mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-08-17T22:00:31.216839+00:00
This commit is contained in:
parent
1de4c25be0
commit
a24e9c1230
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-38102",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2023-08-11T03:15:14.070",
|
||||
"lastModified": "2023-08-11T03:44:51.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-17T20:34:38.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "secure@intel.com",
|
||||
"type": "Secondary",
|
||||
@ -34,10 +54,558 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "16.1.27",
|
||||
"matchCriteriaId": "CF505BC6-9834-416D-8539-9EADD93D81A3"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:b660:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2576527C-0218-491F-871E-07A60A5E1C25"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:h610:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A68DECC9-072F-43C0-90EF-02E8BBC9AE4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:h610e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9B973879-DE48-4461-B543-98625EABCCE4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:h670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BCF3A230-7824-4417-B5C4-E2D30ECBE3AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:hm670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "70675897-E01D-4217-82AE-EC15AE58390E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:q670:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B3DBB4E3-B863-4333-AC01-DB21416FCB94"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:q670e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B479403-BA34-426F-8DB6-61303C57F268"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:r680e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F20D230F-E14A-4986-8746-168CC9C61AD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:w680:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EF31448A-E935-4FFF-AF76-2B06EF71E229"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:wm690:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D5B7B7CD-63B7-4F80-A0A1-7C69F0868D1B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:z690:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D1C667A-A904-4707-BE7E-FF7530E0D716"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.0.45",
|
||||
"matchCriteriaId": "5438BCF4-5C36-458B-95B3-F55AC0C886CA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89231773-9D9B-434A-A6A3-8527C4F6FEBB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A85EA674-2537-4323-AEDA-FA356489E7DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F85599DD-3F80-4EB0-9753-D24EDD8D76CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:atom_x6214re:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D98929C-9560-40CF-8231-718B5BFF19EA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:atom_x6414re:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1D7A0BC-7798-466E-B341-D371988FE6CA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:atom_x6416re:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8A8C0489-E31A-455A-AA64-3765074530F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F068F4F-8CCD-4218-871C-BEABEB0DAB55"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7313975C-41A5-4657-8758-1C16F947BE4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FBE4406-9979-4723-833C-176F051E6389"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9FE930AA-59F7-43A7-9FF3-363CE72A6728"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:c252:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F6E46116-6B73-4A65-A2AB-E238678B7E48"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:c256:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C9F281EE-3F33-406A-8FA0-43B3AB6BC35B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3D3162DD-BF40-4A58-8FC4-63B4455C0E51"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D67C6D6B-12F3-43A6-BB8D-DFE0B6483294"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96F1DD9B-C078-41C5-88E0-DB7705E17742"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:hm570:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D9BD5A1-AD1F-4770-87EE-7F1804BA87A1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:hm570e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "242BA56E-E8D0-4851-AA71-FECB9E102F87"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1C43D202-D661-4042-9F68-0FA7EE73CFEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "29ECACD3-E10C-4773-B847-8C1C097C45FA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7596F281-BA94-4239-8238-AA5EC804AE11"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A635B99E-A03F-488A-A01B-B390691EA03B"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22EAE772-AFAC-4272-8129-B416B171490C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A1A836B1-451E-4CEF-8A14-89FFB9289DD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44BCD8EB-D71A-4BD6-8D2D-AF2430F840C3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:qm580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61AB83BE-01F0-412B-98E9-B766884BF249"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:qm580e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8CDD634A-B6BA-452C-A6E0-18ADEFF81529"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:rm590e:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E1C4E46E-5828-4EE6-9A95-8F4FE56AC156"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EE366EB3-BE96-4A01-9BD5-792B59163938"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:wm590:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4158B9A6-ACBE-4A62-AA2C-9790F73C4C3C"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89563A0F-CE7A-41C5-A8C7-9FC2D40F000A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
|
||||
"source": "secure@intel.com"
|
||||
"source": "secure@intel.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -2,23 +2,85 @@
|
||||
"id": "CVE-2022-47636",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-10T16:15:09.627",
|
||||
"lastModified": "2023-08-11T15:15:09.490",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-17T21:26:11.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A DLL hijacking vulnerability has been discovered in OutSystems Service Studio 11 11.53.30 build 61739. When a user open a .oml file (OutSystems Modeling Language), the application will load the following DLLs from the same directory av_libGLESv2.dll, libcef.DLL, user32.dll, and d3d10warp.dll. Using a crafted DLL, it is possible to execute arbitrary code in the context of the current logged in user."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:outsystems:service_studio:11.53.30:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F38B2C3D-12C6-4A10-9376-7D977BD74121"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/51678",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25775",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2023-08-11T03:15:18.940",
