", + "source": "secure@intel.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -66,7 +66,7 @@ ] }, { - "source": "6dda929c-bb53-4a77-a76d-48e79601a1ce", + "source": "secure@intel.com", "type": "Secondary", "description": [ { @@ -92,6 +92,31 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -104,15 +129,27 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L27GRS7E45IOCZ44VQX2NJ33GVRBWHBS/", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json index 9b2dcc3091b..34ebfd58980 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34058.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34058", "sourceIdentifier": "security@vmware.com", "published": "2023-10-27T05:15:38.957", - "lastModified": "2023-11-07T21:07:45.603", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-08T04:15:07.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -159,6 +159,18 @@ "Mailing List" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7G77Z76CQPGUF7VHRA6O3UFCMPPR4O2/", + "source": "security@vmware.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQUOFQL2SNNNMKROQ3TZQY4HEYMNOIBW/", + "source": "security@vmware.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLTKVTRKQW2GD2274H3UOW6XU4E62GSK/", + "source": "security@vmware.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5543", "source": "security@vmware.com", diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json index 7157425991f..4150690ae71 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34059.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34059", "sourceIdentifier": "security@vmware.com", "published": "2023-10-27T05:15:39.013", - "lastModified": "2023-11-07T21:13:23.037", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-08T04:15:07.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -140,6 +140,18 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7G77Z76CQPGUF7VHRA6O3UFCMPPR4O2/", + "source": "security@vmware.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQUOFQL2SNNNMKROQ3TZQY4HEYMNOIBW/", + "source": "security@vmware.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLTKVTRKQW2GD2274H3UOW6XU4E62GSK/", + "source": "security@vmware.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5543", "source": "security@vmware.com", diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42635.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42635.json index bd7135ee5d1..e88fb058ef9 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42635.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42635.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42635", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:09.707", - "lastModified": "2023-11-01T12:51:08.910", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:13:07.617", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En las herramientas de validaci\u00f3n, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42636.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42636.json index b9dc0fd5249..5e611a26339 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42636.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42636.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42636", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:09.757", - "lastModified": "2023-11-01T12:51:08.910", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:12:47.747", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En las herramientas de validaci\u00f3n, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42637.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42637.json index 171da92f36a..764036c8d1d 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42637.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42637.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42637", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:09.807", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:12:32.123", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En las herramientas de validaci\u00f3n, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42638.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42638.json index fd50866a481..67b63f0a287 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42638.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42638.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42638", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:09.853", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:12:13.397", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En las herramientas de validaci\u00f3n, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42639.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42639.json index ad242f75d22..3edf941ddaf 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42639.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42639.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42639", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:09.900", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:11:54.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En las herramientas de validaci\u00f3n, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42641.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42641.json index 04c260e78e3..fbdb3954298 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42641.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42641.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42641", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.003", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:14:02.453", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En las herramientas de validaci\u00f3n, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42642.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42642.json index 1b00a1ba6dc..97ae485583a 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42642.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42642.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42642", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.050", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:14:19.063", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En las herramientas de validaci\u00f3n, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42643.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42643.json index 6bc163d20b2..293751356ce 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42643.