diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26064.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26064.json index 6b32f819dc8..448ddf86d2b 100644 --- a/CVE-2020/CVE-2020-260xx/CVE-2020-26064.json +++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26064.json @@ -2,8 +2,8 @@ "id": "CVE-2020-26064", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-08-04T21:15:09.580", - "lastModified": "2023-08-06T12:01:17.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T20:51:40.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "ykramarz@cisco.com", @@ -34,10 +56,237 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D171C77F-3464-424D-8EF3-E600993847E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EC380008-5269-47CF-AB6A-FB86E70D85FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "2F23E13A-C4C8-41B0-AF4E-21CD2AF7A71A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "70ABB96D-4D60-4CC5-8679-714DE6FA6077" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "9BD1CAEC-A8F6-4342-BB7E-7651F4747F98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "81229976-BA89-4FEA-B1A1-EB48AB92E11C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.10:*:*:*:*:*:*:*", + "matchCriteriaId": "F02A9338-6A2F-4F0D-9A96-99FD7F461BB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F2CBAFF1-A6D3-495D-9F5D-7CA8367AB2F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FFC8A8D3-B02A-4D4D-9230-E0DFCC6CA9BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "809D02FD-DA6B-4703-A1C2-AD80BB97390A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1926C09C-FFBC-4FEE-A123-A56CD99B15B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "48D852E8-07B7-40D0-B462-7A37B43C633C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D8EBBBD8-3E84-4EEB-B185-25554209EC34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C7FF8324-2DE9-4E02-B7BE-FD184929F9AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E3A20E0D-0EFF-4AA2-A376-B3B2AEE80689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "56A28340-7DEA-455A-9491-3930BF67818C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "749CC02C-3A3F-4A5B-A347-10E20394A819" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "30281EB2-868F-4E70-B3D3-913A580AE30F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E072550-D394-4041-B0D5-35CCC4F66254" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6C5774-1126-49FC-94CC-18A999371BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "08529D16-9D71-48D9-8135-58BB1AAABB2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "AEB24BC3-8F53-4532-81C0-42B2CA826339" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.4:*:*:*:*:*:*:*", + "matchCriteriaId": "CEEA6969-32CD-465A-ACCB-0BB7E54B83D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.5:*:*:*:*:*:*:*", + "matchCriteriaId": "7F89FC0E-F65D-4EE7-A6DC-22623732D8AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.302:*:*:*:*:*:*:*", + "matchCriteriaId": "11BF9E75-588E-4C5B-8209-16439A00CE31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.303:*:*:*:*:*:*:*", + "matchCriteriaId": "97AB5E5A-48B6-4A3C-A9BC-8915CB2F3181" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1D52868E-55DB-4E33-9BE5-77B9FF848612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AD088143-0373-4CED-807B-888574873A9F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "44410EF9-0107-4526-97A7-D2CD560F88EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "C562302D-B9EC-4ED0-8249-D3F3FC8559C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0369C767-0388-4AA1-AB36-DBB57F1F36B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.31:*:*:*:*:*:*:*", + "matchCriteriaId": "CEB96881-2DC8-497A-9823-BE8E18D278FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.097:*:*:*:*:*:*:*", + "matchCriteriaId": "097EEFFB-6CB1-4E28-9E00-5A033690D41D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.099:*:*:*:*:*:*:*", + "matchCriteriaId": "24D43391-6F2A-4D2C-A56C-1FE941F33CC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.929:*:*:*:*:*:*:*", + "matchCriteriaId": "2C4A9DD6-D8FB-401E-8FC0-D2A24876CCA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "248FECEF-4E1F-4F20-8B17-D7EAA575B1BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:20.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "145C6AAC-80CB-45CA-8C89-61D4B89562EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:20.1.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "33136477-5A96-4DB2-8EE1-87360776143A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:20.1.12:*:*:*:*:*:*:*", + "matchCriteriaId": "5075B3F4-7B36-4BD6-864D-288F1F7ABE13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:20.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB9CB55-9E0F-468F-9CDE-1997D11D02C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanx2-KpFVSUc", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26065.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26065.json index 7b92c853519..ee95e37255f 100644 --- a/CVE-2020/CVE-2020-260xx/CVE-2020-26065.json +++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26065.json @@ -2,8 +2,8 @@ "id": "CVE-2020-26065", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-08-04T21:15:10.640", - "lastModified": "2023-08-06T12:01:17.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T20:46:33.817", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "ykramarz@cisco.com", @@ -34,10 +56,237 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D171C77F-3464-424D-8EF3-E600993847E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "EC380008-5269-47CF-AB6A-FB86E70D85FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "2F23E13A-C4C8-41B0-AF4E-21CD2AF7A71A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "70ABB96D-4D60-4CC5-8679-714DE6FA6077" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "9BD1CAEC-A8F6-4342-BB7E-7651F4747F98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "81229976-BA89-4FEA-B1A1-EB48AB92E11C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:17.2.10:*:*:*:*:*:*:*", + "matchCriteriaId": "F02A9338-6A2F-4F0D-9A96-99FD7F461BB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F2CBAFF1-A6D3-495D-9F5D-7CA8367AB2F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FFC8A8D3-B02A-4D4D-9230-E0DFCC6CA9BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "809D02FD-DA6B-4703-A1C2-AD80BB97390A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