|
||||
"lastModified": "2023-08-11T03:44:51.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-17T20:10:37.247",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "secure@intel.com",
|
||||
"type": "Secondary",
|
||||
@ -34,10 +54,43 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intel:ethernet_controller_rdma_driver_for_linux:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.9.30",
|
||||
"matchCriteriaId": "F7C4A7F1-72A7-42E7-92BE-259FBF31777F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html",
|
||||
"source": "secure@intel.com"
|
||||
"source": "secure@intel.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25944",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2023-08-11T03:15:19.343",
|
||||
"lastModified": "2023-08-11T03:44:51.127",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-17T20:04:42.103",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "secure@intel.com",
|
||||
"type": "Secondary",
|
||||
@ -34,10 +54,43 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-427"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:intel:vcust_tool:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2023-02-03",
|
||||
"matchCriteriaId": "B1B7FE3D-62D9-489E-B8AE-992DE2ABE969"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00844.html",
|
||||
"source": "secure@intel.com"
|
||||
"source": "secure@intel.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-319xx/CVE-2023-31938.json
Normal file
20
CVE-2023/CVE-2023-319xx/CVE-2023-31938.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31938",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-17T20:15:09.607",
|
||||
"lastModified": "2023-08-17T20:15:09.607",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the emp_id parameter at employee_detail.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug2-SQL-Injection-emp_id.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-319xx/CVE-2023-31939.json
Normal file
20
CVE-2023/CVE-2023-319xx/CVE-2023-31939.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31939",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-17T20:15:09.710",
|
||||
"lastModified": "2023-08-17T20:15:09.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the costomer_id parameter at customer_edit.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug4-SQL-Injection-costomer_id.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-319xx/CVE-2023-31940.json
Normal file
20
CVE-2023/CVE-2023-319xx/CVE-2023-31940.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31940",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-17T20:15:09.767",
|
||||
"lastModified": "2023-08-17T20:15:09.767",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the page_id parameter at article_edit.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug7-SQL-Injection-page_id.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-319xx/CVE-2023-31941.json
Normal file
20
CVE-2023/CVE-2023-319xx/CVE-2023-31941.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31941",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-17T20:15:09.827",
|
||||
"lastModified": "2023-08-17T20:15:09.827",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "File Upload vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via a crafted PHP file to the employee_insert.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug1-File%20upload.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-319xx/CVE-2023-31942.json
Normal file
20
CVE-2023/CVE-2023-319xx/CVE-2023-31942.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31942",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-17T20:15:09.883",
|
||||
"lastModified": "2023-08-17T20:15:09.883",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the description parameter in insert.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug9-XSS-description.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-319xx/CVE-2023-31943.json
Normal file
20
CVE-2023/CVE-2023-319xx/CVE-2023-31943.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31943",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-17T20:15:09.947",
|
||||
"lastModified": "2023-08-17T20:15:09.947",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the ticket_id parameter at ticket_detail.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug6-SQL-Injection-ticket_id.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-319xx/CVE-2023-31944.json
Normal file
20
CVE-2023/CVE-2023-319xx/CVE-2023-31944.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31944",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-17T20:15:10.017",
|
||||
"lastModified": "2023-08-17T20:15:10.017",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the emp_id parameter at employee_edit.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug3-SQL-Injection-emp_id2.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-319xx/CVE-2023-31945.json
Normal file
20
CVE-2023/CVE-2023-319xx/CVE-2023-31945.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31945",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-17T20:15:10.087",
|
||||
"lastModified": "2023-08-17T20:15:10.087",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the id parameter at daily_expenditure_edit.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug5-SQL-Injection-id.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-319xx/CVE-2023-31946.json
Normal file
20
CVE-2023/CVE-2023-319xx/CVE-2023-31946.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-31946",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-17T20:15:10.157",
|
||||
"lastModified": "2023-08-17T20:15:10.157",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "File Upload vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via a crafted PHP file to the artical.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug8-File%20upload2.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
24
CVE-2023/CVE-2023-361xx/CVE-2023-36106.json
Normal file
24
CVE-2023/CVE-2023-361xx/CVE-2023-36106.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-36106",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-17T20:15:10.213",
|
||||
