Auto-Update: 2023-08-17T22:00:31.216839+00:00

This commit is contained in:
cad-safe-bot 2023-08-17 22:00:34 +00:00
parent 1de4c25be0
commit a24e9c1230
34 changed files with 44253 additions and 106 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38102",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:14.070",
"lastModified": "2023-08-11T03:44:51.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-17T20:34:38.060",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,558 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.1.27",
"matchCriteriaId": "CF505BC6-9834-416D-8539-9EADD93D81A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:b660:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2576527C-0218-491F-871E-07A60A5E1C25"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:h610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A68DECC9-072F-43C0-90EF-02E8BBC9AE4C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:h610e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B973879-DE48-4461-B543-98625EABCCE4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:h670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF3A230-7824-4417-B5C4-E2D30ECBE3AE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:hm670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70675897-E01D-4217-82AE-EC15AE58390E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:q670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3DBB4E3-B863-4333-AC01-DB21416FCB94"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:q670e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B479403-BA34-426F-8DB6-61303C57F268"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:r680e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F20D230F-E14A-4986-8746-168CC9C61AD0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:w680:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF31448A-E935-4FFF-AF76-2B06EF71E229"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:wm690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5B7B7CD-63B7-4F80-A0A1-7C69F0868D1B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:z690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D1C667A-A904-4707-BE7E-FF7530E0D716"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.0.45",
"matchCriteriaId": "5438BCF4-5C36-458B-95B3-F55AC0C886CA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89231773-9D9B-434A-A6A3-8527C4F6FEBB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A85EA674-2537-4323-AEDA-FA356489E7DE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F85599DD-3F80-4EB0-9753-D24EDD8D76CC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:atom_x6214re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D98929C-9560-40CF-8231-718B5BFF19EA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:atom_x6414re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1D7A0BC-7798-466E-B341-D371988FE6CA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:atom_x6416re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8C0489-E31A-455A-AA64-3765074530F4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F068F4F-8CCD-4218-871C-BEABEB0DAB55"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7313975C-41A5-4657-8758-1C16F947BE4C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBE4406-9979-4723-833C-176F051E6389"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE930AA-59F7-43A7-9FF3-363CE72A6728"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:c252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E46116-6B73-4A65-A2AB-E238678B7E48"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:c256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F281EE-3F33-406A-8FA0-43B3AB6BC35B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3162DD-BF40-4A58-8FC4-63B4455C0E51"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D67C6D6B-12F3-43A6-BB8D-DFE0B6483294"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96F1DD9B-C078-41C5-88E0-DB7705E17742"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:hm570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9BD5A1-AD1F-4770-87EE-7F1804BA87A1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:hm570e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "242BA56E-E8D0-4851-AA71-FECB9E102F87"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C43D202-D661-4042-9F68-0FA7EE73CFEE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29ECACD3-E10C-4773-B847-8C1C097C45FA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7596F281-BA94-4239-8238-AA5EC804AE11"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A635B99E-A03F-488A-A01B-B390691EA03B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22EAE772-AFAC-4272-8129-B416B171490C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A836B1-451E-4CEF-8A14-89FFB9289DD3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BCD8EB-D71A-4BD6-8D2D-AF2430F840C3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:qm580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61AB83BE-01F0-412B-98E9-B766884BF249"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:qm580e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CDD634A-B6BA-452C-A6E0-18ADEFF81529"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:rm590e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C4E46E-5828-4EE6-9A95-8F4FE56AC156"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE366EB3-BE96-4A01-9BD5-792B59163938"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:wm590:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4158B9A6-ACBE-4A62-AA2C-9790F73C4C3C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89563A0F-CE7A-41C5-A8C7-9FC2D40F000A"