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42643.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42643", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.097", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:14:33.540", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En las herramientas de validaci\u00f3n, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42644.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42644.json index c3bc506c617..eb9bdc02e43 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42644.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42644.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42644", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.143", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:18:33.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In dm service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En el servicio dm, es posible que falte una verificaci\u00f3n de permisos. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42646.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42646.json index bd80bccff6c..a56f64d26da 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42646.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42646.json @@ -2,19 +2,165 @@ "id": "CVE-2023-42646", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.233", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:17:09.520", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Ifaa service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En el servicio de Ifaa, existe una posible falta de verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:10.0:-:*:*:*:*:*:*", + "matchCriteriaId": "BF3D9050-DFED-4D7B-BB17-24408D344EC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42648.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42648.json index c374aad9e76..f5d166046fb 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42648.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42648.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42648", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.330", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:07:05.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En el modo ingeniero, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42649.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42649.json index e02731262e3..1503742cf1a 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42649.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42649.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42649", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.380", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:06:14.390", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En el modo ingeniero, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42650.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42650.json index f0921faf42e..0d32ec6f219 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42650.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42650.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42650", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.427", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:05:33.393", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En el modo ingeniero, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42651.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42651.json index 9f29232bd72..0fc03ae0f89 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42651.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42651.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42651", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.473", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:03:22.620", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En el modo ingeniero, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42652.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42652.json index 2c122f6d751..251f1915002 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42652.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42652.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42652", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.517", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:02:36.173", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En el modo ingeniero, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42654.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42654.json index c211c4a794a..98cd0b6e435 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42654.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42654.json @@ -2,19 +2,160 @@ "id": "CVE-2023-42654", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.607", - "lastModified": "2023-11-01T12:51:03.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:18:12.517", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In dm service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed" + }, + { + "lang": "es", + "value": "En el servicio dm, es posible que falte una verificaci\u00f3n de permiso. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F120D280-287A-474F-9DC5-CBBC4B4C7237" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "16820CAF-0A8A-45C8-B5A8-979EA0407389" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43339.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43339.json index 863fee5a769..5fcd55f452c 100644 --- a/CVE-2023/CVE-2023-433xx/CVE-2023-43339.json +++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43339.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43339", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-25T16:15:14.640", - "lastModified": "2023-09-26T14:46:47.360", + "lastModified": "2023-11-08T03:14:03.817", "vulnStatus": "Analyzed", "descriptions": [ { @@ -59,8 +59,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cmsmadesimple:cmsmadesimple:2.2.18:*:*:*:*:*:*:*", - "matchCriteriaId": "0FB3581E-8935-4576-B21A-F03A45256E22" + "criteria": "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.18:*:*:*:*:*:*:*", + "matchCriteriaId": "AEF989DA-0199-49AE-A793-1CE18C1E045A" } ] } diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43871.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43871.json index 3b8b61a5cdd..b266394a7fc 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43871.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43871.