"lastModified": "2023-08-17T20:15:10.213",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An incorrect access control vulnerability in powerjob 4.3.2 and earlier allows remote attackers to obtain sensitive information via the interface for querying via appId parameter to /container/list."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/tztdsb/a653b6db328199ec0f55e54b4e466415#file-gistfile1-txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/KFCFans/PowerJob",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-368xx/CVE-2023-36844.json
Normal file
55
CVE-2023/CVE-2023-368xx/CVE-2023-36844.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-36844",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2023-08-17T20:15:10.267",
|
||||
"lastModified": "2023-08-17T20:15:10.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environments variables.\n\nUtilizing a crafted request an attacker is able to modify \n\ncertain PHP environments variables\u00a0leading to partial loss of integrity,\u00a0which may allow chaining to other vulnerabilities.\nThis issue affects Juniper Networks Junos OS on EX Series:\n\n\n\n * All versions prior to 20.4R3-S9;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S4;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to 22.3R3-S1;\n * 22.4 versions \n\nprior to \n\n22.4R2-S2, 22.4R3.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-473"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://supportportal.juniper.net/JSA72300",
|
||||
"source": "sirt@juniper.net"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-368xx/CVE-2023-36845.json
Normal file
55
CVE-2023/CVE-2023-368xx/CVE-2023-36845.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-36845",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2023-08-17T20:15:10.360",
|
||||
"lastModified": "2023-08-17T20:15:10.360",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series \n\nand SRX Series \n\nallows an unauthenticated, network-based attacker to control certain, important environments variables.\n\nUtilizing a crafted request an attacker is able to modify a certain PHP environment variable leading to partial loss of integrity, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions prior to 21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S4;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3-S1;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3;\n * 23.2 versions prior to 23.2R1-S1, 23.2R2.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-473"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://supportportal.juniper.net/JSA72300",
|
||||
"source": "sirt@juniper.net"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-368xx/CVE-2023-36846.json
Normal file
55
CVE-2023/CVE-2023-368xx/CVE-2023-36846.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-36846",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2023-08-17T20:15:10.457",
|
||||
"lastModified": "2023-08-17T20:15:10.457",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\nWith a specific request that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\nintegrity\n\nfor a certain\u00a0\n\npart of the\u00a0file system, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S3;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://supportportal.juniper.net/JSA72300",
|
||||
"source": "sirt@juniper.net"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-368xx/CVE-2023-36847.json
Normal file
55
CVE-2023/CVE-2023-368xx/CVE-2023-36847.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-36847",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2023-08-17T20:15:10.553",
|
||||
"lastModified": "2023-08-17T20:15:10.553",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\n\n\nWith a specific request that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\nintegrity\n\nfor a certain \n\npart of the file system, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on EX Series:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S4;\n * 22.1 versions \n\nprior to \n\n22.1R3-S3;\n * 22.2 versions \n\nprior to \n\n22.2R3-S1;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://supportportal.juniper.net/JSA72300",
|
||||
"source": "sirt@juniper.net"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,83 @@
|
||||
"id": "CVE-2023-37543",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-10T15:15:09.397",
|
||||
"lastModified": "2023-08-10T18:13:59.283",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-17T21:18:32.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cacti before 1.2.6 allows IDOR (Insecure Direct Object Reference) for accessing any graph via a modified local_graph_id parameter to graph_xport.php. This is a different vulnerability than CVE-2019-16723."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.2.6",
|
||||
"matchCriteriaId": "BF33D6C2-ADC9-4C3C-BF69-348B846CFD08"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-4x82-8w8m-w8hj",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://medium.com/@hussainfathy99/exciting-news-my-first-cve-discovery-cve-2023-37543-idor-vulnerability-in-cacti-bbb6c386afed",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,84 @@
|
||||
"id": "CVE-2023-37734",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-10T14:15:12.107",
|
||||
"lastModified": "2023-08-10T14:47:06.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-17T21:10:30.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "EZ softmagic MP3 Audio Converter 2.7.3.700 was discovered to contain a buffer overflow."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ezsoftmagic:mp3_audio_converter:2.7.3.700:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E3975A91-97AD-4A4F-B729-917CECEF33D6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://medium.com/@jraiv02/cve-2023-37734-buffer-overflow-in-mp3-audio-converter-318fd8271911",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/10374",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,14 @@
|
||||
"id": "CVE-2023-39848",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-15T21:15:09.700",
|
||||
"lastModified": "2023-08-17T15:15:09.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-17T20:15:10.900",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** DISPUTED ** DVWA v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at blind\\source\\high.php. NOTE: this is disputed by multiple third parties who report that the only role of DVWA is to intentionally implement vulnerabilities for learning purposes; it is never employed for delivering services or functionality to end users."