}
]
}
]
}
],
"references": [
{
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -2,23 +2,85 @@
"id": "CVE-2022-47636",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T16:15:09.627",
"lastModified": "2023-08-11T15:15:09.490",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-17T21:26:11.863",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A DLL hijacking vulnerability has been discovered in OutSystems Service Studio 11 11.53.30 build 61739. When a user open a .oml file (OutSystems Modeling Language), the application will load the following DLLs from the same directory av_libGLESv2.dll, libcef.DLL, user32.dll, and d3d10warp.dll. Using a crafted DLL, it is possible to execute arbitrary code in the context of the current logged in user."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:outsystems:service_studio:11.53.30:*:*:*:*:*:*:*",
"matchCriteriaId": "F38B2C3D-12C6-4A10-9376-7D977BD74121"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/51678",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25775",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:18.940",
"lastModified": "2023-08-11T03:44:51.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-17T20:10:37.247",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:ethernet_controller_rdma_driver_for_linux:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.9.30",
"matchCriteriaId": "F7C4A7F1-72A7-42E7-92BE-259FBF31777F"
}
]
}
]
}
],
"references": [
{
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25944",
"sourceIdentifier": "secure@intel.com",
"published": "2023-08-11T03:15:19.343",
"lastModified": "2023-08-11T03:44:51.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-17T20:04:42.103",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:vcust_tool:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023-02-03",
"matchCriteriaId": "B1B7FE3D-62D9-489E-B8AE-992DE2ABE969"
}
]
}
]
}
],
"references": [
{
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00844.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31938",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:09.607",
"lastModified": "2023-08-17T20:15:09.607",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the emp_id parameter at employee_detail.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug2-SQL-Injection-emp_id.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31939",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:09.710",
"lastModified": "2023-08-17T20:15:09.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the costomer_id parameter at customer_edit.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug4-SQL-Injection-costomer_id.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31940",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:09.767",
"lastModified": "2023-08-17T20:15:09.767",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the page_id parameter at article_edit.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug7-SQL-Injection-page_id.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31941",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:09.827",
"lastModified": "2023-08-17T20:15:09.827",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via a crafted PHP file to the employee_insert.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug1-File%20upload.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31942",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:09.883",
"lastModified": "2023-08-17T20:15:09.883",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the description parameter in insert.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug9-XSS-description.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31943",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:09.947",
"lastModified": "2023-08-17T20:15:09.947",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the ticket_id parameter at ticket_detail.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug6-SQL-Injection-ticket_id.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31944",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:10.017",