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43871", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-28T14:15:23.883", - "lastModified": "2023-10-10T23:15:10.913", - "vulnStatus": "Modified", + "lastModified": "2023-11-08T03:12:47.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,7 +70,11 @@ "references": [ { "url": "https://github.com/sromanhu/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/sromanhu/WBCE-File-Upload--XSS---Media/blob/main/README.md", diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44115.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44115.json new file mode 100644 index 00000000000..16527eda7a9 --- /dev/null +++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44115.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-44115", + "sourceIdentifier": "psirt@huawei.com", + "published": "2023-11-08T04:15:07.707", + "lastModified": "2023-11-08T04:15:07.707", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of improper permission control in the Booster module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45996.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45996.json index eb6f7a6f8cc..9f9b44b6f4f 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45996.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45996.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45996", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-31T06:15:07.883", - "lastModified": "2023-10-31T12:58:31.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:02:39.613", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,81 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Senayan Library Management Systems Slims v.9 y Bulian v.9.6.1 permite a un atacante remoto obtener informaci\u00f3n confidencial y ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado para el par\u00e1metro reborrowLimit en member_type.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BA26D88B-C9C8-4F63-9953-F4F2520AD952" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:slims:senayan_library_management_system_bulian:9.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0439647C-9560-44A0-B186-BFDF828ECD17" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-member_type.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/slims/slims9_bulian/issues/216", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46356.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46356.json index f084b850770..e8d1ee05bed 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46356.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46356.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46356", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-31T04:15:11.257", - "lastModified": "2023-10-31T12:58:31.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T03:07:09.593", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,69 @@ "value": "En el m\u00f3dulo \"CSV Feeds PRO\" (csvfeeds) anterior a 2.6.1 de Bl Modules para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL. El m\u00e9todo `SearchApiCsv::getProducts()` tiene una llamada SQL sensible que puede ejecutarse con una llamada http trivial y explotarse para falsificar una inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blmodules:csv_feeds_pro:*:*:*:*:*:prestashop:*:*", + "versionEndExcluding": "2.6.1", + "matchCriteriaId": "BEC51F0B-EE9A-4BE8-96F8-D374716C7029" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.friendsofpresta.org/modules/2023/10/26/csvfeeds-89.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46768.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46768.json new file mode 100644 index 00000000000..b47f94d5ac7 --- /dev/null +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46768.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-46768", + "sourceIdentifier": "psirt@huawei.com", + "published": "2023-11-08T03:15:07.490", + "lastModified": "2023-11-08T03:15:07.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Multi-thread vulnerability in the idmap module. Successful exploitation of this vulnerability may cause features to perform abnormally." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46769.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46769.json new file mode 100644 index 00000000000..fed03eebb94 --- /dev/null +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46769.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-46769", + "sourceIdentifier": "psirt@huawei.com", + "published": "2023-11-08T03:15:07.870", + "lastModified": "2023-11-08T03:15:07.870", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use-After-Free (UAF) vulnerability in the dubai module. Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46770.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46770.json new file mode 100644 index 00000000000..d5c1c7119ab --- /dev/null +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46770.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46770", + "sourceIdentifier": "psirt@huawei.com", + "published": "2023-11-08T03:15:08.167", + "lastModified": "2023-11-08T03:15:08.167", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds vulnerability in the sensor module. Successful exploitation of this vulnerability may cause mistouch prevention errors on users' mobile phones." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5480.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5480.json index 9f629d2e67e..8e42b2878f3 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5480.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5480.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5480", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:09.930", - "lastModified": "2023-11-03T22:15:12.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:07.777", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1492698", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5482.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5482.json index 56f6816a9ce..78f9de6cbd7 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5482.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5482.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5482", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:09.973", - "lastModified": "2023-11-03T22:15:12.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:07.830", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1492381", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5801.