|
||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/KLSEHB/vulnerability-report/blob/main/Dvwa_CVE-2023-39848",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/digininja/DVWA",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,27 +2,14 @@
|
||||
"id": "CVE-2023-39849",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-15T22:15:13.937",
|
||||
"lastModified": "2023-08-17T07:15:43.463",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-17T20:15:11.137",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** DISPUTED ** Pikachu v1.0 was discovered to contain a SQL injection vulnerability via the $username parameter at \\inc\\function.php. NOTE: this is disputed by multiple third parties who report that the only role of Pikachu is to intentionally implement vulnerabilities for learning purposes; it is never employed for delivering services or functionality to end users."
|
||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/KLSEHB/vulnerability-report/blob/main/Pikachu_CVE-2023-39849",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zhuifengshaonianhanlu/pikachu",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/zhuifengshaonianhanlu/pikachu/blob/master/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
32
CVE-2023/CVE-2023-399xx/CVE-2023-39970.json
Normal file
32
CVE-2023/CVE-2023-399xx/CVE-2023-39970.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-39970",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2023-08-17T21:15:09.243",
|
||||
"lastModified": "2023-08-17T21:15:09.243",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in AcyMailing component for Joomla. It allows remote code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@joomla.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://extensions.joomla.org/extension/acymailing-starter/",
|
||||
"source": "security@joomla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-399xx/CVE-2023-39971.json
Normal file
36
CVE-2023/CVE-2023-399xx/CVE-2023-39971.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-39971",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2023-08-17T21:15:09.357",
|
||||
"lastModified": "2023-08-17T21:15:09.357",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation vulnerability in AcyMailing Enterprise component for Joomla allows XSS. This issue affects AcyMailing Enterprise component for Joomla: 6.7.0-8.6.3.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@joomla.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://extensions.joomla.org/extension/acymailing-starter/",
|
||||
"source": "security@joomla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.acymailing.com/acymailing-release-security-%F0%9F%94%90-news-updates/",
|
||||
"source": "security@joomla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-399xx/CVE-2023-39972.json
Normal file
36
CVE-2023/CVE-2023-399xx/CVE-2023-39972.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-39972",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2023-08-17T21:15:09.437",
|
||||
"lastModified": "2023-08-17T21:15:09.437",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Access Control vulnerability in AcyMailing Enterprise component for Joomla. It allows unauthorized users to create new mailing lists."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@joomla.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://extensions.joomla.org/extension/acymailing-starter/",
|
||||
"source": "security@joomla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.acymailing.com/acymailing-release-security-%F0%9F%94%90-news-updates/",
|
||||
"source": "security@joomla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-399xx/CVE-2023-39973.json