"lastModified": "2023-08-17T20:15:10.017",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the emp_id parameter at employee_edit.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug3-SQL-Injection-emp_id2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31945",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:10.087",
"lastModified": "2023-08-17T20:15:10.087",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the id parameter at daily_expenditure_edit.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug5-SQL-Injection-id.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31946",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:10.157",
"lastModified": "2023-08-17T20:15:10.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via a crafted PHP file to the artical.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug8-File%20upload2.md",
"source": "cve@mitre.org"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36106",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T20:15:10.213",
"lastModified": "2023-08-17T20:15:10.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An incorrect access control vulnerability in powerjob 4.3.2 and earlier allows remote attackers to obtain sensitive information via the interface for querying via appId parameter to /container/list."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/tztdsb/a653b6db328199ec0f55e54b4e466415#file-gistfile1-txt",
"source": "cve@mitre.org"
},
{
"url": "https://gitee.com/KFCFans/PowerJob",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-36844",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-08-17T20:15:10.267",
"lastModified": "2023-08-17T20:15:10.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environments variables.\n\nUtilizing a crafted request an attacker is able to modify \n\ncertain PHP environments variables\u00a0leading to partial loss of integrity,\u00a0which may allow chaining to other vulnerabilities.\nThis issue affects Juniper Networks Junos OS on EX Series:\n\n\n\n * All versions prior to 20.4R3-S9;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S4;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to 22.3R3-S1;\n * 22.4 versions \n\nprior to \n\n22.4R2-S2, 22.4R3.\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-473"
}
]
}
],
"references": [
{
"url": "https://supportportal.juniper.net/JSA72300",
"source": "sirt@juniper.net"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-36845",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-08-17T20:15:10.360",
"lastModified": "2023-08-17T20:15:10.360",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series \n\nand SRX Series \n\nallows an unauthenticated, network-based attacker to control certain, important environments variables.\n\nUtilizing a crafted request an attacker is able to modify a certain PHP environment variable leading to partial loss of integrity, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions prior to 21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S4;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3-S1;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3;\n * 23.2 versions prior to 23.2R1-S1, 23.2R2.\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-473"
}
]
}
],
"references": [
{
"url": "https://supportportal.juniper.net/JSA72300",
"source": "sirt@juniper.net"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-36846",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-08-17T20:15:10.457",
"lastModified": "2023-08-17T20:15:10.457",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\nWith a specific request that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\nintegrity\n\nfor a certain\u00a0\n\npart of the\u00a0file system, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on SRX Series:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S5;\n * 22.1 versions \n\nprior to \n\n22.1R3-S3;\n * 22.2 versions \n\nprior to \n\n22.2R3-S2;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://supportportal.juniper.net/JSA72300",
"source": "sirt@juniper.net"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-36847",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-08-17T20:15:10.553",
"lastModified": "2023-08-17T20:15:10.553",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity.\n\n\n\n\n\nWith a specific request that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of \n\nintegrity\n\nfor a certain \n\npart of the file system, which may allow chaining to other vulnerabilities.\n\n\nThis issue affects Juniper Networks Junos OS on EX Series:\n\n\n\n * All versions prior to 20.4R3-S8;\n * 21.2 versions prior to 21.2R3-S6;\n * 21.3 versions \n\nprior to \n\n 21.3R3-S5;\n * 21.4 versions \n\nprior to \n\n21.4R3-S4;\n * 22.1 versions \n\nprior to \n\n22.1R3-S3;\n * 22.2 versions \n\nprior to \n\n22.2R3-S1;\n * 22.3 versions \n\nprior to \n\n22.3R2-S2, 22.3R3;\n * 22.4 versions \n\nprior to \n\n22.4R2-S1, 22.4R3.\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://supportportal.juniper.net/JSA72300",