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5801.json new file mode 100644 index 00000000000..2a00db7aa32 --- /dev/null +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5801.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-5801", + "sourceIdentifier": "psirt@huawei.com", + "published": "2023-11-08T03:15:08.373", + "lastModified": "2023-11-08T03:15:08.373", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of identity verification being bypassed in the face unlock module. Successful exploitation of this vulnerability will affect integrity and confidentiality." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/", + "source": "psirt@huawei.com" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5849.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5849.json index 06246d8137b..de5e3223c56 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5849.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5849.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5849", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.107", - "lastModified": "2023-11-03T22:15:12.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:07.880", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1492384", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5850.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5850.json index 20fe806b0d7..293d7cddf30 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5850.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5850.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5850", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.160", - "lastModified": "2023-11-03T22:15:12.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:07.927", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1281972", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5851.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5851.json index d718028dfab..8427c5b0b83 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5851.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5851.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5851", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.207", - "lastModified": "2023-11-03T22:15:12.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:07.970", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1473957", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5852.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5852.json index 7a4633b3d13..d3a8e04a337 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5852.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5852.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5852", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.253", - "lastModified": "2023-11-03T22:15:12.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:08.020", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1480852", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5853.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5853.json index 0910eed232b..5b762fc4603 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5853.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5853.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5853", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.300", - "lastModified": "2023-11-03T22:15:12.883", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:08.060", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1456876", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5854.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5854.json index 51d9ecd200a..de8e76f1999 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5854.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5854.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5854", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.343", - "lastModified": "2023-11-03T22:15:13.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:08.107", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1488267", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5855.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5855.json index b42d7c4772e..1422b78906e 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5855.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5855.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5855", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.387", - "lastModified": "2023-11-03T22:15:13.207", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:08.147", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1492396", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5856.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5856.json index 4ae2d9ece98..dd8fcefb58a 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5856.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5856.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5856", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.433", - "lastModified": "2023-11-03T22:15:13.290", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:08.187", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1493380", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5857.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5857.json index bbff3dd6376..7b53cc05ba6 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5857.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5857.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5857", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.477", - "lastModified": "2023-11-03T22:15:13.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:08.230", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1493435", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5858.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5858.json index fc32d4f13b2..004be75cd39 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5858.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5858.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5858", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.517", - "lastModified": "2023-11-03T22:15:13.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:08.270", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1457704", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5859.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5859.json index d038c43cfb4..5b17050dc7d 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5859.