Normal file
36
CVE-2023/CVE-2023-399xx/CVE-2023-39973.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-39973",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2023-08-17T21:15:09.503",
|
||||
"lastModified": "2023-08-17T21:15:09.503",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Access Control vulnerability in AcyMailing Enterprise component for Joomla. It allows the unauthorized removal of attachments from campaigns."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@joomla.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://extensions.joomla.org/extension/acymailing-starter/",
|
||||
"source": "security@joomla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.acymailing.com/acymailing-release-security-%F0%9F%94%90-news-updates/",
|
||||
"source": "security@joomla.org"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-399xx/CVE-2023-39974.json
Normal file
36
CVE-2023/CVE-2023-399xx/CVE-2023-39974.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-39974",
|
||||
"sourceIdentifier": "security@joomla.org",
|
||||
"published": "2023-08-17T21:15:09.587",
|
||||
"lastModified": "2023-08-17T21:15:09.587",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information vulnerability in AcyMailing Enterprise component for Joomla. It allows unauthorized actors to get the number of subscribers in a specific list."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@joomla.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://extensions.joomla.org/extension/acymailing-starter/",
|
||||
"source": "security@joomla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.acymailing.com/acymailing-release-security-%F0%9F%94%90-news-updates/",
|
||||
"source": "security@joomla.org"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-401xx/CVE-2023-40168.json
Normal file
67
CVE-2023/CVE-2023-401xx/CVE-2023-40168.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-40168",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-08-17T20:15:11.190",
|
||||
"lastModified": "2023-08-17T20:15:11.190",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "TurboWarp is a desktop application that compiles scratch projects to JavaScript. TurboWarp Desktop versions prior to version 1.8.0 allowed a malicious project or custom extension to read arbitrary files from disk and upload them to a remote server. The only required user interaction is opening the sb3 file or loading the extension. The web version of TurboWarp is not affected. This bug has been addressed in commit `55e07e99b59` after an initial fix which was reverted. Users are advised to upgrade to version 1.8.0 or later. Users unable to upgrade should avoid opening sb3 files or loading extensions from untrusted sources."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TurboWarp/desktop/commit/55e07e99b59db334d75e8f46792a1569ab0884a6",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TurboWarp/desktop/commit/a62dbd7a28b41857e3b6f32443fda0527d493267",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TurboWarp/desktop/commit/f0f82aaf6cc8170e9da8b36953c98bfe533c019f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/TurboWarp/desktop/security/advisories/GHSA-wg4p-vj7h-q82q",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2023/CVE-2023-403xx/CVE-2023-40315.json
Normal file
47
CVE-2023/CVE-2023-403xx/CVE-2023-40315.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-40315",
|
||||
"sourceIdentifier": "security@opennms.com",
|
||||
"published": "2023-08-17T20:15:11.287",
|
||||
"lastModified": "2023-08-17T20:15:11.287",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role.\u00a0The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@opennms.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5",