"source": "sirt@juniper.net"
}
]
}

View File

@ -2,23 +2,83 @@
"id": "CVE-2023-37543",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T15:15:09.397",
"lastModified": "2023-08-10T18:13:59.283",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-17T21:18:32.357",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cacti before 1.2.6 allows IDOR (Insecure Direct Object Reference) for accessing any graph via a modified local_graph_id parameter to graph_xport.php. This is a different vulnerability than CVE-2019-16723."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.2.6",
"matchCriteriaId": "BF33D6C2-ADC9-4C3C-BF69-348B846CFD08"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Cacti/cacti/security/advisories/GHSA-4x82-8w8m-w8hj",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://medium.com/@hussainfathy99/exciting-news-my-first-cve-discovery-cve-2023-37543-idor-vulnerability-in-cacti-bbb6c386afed",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,84 @@
"id": "CVE-2023-37734",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-10T14:15:12.107",
"lastModified": "2023-08-10T14:47:06.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-17T21:10:30.753",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "EZ softmagic MP3 Audio Converter 2.7.3.700 was discovered to contain a buffer overflow."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ezsoftmagic:mp3_audio_converter:2.7.3.700:*:*:*:*:*:*:*",
"matchCriteriaId": "E3975A91-97AD-4A4F-B729-917CECEF33D6"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/@jraiv02/cve-2023-37734-buffer-overflow-in-mp3-audio-converter-318fd8271911",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/10374",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"VDB Entry"
]
}
]
}

View File

@ -2,23 +2,14 @@
"id": "CVE-2023-39848",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-15T21:15:09.700",
"lastModified": "2023-08-17T15:15:09.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-17T20:15:10.900",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** DISPUTED ** DVWA v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at blind\\source\\high.php. NOTE: this is disputed by multiple third parties who report that the only role of DVWA is to intentionally implement vulnerabilities for learning purposes; it is never employed for delivering services or functionality to end users."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/KLSEHB/vulnerability-report/blob/main/Dvwa_CVE-2023-39848",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/digininja/DVWA",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -2,27 +2,14 @@
"id": "CVE-2023-39849",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-15T22:15:13.937",
"lastModified": "2023-08-17T07:15:43.463",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-17T20:15:11.137",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** DISPUTED ** Pikachu v1.0 was discovered to contain a SQL injection vulnerability via the $username parameter at \\inc\\function.php. NOTE: this is disputed by multiple third parties who report that the only role of Pikachu is to intentionally implement vulnerabilities for learning purposes; it is never employed for delivering services or functionality to end users."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/KLSEHB/vulnerability-report/blob/main/Pikachu_CVE-2023-39849",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/zhuifengshaonianhanlu/pikachu",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/zhuifengshaonianhanlu/pikachu/blob/master/README.md",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-39970",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-17T21:15:09.243",
"lastModified": "2023-08-17T21:15:09.243",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in AcyMailing component for Joomla. It allows remote code execution."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/acymailing-starter/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-39971",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-17T21:15:09.357",
"lastModified": "2023-08-17T21:15:09.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation vulnerability in AcyMailing Enterprise component for Joomla allows XSS. This issue affects AcyMailing Enterprise component for Joomla: 6.7.0-8.6.3.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/acymailing-starter/",
"source": "security@joomla.org"
},
{
"url": "https://www.acymailing.com/acymailing-release-security-%F0%9F%94%90-news-updates/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-39972",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-17T21:15:09.437",
"lastModified": "2023-08-17T21:15:09.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Access Control vulnerability in AcyMailing Enterprise component for Joomla. It allows unauthorized users to create new mailing lists."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/acymailing-starter/",