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5859.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5859", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:10.563", - "lastModified": "2023-11-03T22:15:13.577", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-08T04:15:08.310", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -24,6 +24,10 @@ "url": "https://crbug.com/1482045", "source": "chrome-cve-admin@google.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/", + "source": "chrome-cve-admin@google.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5546", "source": "chrome-cve-admin@google.com" diff --git a/README.md b/README.md index e444a170cfe..c82526c098f 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-08T03:00:20.135940+00:00 +2023-11-08T05:00:19.628323+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-08T02:59:30.833000+00:00 +2023-11-08T04:15:08.310000+00:00 ``` ### Last Data Feed Release @@ -29,45 +29,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -230097 +230102 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `5` -* [CVE-2023-4061](CVE-2023/CVE-2023-40xx/CVE-2023-4061.json) (`2023-11-08T01:15:08.693`) +* [CVE-2023-46768](CVE-2023/CVE-2023-467xx/CVE-2023-46768.json) (`2023-11-08T03:15:07.490`) +* [CVE-2023-46769](CVE-2023/CVE-2023-467xx/CVE-2023-46769.json) (`2023-11-08T03:15:07.870`) +* [CVE-2023-46770](CVE-2023/CVE-2023-467xx/CVE-2023-46770.json) (`2023-11-08T03:15:08.167`) +* [CVE-2023-5801](CVE-2023/CVE-2023-58xx/CVE-2023-5801.json) (`2023-11-08T03:15:08.373`) +* [CVE-2023-44115](CVE-2023/CVE-2023-441xx/CVE-2023-44115.json) (`2023-11-08T04:15:07.707`) ### CVEs modified in the last Commit -Recently modified CVEs: `42` +Recently modified CVEs: `37` -* [CVE-2023-5863](CVE-2023/CVE-2023-58xx/CVE-2023-5863.json) (`2023-11-08T02:12:17.687`) -* [CVE-2023-5252](CVE-2023/CVE-2023-52xx/CVE-2023-5252.json) (`2023-11-08T02:12:53.770`) -* [CVE-2023-5861](CVE-2023/CVE-2023-58xx/CVE-2023-5861.json) (`2023-11-08T02:14:25.697`) -* [CVE-2023-5251](CVE-2023/CVE-2023-52xx/CVE-2023-5251.json) (`2023-11-08T02:15:53.437`) -* [CVE-2023-28777](CVE-2023/CVE-2023-287xx/CVE-2023-28777.json) (`2023-11-08T02:16:50.020`) -* [CVE-2023-25047](CVE-2023/CVE-2023-250xx/CVE-2023-25047.json) (`2023-11-08T02:17:54.997`) -* [CVE-2023-25045](CVE-2023/CVE-2023-250xx/CVE-2023-25045.json) (`2023-11-08T02:18:12.263`) -* [CVE-2023-24000](CVE-2023/CVE-2023-240xx/CVE-2023-24000.json) (`2023-11-08T02:18:32.077`) -* [CVE-2023-46622](CVE-2023/CVE-2023-466xx/CVE-2023-46622.json) (`2023-11-08T02:23:55.480`) -* [CVE-2023-46313](CVE-2023/CVE-2023-463xx/CVE-2023-46313.json) (`2023-11-08T02:24:23.733`) -* [CVE-2023-46312](CVE-2023/CVE-2023-463xx/CVE-2023-46312.json) (`2023-11-08T02:24:43.287`) -* [CVE-2023-40681](CVE-2023/CVE-2023-406xx/CVE-2023-40681.json) (`2023-11-08T02:25:32.920`) -* [CVE-2023-5250](CVE-2023/CVE-2023-52xx/CVE-2023-5250.json) (`2023-11-08T02:30:14.437`) -* [CVE-2023-42431](CVE-2023/CVE-2023-424xx/CVE-2023-42431.json) (`2023-11-08T02:33:22.657`) -* [CVE-2023-5839](CVE-2023/CVE-2023-58xx/CVE-2023-5839.json) (`2023-11-08T02:35:41.650`) -* [CVE-2023-45799](CVE-2023/CVE-2023-457xx/CVE-2023-45799.json) (`2023-11-08T02:43:07.770`) -* [CVE-2023-45798](CVE-2023/CVE-2023-457xx/CVE-2023-45798.json) (`2023-11-08T02:44:41.433`) -* [CVE-2023-31794](CVE-2023/CVE-2023-317xx/CVE-2023-31794.json) (`2023-11-08T02:46:13.053`) -* [CVE-2023-46040](CVE-2023/CVE-2023-460xx/CVE-2023-46040.json) (`2023-11-08T02:48:09.133`) -* [CVE-2023-27846](CVE-2023/CVE-2023-278xx/CVE-2023-27846.json) (`2023-11-08T02:50:09.210`) -* [CVE-2023-46979](CVE-2023/CVE-2023-469xx/CVE-2023-46979.json) (`2023-11-08T02:56:22.127`) -* [CVE-2023-45378](CVE-2023/CVE-2023-453xx/CVE-2023-45378.json) (`2023-11-08T02:56:41.480`) -* [CVE-2023-46978](CVE-2023/CVE-2023-469xx/CVE-2023-46978.json) (`2023-11-08T02:58:11.953`) -* [CVE-2023-46977](CVE-2023/CVE-2023-469xx/CVE-2023-46977.json) (`2023-11-08T02:59:08.010`) -* [CVE-2023-46976](CVE-2023/CVE-2023-469xx/CVE-2023-46976.json) (`2023-11-08T02:59:30.833`) +* [CVE-2023-43871](CVE-2023/CVE-2023-438xx/CVE-2023-43871.json) (`2023-11-08T03:12:47.157`) +* [CVE-2023-42636](CVE-2023/CVE-2023-426xx/CVE-2023-42636.json) (`2023-11-08T03:12:47.747`) +* [CVE-2023-42635](CVE-2023/CVE-2023-426xx/CVE-2023-42635.json) (`2023-11-08T03:13:07.617`) +* [CVE-2023-42641](CVE-2023/CVE-2023-426xx/CVE-2023-42641.json) (`2023-11-08T03:14:02.453`) +* [CVE-2023-43339](CVE-2023/CVE-2023-433xx/CVE-2023-43339.json) (`2023-11-08T03:14:03.817`) +* [CVE-2023-42642](CVE-2023/CVE-2023-426xx/CVE-2023-42642.json) (`2023-11-08T03:14:19.063`) +* [CVE-2023-42643](CVE-2023/CVE-2023-426xx/CVE-2023-42643.json) (`2023-11-08T03:14:33.540`) +* [CVE-2023-42646](CVE-2023/CVE-2023-426xx/CVE-2023-42646.json) (`2023-11-08T03:17:09.520`) +* [CVE-2023-42654](CVE-2023/CVE-2023-426xx/CVE-2023-42654.json) (`2023-11-08T03:18:12.517`) +* [CVE-2023-42644](CVE-2023/CVE-2023-426xx/CVE-2023-42644.json) (`2023-11-08T03:18:33.007`) +* [CVE-2023-34058](CVE-2023/CVE-2023-340xx/CVE-2023-34058.json) (`2023-11-08T04:15:07.470`) +* [CVE-2023-34059](CVE-2023/CVE-2023-340xx/CVE-2023-34059.json) (`2023-11-08T04:15:07.613`) +* [CVE-2023-5480](CVE-2023/CVE-2023-54xx/CVE-2023-5480.json) (`2023-11-08T04:15:07.777`) +* [CVE-2023-5482](CVE-2023/CVE-2023-54xx/CVE-2023-5482.json) (`2023-11-08T04:15:07.830`) +* [CVE-2023-5849](CVE-2023/CVE-2023-58xx/CVE-2023-5849.json) (`2023-11-08T04:15:07.880`) +* [CVE-2023-5850](CVE-2023/CVE-2023-58xx/CVE-2023-5850.json) (`2023-11-08T04:15:07.927`) +* [CVE-2023-5851](CVE-2023/CVE-2023-58xx/CVE-2023-5851.json) (`2023-11-08T04:15:07.970`) +* [CVE-2023-5852](CVE-2023/CVE-2023-58xx/CVE-2023-5852.json) (`2023-11-08T04:15:08.020`) +* [CVE-2023-5853](CVE-2023/CVE-2023-58xx/CVE-2023-5853.json) (`2023-11-08T04:15:08.060`) +* [CVE-2023-5854](CVE-2023/CVE-2023-58xx/CVE-2023-5854.json) (`2023-11-08T04:15:08.107`) +* [CVE-2023-5855](CVE-2023/CVE-2023-58xx/CVE-2023-5855.json) (`2023-11-08T04:15:08.147`) +* [CVE-2023-5856](CVE-2023/CVE-2023-58xx/CVE-2023-5856.json) (`2023-11-08T04:15:08.187`) +* [CVE-2023-5857](CVE-2023/CVE-2023-58xx/CVE-2023-5857.json) (`2023-11-08T04:15:08.230`) +* [CVE-2023-5858](CVE-2023/CVE-2023-58xx/CVE-2023-5858.json) (`2023-11-08T04:15:08.270`) +* [CVE-2023-5859](CVE-2023/CVE-2023-58xx/CVE-2023-5859.json) (`2023-11-08T04:15:08.310`) ## Download and Usage