1926C09C-FFBC-4FEE-A123-A56CD99B15B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "48D852E8-07B7-40D0-B462-7A37B43C633C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D8EBBBD8-3E84-4EEB-B185-25554209EC34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C7FF8324-2DE9-4E02-B7BE-FD184929F9AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E3A20E0D-0EFF-4AA2-A376-B3B2AEE80689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "56A28340-7DEA-455A-9491-3930BF67818C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "749CC02C-3A3F-4A5B-A347-10E20394A819" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "30281EB2-868F-4E70-B3D3-913A580AE30F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9E072550-D394-4041-B0D5-35CCC4F66254" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6C5774-1126-49FC-94CC-18A999371BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "08529D16-9D71-48D9-8135-58BB1AAABB2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "AEB24BC3-8F53-4532-81C0-42B2CA826339" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.4:*:*:*:*:*:*:*", + "matchCriteriaId": "CEEA6969-32CD-465A-ACCB-0BB7E54B83D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.5:*:*:*:*:*:*:*", + "matchCriteriaId": "7F89FC0E-F65D-4EE7-A6DC-22623732D8AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.302:*:*:*:*:*:*:*", + "matchCriteriaId": "11BF9E75-588E-4C5B-8209-16439A00CE31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:18.4.303:*:*:*:*:*:*:*", + "matchCriteriaId": "97AB5E5A-48B6-4A3C-A9BC-8915CB2F3181" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1D52868E-55DB-4E33-9BE5-77B9FF848612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AD088143-0373-4CED-807B-888574873A9F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "44410EF9-0107-4526-97A7-D2CD560F88EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "C562302D-B9EC-4ED0-8249-D3F3FC8559C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0369C767-0388-4AA1-AB36-DBB57F1F36B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.31:*:*:*:*:*:*:*", + "matchCriteriaId": "CEB96881-2DC8-497A-9823-BE8E18D278FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.097:*:*:*:*:*:*:*", + "matchCriteriaId": "097EEFFB-6CB1-4E28-9E00-5A033690D41D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.099:*:*:*:*:*:*:*", + "matchCriteriaId": "24D43391-6F2A-4D2C-A56C-1FE941F33CC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.2.929:*:*:*:*:*:*:*", + "matchCriteriaId": "2C4A9DD6-D8FB-401E-8FC0-D2A24876CCA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:19.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "248FECEF-4E1F-4F20-8B17-D7EAA575B1BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:20.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "145C6AAC-80CB-45CA-8C89-61D4B89562EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:20.1.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "33136477-5A96-4DB2-8EE1-87360776143A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:20.1.12:*:*:*:*:*:*:*", + "matchCriteriaId": "5075B3F4-7B36-4BD6-864D-288F1F7ABE13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:20.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB9CB55-9E0F-468F-9CDE-1997D11D02C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanpt2-FqLuefsS", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-260xx/CVE-2020-26082.json b/CVE-2020/CVE-2020-260xx/CVE-2020-26082.json index 463043ee653..bf8b408c599 100644 --- a/CVE-2020/CVE-2020-260xx/CVE-2020-26082.json +++ b/CVE-2020/CVE-2020-260xx/CVE-2020-26082.json @@ -2,8 +2,8 @@ "id": "CVE-2020-26082", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-08-04T21:15:10.787", - "lastModified": "2023-08-06T12:01:01.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T20:38:15.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -34,10 +54,85 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.5.2", + "matchCriteriaId": "F31D03FB-191E-4D15-8AD0-EAD1CBC52225" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:email_security_appliance_c170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E5FD72D-E9E6-451C-9483-EBFDD41C9336" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:email_security_appliance_c190:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2C890DD-36BE-416F-B0D3-FB8AAD5F03BD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:email_security_appliance_c380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBA19FA3-6CFE-4D6A-A987-CE49A650BE3E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:email_security_appliance_c390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "675068B9-167C-42F9-87DD-FF0146B8ADDC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:email_security_appliance_c680:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A2334C4-812A-4C28-B708-EA969C05D4C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BA67042-D6DD-436D-9E41-475CBD670940" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:email_security_appliance_c690x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57AFD49E-F367-4776-85B8-6BD7F57D78C9" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-zip-bypass-gbU4gtTg", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48591.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48591.json index 352d1fefb76..aa23aa59a87 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48591.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48591.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48591", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:12.913", - "lastModified": "2023-08-09T19:15:12.913", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:16.287", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48592.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48592.json index 9e79eb5db84..6010e52deac 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48592.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48592.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48592", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:13.137", - "lastModified": "2023-08-09T19:15:13.137", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:16.287", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48593.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48593.json index c15a5f396a8..1e17ebff769 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48593.