"source": "security@joomla.org"
},
{
"url": "https://www.acymailing.com/acymailing-release-security-%F0%9F%94%90-news-updates/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-39973",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-17T21:15:09.503",
"lastModified": "2023-08-17T21:15:09.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Access Control vulnerability in AcyMailing Enterprise component for Joomla. It allows the unauthorized removal of attachments from campaigns."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/acymailing-starter/",
"source": "security@joomla.org"
},
{
"url": "https://www.acymailing.com/acymailing-release-security-%F0%9F%94%90-news-updates/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-39974",
"sourceIdentifier": "security@joomla.org",
"published": "2023-08-17T21:15:09.587",
"lastModified": "2023-08-17T21:15:09.587",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information vulnerability in AcyMailing Enterprise component for Joomla. It allows unauthorized actors to get the number of subscribers in a specific list."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/acymailing-starter/",
"source": "security@joomla.org"
},
{
"url": "https://www.acymailing.com/acymailing-release-security-%F0%9F%94%90-news-updates/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2023-40168",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-17T20:15:11.190",
"lastModified": "2023-08-17T20:15:11.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "TurboWarp is a desktop application that compiles scratch projects to JavaScript. TurboWarp Desktop versions prior to version 1.8.0 allowed a malicious project or custom extension to read arbitrary files from disk and upload them to a remote server. The only required user interaction is opening the sb3 file or loading the extension. The web version of TurboWarp is not affected. This bug has been addressed in commit `55e07e99b59` after an initial fix which was reverted. Users are advised to upgrade to version 1.8.0 or later. Users unable to upgrade should avoid opening sb3 files or loading extensions from untrusted sources."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/TurboWarp/desktop/commit/55e07e99b59db334d75e8f46792a1569ab0884a6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/TurboWarp/desktop/commit/a62dbd7a28b41857e3b6f32443fda0527d493267",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/TurboWarp/desktop/commit/f0f82aaf6cc8170e9da8b36953c98bfe533c019f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/TurboWarp/desktop/security/advisories/GHSA-wg4p-vj7h-q82q",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2023-40315",
"sourceIdentifier": "security@opennms.com",
"published": "2023-08-17T20:15:11.287",
"lastModified": "2023-08-17T20:15:11.287",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role.\u00a0The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@opennms.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 4.7
}
]
},
"references": [
{
"url": "https://docs.opennms.com/meridian/2023/releasenotes/changelog.html#releasenotes-changelog-Meridian-2023.1.5",
"source": "security@opennms.com"
},
{
"url": "https://github.com/OpenNMS/opennms/pull/6250",
"source": "security@opennms.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-17T20:00:32.706807+00:00
2023-08-17T22:00:31.216839+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-17T19:53:39.687000+00:00
2023-08-17T21:26:11.863000+00:00
```
### Last Data Feed Release
@ -29,52 +29,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
222918
222939
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `21`
* [CVE-2023-37914](CVE-2023/CVE-2023-379xx/CVE-2023-37914.json) (`2023-08-17T18:15:14.810`)
* [CVE-2023-40165](CVE-2023/CVE-2023-401xx/CVE-2023-40165.json) (`2023-08-17T18:15:17.100`)
* [CVE-2023-26469](CVE-2023/CVE-2023-264xx/CVE-2023-26469.json) (`2023-08-17T19:15:12.143`)
* [CVE-2023-38843](CVE-2023/CVE-2023-388xx/CVE-2023-38843.json) (`2023-08-17T19:15:12.800`)
* [CVE-2023-38905](CVE-2023/CVE-2023-389xx/CVE-2023-38905.json) (`2023-08-17T19:15:12.873`)
* [CVE-2023-39741](CVE-2023/CVE-2023-397xx/CVE-2023-39741.json) (`2023-08-17T19:15:12.977`)
* [CVE-2023-39743](CVE-2023/CVE-2023-397xx/CVE-2023-39743.json) (`2023-08-17T19:15:13.077`)
* [CVE-2023-40313](CVE-2023/CVE-2023-403xx/CVE-2023-40313.json) (`2023-08-17T19:15:13.220`)
* [CVE-2023-31938](CVE-2023/CVE-2023-319xx/CVE-2023-31938.json) (`2023-08-17T20:15:09.607`)
* [CVE-2023-31939](CVE-2023/CVE-2023-319xx/CVE-2023-31939.json) (`2023-08-17T20:15:09.710`)
* [CVE-2023-31940](CVE-2023/CVE-2023-319xx/CVE-2023-31940.json) (`2023-08-17T20:15:09.767`)
* [CVE-2023-31941](CVE-2023/CVE-2023-319xx/CVE-2023-31941.json) (`2023-08-17T20:15:09.827`)
* [CVE-2023-31942](CVE-2023/CVE-2023-319xx/CVE-2023-31942.json) (`2023-08-17T20:15:09.883`)
* [CVE-2023-31943](CVE-2023/CVE-2023-319xx/CVE-2023-31943.json) (`2023-08-17T20:15:09.947`)