|
||||
"source": "security@opennms.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenNMS/opennms/pull/6250",
|
||||
"source": "security@opennms.com"
|
||||
}
|
||||
]
|
||||
}
|
76
README.md
76
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-08-17T20:00:32.706807+00:00
|
||||
2023-08-17T22:00:31.216839+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-08-17T19:53:39.687000+00:00
|
||||
2023-08-17T21:26:11.863000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,52 +29,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
222918
|
||||
222939
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `8`
|
||||
Recently added CVEs: `21`
|
||||
|
||||
* [CVE-2023-37914](CVE-2023/CVE-2023-379xx/CVE-2023-37914.json) (`2023-08-17T18:15:14.810`)
|
||||
* [CVE-2023-40165](CVE-2023/CVE-2023-401xx/CVE-2023-40165.json) (`2023-08-17T18:15:17.100`)
|
||||
* [CVE-2023-26469](CVE-2023/CVE-2023-264xx/CVE-2023-26469.json) (`2023-08-17T19:15:12.143`)
|
||||
* [CVE-2023-38843](CVE-2023/CVE-2023-388xx/CVE-2023-38843.json) (`2023-08-17T19:15:12.800`)
|
||||
* [CVE-2023-38905](CVE-2023/CVE-2023-389xx/CVE-2023-38905.json) (`2023-08-17T19:15:12.873`)
|
||||
* [CVE-2023-39741](CVE-2023/CVE-2023-397xx/CVE-2023-39741.json) (`2023-08-17T19:15:12.977`)
|
||||
* [CVE-2023-39743](CVE-2023/CVE-2023-397xx/CVE-2023-39743.json) (`2023-08-17T19:15:13.077`)
|
||||
* [CVE-2023-40313](CVE-2023/CVE-2023-403xx/CVE-2023-40313.json) (`2023-08-17T19:15:13.220`)
|
||||
* [CVE-2023-31938](CVE-2023/CVE-2023-319xx/CVE-2023-31938.json) (`2023-08-17T20:15:09.607`)
|
||||
* [CVE-2023-31939](CVE-2023/CVE-2023-319xx/CVE-2023-31939.json) (`2023-08-17T20:15:09.710`)
|
||||
* [CVE-2023-31940](CVE-2023/CVE-2023-319xx/CVE-2023-31940.json) (`2023-08-17T20:15:09.767`)
|
||||
* [CVE-2023-31941](CVE-2023/CVE-2023-319xx/CVE-2023-31941.json) (`2023-08-17T20:15:09.827`)
|
||||
* [CVE-2023-31942](CVE-2023/CVE-2023-319xx/CVE-2023-31942.json) (`2023-08-17T20:15:09.883`)
|
||||
* [CVE-2023-31943](CVE-2023/CVE-2023-319xx/CVE-2023-31943.json) (`2023-08-17T20:15:09.947`)
|
||||
* [CVE-2023-31944](CVE-2023/CVE-2023-319xx/CVE-2023-31944.json) (`2023-08-17T20:15:10.017`)
|
||||
* [CVE-2023-31945](CVE-2023/CVE-2023-319xx/CVE-2023-31945.json) (`2023-08-17T20:15:10.087`)
|
||||
* [CVE-2023-31946](CVE-2023/CVE-2023-319xx/CVE-2023-31946.json) (`2023-08-17T20:15:10.157`)
|
||||
* [CVE-2023-36106](CVE-2023/CVE-2023-361xx/CVE-2023-36106.json) (`2023-08-17T20:15:10.213`)
|
||||
* [CVE-2023-36844](CVE-2023/CVE-2023-368xx/CVE-2023-36844.json) (`2023-08-17T20:15:10.267`)
|
||||
* [CVE-2023-36845](CVE-2023/CVE-2023-368xx/CVE-2023-36845.json) (`2023-08-17T20:15:10.360`)
|
||||
* [CVE-2023-36846](CVE-2023/CVE-2023-368xx/CVE-2023-36846.json) (`2023-08-17T20:15:10.457`)
|
||||
* [CVE-2023-36847](CVE-2023/CVE-2023-368xx/CVE-2023-36847.json) (`2023-08-17T20:15:10.553`)
|
||||
* [CVE-2023-40168](CVE-2023/CVE-2023-401xx/CVE-2023-40168.json) (`2023-08-17T20:15:11.190`)
|
||||
* [CVE-2023-40315](CVE-2023/CVE-2023-403xx/CVE-2023-40315.json) (`2023-08-17T20:15:11.287`)
|
||||
* [CVE-2023-39970](CVE-2023/CVE-2023-399xx/CVE-2023-39970.json) (`2023-08-17T21:15:09.243`)
|
||||
* [CVE-2023-39971](CVE-2023/CVE-2023-399xx/CVE-2023-39971.json) (`2023-08-17T21:15:09.357`)
|
||||
* [CVE-2023-39972](CVE-2023/CVE-2023-399xx/CVE-2023-39972.json) (`2023-08-17T21:15:09.437`)
|
||||
* [CVE-2023-39973](CVE-2023/CVE-2023-399xx/CVE-2023-39973.json) (`2023-08-17T21:15:09.503`)
|
||||
* [CVE-2023-39974](CVE-2023/CVE-2023-399xx/CVE-2023-39974.json) (`2023-08-17T21:15:09.587`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `62`
|
||||
Recently modified CVEs: `12`
|
||||
|
||||