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48593.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48593", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:13.253", - "lastModified": "2023-08-09T19:15:13.253", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:16.287", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48594.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48594.json index 307208177ef..c4371c46ac2 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48594.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48594.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48594", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:13.367", - "lastModified": "2023-08-09T19:15:13.367", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:16.287", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48595.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48595.json index 18b5412d9d5..800aefbf5e3 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48595.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48595.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48595", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:13.467", - "lastModified": "2023-08-09T19:15:13.467", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:16.287", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48596.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48596.json index 56276ac8df6..50ea989fd57 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48596.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48596.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48596", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:13.567", - "lastModified": "2023-08-09T19:15:13.567", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:16.287", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48597.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48597.json index e7884e51f8b..f71da536684 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48597.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48597.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48597", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:13.667", - "lastModified": "2023-08-09T19:15:13.667", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:16.287", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48598.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48598.json index cf80479128f..d21defcaa5c 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48598.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48598.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48598", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:13.770", - "lastModified": "2023-08-09T19:15:13.770", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48599.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48599.json index 3f8109a03f8..4df37132566 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48599.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48599.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48599", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:13.877", - "lastModified": "2023-08-09T19:15:13.877", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48600.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48600.json index 309f2cdb961..84942d6207f 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48600.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48600.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48600", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:13.973", - "lastModified": "2023-08-09T19:15:13.973", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48601.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48601.json index c6d324f0fac..bd7255202d0 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48601.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48601.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48601", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:14.080", - "lastModified": "2023-08-09T19:15:14.080", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48602.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48602.json index 6e6faab9973..3b0a87c1138 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48602.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48602.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48602", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:14.190", - "lastModified": "2023-08-09T19:15:14.190", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48603.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48603.json index 2a9b6fcaa95..6b0bc1307b9 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48603.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48603.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48603", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:14.297", - "lastModified": "2023-08-09T19:15:14.297", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48604.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48604.json index a8debc9f7d3..cacaaedb08a 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48604.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48604.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48604", "sourceIdentifier": "contact@securifera.com", "published": "2023-08-09T19:15:14.393", - "lastModified": "2023-08-09T19:15:14.393", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23346.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23346.json index 3c55709d86e..f73f05195d3 100644 --- a/CVE-2023/CVE-2023-233xx/CVE-2023-23346.json +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23346.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23346", "sourceIdentifier": "psirt@hcl.com", "published": "2023-08-09T19:15:14.500", - "lastModified": "2023-08-09T19:15:14.500", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-233xx/CVE-2023-23347.json b/CVE-2023/CVE-2023-233xx/CVE-2023-23347.json new file mode 100644 index 00000000000..d9a9b1b25f9 --- /dev/null +++ b/CVE-2023/CVE-2023-233xx/CVE-2023-23347.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-23347", + "sourceIdentifier": "psirt@hcl.com", + "published": "2023-08-09T20:15:09.903", + "lastModified": "2023-08-09T20:15:09.903", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "HCL DRYiCE iAutomate is affected by the use of a broken cryptographic algorithm. An attacker can potentially compromise the confidentiality and integrity of sensitive information.