* [CVE-2023-31944](CVE-2023/CVE-2023-319xx/CVE-2023-31944.json) (`2023-08-17T20:15:10.017`)
* [CVE-2023-31945](CVE-2023/CVE-2023-319xx/CVE-2023-31945.json) (`2023-08-17T20:15:10.087`)
* [CVE-2023-31946](CVE-2023/CVE-2023-319xx/CVE-2023-31946.json) (`2023-08-17T20:15:10.157`)
* [CVE-2023-36106](CVE-2023/CVE-2023-361xx/CVE-2023-36106.json) (`2023-08-17T20:15:10.213`)
* [CVE-2023-36844](CVE-2023/CVE-2023-368xx/CVE-2023-36844.json) (`2023-08-17T20:15:10.267`)
* [CVE-2023-36845](CVE-2023/CVE-2023-368xx/CVE-2023-36845.json) (`2023-08-17T20:15:10.360`)
* [CVE-2023-36846](CVE-2023/CVE-2023-368xx/CVE-2023-36846.json) (`2023-08-17T20:15:10.457`)
* [CVE-2023-36847](CVE-2023/CVE-2023-368xx/CVE-2023-36847.json) (`2023-08-17T20:15:10.553`)
* [CVE-2023-40168](CVE-2023/CVE-2023-401xx/CVE-2023-40168.json) (`2023-08-17T20:15:11.190`)
* [CVE-2023-40315](CVE-2023/CVE-2023-403xx/CVE-2023-40315.json) (`2023-08-17T20:15:11.287`)
* [CVE-2023-39970](CVE-2023/CVE-2023-399xx/CVE-2023-39970.json) (`2023-08-17T21:15:09.243`)
* [CVE-2023-39971](CVE-2023/CVE-2023-399xx/CVE-2023-39971.json) (`2023-08-17T21:15:09.357`)
* [CVE-2023-39972](CVE-2023/CVE-2023-399xx/CVE-2023-39972.json) (`2023-08-17T21:15:09.437`)
* [CVE-2023-39973](CVE-2023/CVE-2023-399xx/CVE-2023-39973.json) (`2023-08-17T21:15:09.503`)
* [CVE-2023-39974](CVE-2023/CVE-2023-399xx/CVE-2023-39974.json) (`2023-08-17T21:15:09.587`)
### CVEs modified in the last Commit
Recently modified CVEs: `62`
Recently modified CVEs: `12`
* [CVE-2023-38497](CVE-2023/CVE-2023-384xx/CVE-2023-38497.json) (`2023-08-17T19:15:12.613`)
* [CVE-2023-38633](CVE-2023/CVE-2023-386xx/CVE-2023-38633.json) (`2023-08-17T19:15:12.727`)
* [CVE-2023-40272](CVE-2023/CVE-2023-402xx/CVE-2023-40272.json) (`2023-08-17T19:15:13.143`)
* [CVE-2023-40336](CVE-2023/CVE-2023-403xx/CVE-2023-40336.json) (`2023-08-17T19:15:13.283`)
* [CVE-2023-40337](CVE-2023/CVE-2023-403xx/CVE-2023-40337.json) (`2023-08-17T19:15:13.343`)
* [CVE-2023-40338](CVE-2023/CVE-2023-403xx/CVE-2023-40338.json) (`2023-08-17T19:15:13.397`)
* [CVE-2023-40339](CVE-2023/CVE-2023-403xx/CVE-2023-40339.json) (`2023-08-17T19:15:13.463`)
* [CVE-2023-40340](CVE-2023/CVE-2023-403xx/CVE-2023-40340.json) (`2023-08-17T19:15:13.523`)
* [CVE-2023-40341](CVE-2023/CVE-2023-403xx/CVE-2023-40341.json) (`2023-08-17T19:15:13.587`)
* [CVE-2023-40342](CVE-2023/CVE-2023-403xx/CVE-2023-40342.json) (`2023-08-17T19:15:13.650`)
* [CVE-2023-40343](CVE-2023/CVE-2023-403xx/CVE-2023-40343.json) (`2023-08-17T19:15:13.713`)
* [CVE-2023-40344](CVE-2023/CVE-2023-403xx/CVE-2023-40344.json) (`2023-08-17T19:15:13.780`)
* [CVE-2023-40345](CVE-2023/CVE-2023-403xx/CVE-2023-40345.json) (`2023-08-17T19:15:13.843`)
* [CVE-2023-40346](CVE-2023/CVE-2023-403xx/CVE-2023-40346.json) (`2023-08-17T19:15:13.910`)
* [CVE-2023-40347](CVE-2023/CVE-2023-403xx/CVE-2023-40347.json) (`2023-08-17T19:15:13.973`)
* [CVE-2023-40348](CVE-2023/CVE-2023-403xx/CVE-2023-40348.json) (`2023-08-17T19:15:14.037`)
* [CVE-2023-40349](CVE-2023/CVE-2023-403xx/CVE-2023-40349.json) (`2023-08-17T19:15:14.103`)
* [CVE-2023-40350](CVE-2023/CVE-2023-403xx/CVE-2023-40350.json) (`2023-08-17T19:15:14.167`)
* [CVE-2023-40351](CVE-2023/CVE-2023-403xx/CVE-2023-40351.json) (`2023-08-17T19:15:14.227`)
* [CVE-2023-4382](CVE-2023/CVE-2023-43xx/CVE-2023-4382.json) (`2023-08-17T19:15:14.317`)
* [CVE-2023-39387](CVE-2023/CVE-2023-393xx/CVE-2023-39387.json) (`2023-08-17T19:18:15.017`)
* [CVE-2023-2804](CVE-2023/CVE-2023-28xx/CVE-2023-2804.json) (`2023-08-17T19:26:54.530`)
* [CVE-2023-39386](CVE-2023/CVE-2023-393xx/CVE-2023-39386.json) (`2023-08-17T19:40:00.127`)
* [CVE-2023-39385](CVE-2023/CVE-2023-393xx/CVE-2023-39385.json) (`2023-08-17T19:51:42.627`)
* [CVE-2023-39405](CVE-2023/CVE-2023-394xx/CVE-2023-39405.json) (`2023-08-17T19:53:18.873`)
* [CVE-2022-44611](CVE-2022/CVE-2022-446xx/CVE-2022-44611.json) (`2023-08-17T20:17:32.747`)
* [CVE-2022-43505](CVE-2022/CVE-2022-435xx/CVE-2022-43505.json) (`2023-08-17T20:21:02.463`)
* [CVE-2022-41804](CVE-2022/CVE-2022-418xx/CVE-2022-41804.json) (`2023-08-17T20:33:48.690`)
* [CVE-2022-38102](CVE-2022/CVE-2022-381xx/CVE-2022-38102.json) (`2023-08-17T20:34:38.060`)
* [CVE-2022-47636](CVE-2022/CVE-2022-476xx/CVE-2022-47636.json) (`2023-08-17T21:26:11.863`)
* [CVE-2023-34438](CVE-2023/CVE-2023-344xx/CVE-2023-34438.json) (`2023-08-17T20:03:14.573`)
* [CVE-2023-25944](CVE-2023/CVE-2023-259xx/CVE-2023-25944.json) (`2023-08-17T20:04:42.103`)
* [CVE-2023-25775](CVE-2023/CVE-2023-257xx/CVE-2023-25775.json) (`2023-08-17T20:10:37.247`)
* [CVE-2023-39848](CVE-2023/CVE-2023-398xx/CVE-2023-39848.json) (`2023-08-17T20:15:10.900`)
* [CVE-2023-39849](CVE-2023/CVE-2023-398xx/CVE-2023-39849.json) (`2023-08-17T20:15:11.137`)
* [CVE-2023-37734](CVE-2023/CVE-2023-377xx/CVE-2023-37734.json) (`2023-08-17T21:10:30.753`)
* [CVE-2023-37543](CVE-2023/CVE-2023-375xx/CVE-2023-37543.json) (`2023-08-17T21:18:32.357`)
## Download and Usage