* [CVE-2023-38497](CVE-2023/CVE-2023-384xx/CVE-2023-38497.json) (`2023-08-17T19:15:12.613`)
|
||||
* [CVE-2023-38633](CVE-2023/CVE-2023-386xx/CVE-2023-38633.json) (`2023-08-17T19:15:12.727`)
|
||||
* [CVE-2023-40272](CVE-2023/CVE-2023-402xx/CVE-2023-40272.json) (`2023-08-17T19:15:13.143`)
|
||||
* [CVE-2023-40336](CVE-2023/CVE-2023-403xx/CVE-2023-40336.json) (`2023-08-17T19:15:13.283`)
|
||||
* [CVE-2023-40337](CVE-2023/CVE-2023-403xx/CVE-2023-40337.json) (`2023-08-17T19:15:13.343`)
|
||||
* [CVE-2023-40338](CVE-2023/CVE-2023-403xx/CVE-2023-40338.json) (`2023-08-17T19:15:13.397`)
|
||||
* [CVE-2023-40339](CVE-2023/CVE-2023-403xx/CVE-2023-40339.json) (`2023-08-17T19:15:13.463`)
|
||||
* [CVE-2023-40340](CVE-2023/CVE-2023-403xx/CVE-2023-40340.json) (`2023-08-17T19:15:13.523`)
|
||||
* [CVE-2023-40341](CVE-2023/CVE-2023-403xx/CVE-2023-40341.json) (`2023-08-17T19:15:13.587`)
|
||||
* [CVE-2023-40342](CVE-2023/CVE-2023-403xx/CVE-2023-40342.json) (`2023-08-17T19:15:13.650`)
|
||||
* [CVE-2023-40343](CVE-2023/CVE-2023-403xx/CVE-2023-40343.json) (`2023-08-17T19:15:13.713`)
|
||||
* [CVE-2023-40344](CVE-2023/CVE-2023-403xx/CVE-2023-40344.json) (`2023-08-17T19:15:13.780`)
|
||||
* [CVE-2023-40345](CVE-2023/CVE-2023-403xx/CVE-2023-40345.json) (`2023-08-17T19:15:13.843`)
|
||||
* [CVE-2023-40346](CVE-2023/CVE-2023-403xx/CVE-2023-40346.json) (`2023-08-17T19:15:13.910`)
|
||||
* [CVE-2023-40347](CVE-2023/CVE-2023-403xx/CVE-2023-40347.json) (`2023-08-17T19:15:13.973`)
|
||||
* [CVE-2023-40348](CVE-2023/CVE-2023-403xx/CVE-2023-40348.json) (`2023-08-17T19:15:14.037`)
|
||||
* [CVE-2023-40349](CVE-2023/CVE-2023-403xx/CVE-2023-40349.json) (`2023-08-17T19:15:14.103`)
|
||||
* [CVE-2023-40350](CVE-2023/CVE-2023-403xx/CVE-2023-40350.json) (`2023-08-17T19:15:14.167`)
|
||||
* [CVE-2023-40351](CVE-2023/CVE-2023-403xx/CVE-2023-40351.json) (`2023-08-17T19:15:14.227`)
|
||||
* [CVE-2023-4382](CVE-2023/CVE-2023-43xx/CVE-2023-4382.json) (`2023-08-17T19:15:14.317`)
|
||||
* [CVE-2023-39387](CVE-2023/CVE-2023-393xx/CVE-2023-39387.json) (`2023-08-17T19:18:15.017`)
|
||||
* [CVE-2023-2804](CVE-2023/CVE-2023-28xx/CVE-2023-2804.json) (`2023-08-17T19:26:54.530`)
|
||||
* [CVE-2023-39386](CVE-2023/CVE-2023-393xx/CVE-2023-39386.json) (`2023-08-17T19:40:00.127`)
|
||||
* [CVE-2023-39385](CVE-2023/CVE-2023-393xx/CVE-2023-39385.json) (`2023-08-17T19:51:42.627`)
|
||||
* [CVE-2023-39405](CVE-2023/CVE-2023-394xx/CVE-2023-39405.json) (`2023-08-17T19:53:18.873`)
|
||||
* [CVE-2022-44611](CVE-2022/CVE-2022-446xx/CVE-2022-44611.json) (`2023-08-17T20:17:32.747`)
|
||||
* [CVE-2022-43505](CVE-2022/CVE-2022-435xx/CVE-2022-43505.json) (`2023-08-17T20:21:02.463`)
|
||||
* [CVE-2022-41804](CVE-2022/CVE-2022-418xx/CVE-2022-41804.json) (`2023-08-17T20:33:48.690`)
|
||||
* [CVE-2022-38102](CVE-2022/CVE-2022-381xx/CVE-2022-38102.json) (`2023-08-17T20:34:38.060`)
|
||||
* [CVE-2022-47636](CVE-2022/CVE-2022-476xx/CVE-2022-47636.json) (`2023-08-17T21:26:11.863`)
|
||||
* [CVE-2023-34438](CVE-2023/CVE-2023-344xx/CVE-2023-34438.json) (`2023-08-17T20:03:14.573`)
|
||||
* [CVE-2023-25944](CVE-2023/CVE-2023-259xx/CVE-2023-25944.json) (`2023-08-17T20:04:42.103`)
|
||||
* [CVE-2023-25775](CVE-2023/CVE-2023-257xx/CVE-2023-25775.json) (`2023-08-17T20:10:37.247`)
|
||||
* [CVE-2023-39848](CVE-2023/CVE-2023-398xx/CVE-2023-39848.json) (`2023-08-17T20:15:10.900`)
|
||||
* [CVE-2023-39849](CVE-2023/CVE-2023-398xx/CVE-2023-39849.json) (`2023-08-17T20:15:11.137`)
|
||||
* [CVE-2023-37734](CVE-2023/CVE-2023-377xx/CVE-2023-37734.json) (`2023-08-17T21:10:30.753`)
|
||||
* [CVE-2023-37543](CVE-2023/CVE-2023-375xx/CVE-2023-37543.json) (`2023-08-17T21:18:32.357`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user