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.1, + "impactScore": 4.7 + } + ] + }, + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106674", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2754.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2754.json index 2986e930edf..9c4cb00378e 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2754.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2754.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2754", "sourceIdentifier": "cna@cloudflare.com", "published": "2023-08-03T15:15:23.347", - "lastModified": "2023-08-03T15:37:04.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T21:04:48.440", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + }, { "source": "cna@cloudflare.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + }, { "source": "cna@cloudflare.com", "type": "Secondary", @@ -46,18 +76,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cloudflare:warp:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "2023.7.160.0", + "matchCriteriaId": "E9F7B4DA-D94F-44E9-9A5E-53174E118463" + } + ] + } + ] + } + ], "references": [ { "url": "https://developers.cloudflare.com/warp-client/", - "source": "cna@cloudflare.com" + "source": "cna@cloudflare.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/cloudflare/advisories/security/advisories/GHSA-mv6g-7577-vq4w", - "source": "cna@cloudflare.com" + "source": "cna@cloudflare.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release", - "source": "cna@cloudflare.com" + "source": "cna@cloudflare.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28468.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28468.json index 7826d5e5cc4..904c4fa7b16 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28468.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28468.json @@ -2,23 +2,83 @@ "id": "CVE-2023-28468", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-03T15:15:20.167", - "lastModified": "2023-08-03T15:37:04.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T20:48:19.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in FvbServicesRuntimeDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. The FvbServicesRuntimeDxe SMM module exposes an SMI handler that allows an attacker to interact with the SPI flash at run-time from the OS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndIncluding": "5.5", + "matchCriteriaId": "DC5100FC-51F0-48D6-A4F0-782F1281DBF3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.insyde.com/security-pledge", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.insyde.com/security-pledge/SA-2023039", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33466.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33466.json index 504f3475ff1..85607111582 100644 --- a/CVE-2023/CVE-2023-334xx/CVE-2023-33466.json +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33466.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33466", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-29T15:15:09.483", - "lastModified": "2023-07-06T18:24:34.987", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-09T20:15:10.200", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5473", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33468.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33468.json new file mode 100644 index 00000000000..009d990d6f2 --- /dev/null +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33468.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-33468", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-09T20:15:10.357", + "lastModified": "2023-08-09T20:15:10.357", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 exhibit a vulnerability that enables remote manipulation of the device. This vulnerability involves extracting the connection confirmation code remotely, bypassing the need to obtain it directly from the physical screen." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://kramerav.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2023-33468", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33469.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33469.json new file mode 100644 index 00000000000..366262c79f3 --- /dev/null +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33469.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-33469", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-09T20:15:10.427", + "lastModified": "2023-08-09T20:15:10.427", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In instances where the screen is visible and remote mouse connection is enabled, KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 can be exploited to achieve local code execution at the root level." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://kramerav.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2023-33469", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33906.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33906.json index 630a47eddc9..b49ad84c2be 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33906.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33906.json @@ -2,19 +2,156 @@ "id": "CVE-2023-33906", "sourceIdentifier": "security@unisoc.com", "published": "2023-08-07T02:15:10.317", - "lastModified": "2023-08-07T12:57:26.370", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T20:54:32.290", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Contacts Service, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1687281677639942145", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-361xx/CVE-2023-36159.json b/CVE-2023/CVE-2023-361xx/CVE-2023-36159.json index af25f52cc22..01e01085277 100644 --- a/CVE-2023/CVE-2023-361xx/CVE-2023-36159.json +++ b/CVE-2023/CVE-2023-361xx/CVE-2023-36159.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36159", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-04T00:15:13.587", - "lastModified": "2023-08-08T19:00:17.807", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-09T21:15:10.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -71,6 +71,10 @@ "Not Applicable" ] }, + { + "url": "https://cyberredteam.tech/posts/cve-2023-36159/", + "source": "cve@mitre.org" + }, { "url": "https://www.sourcecodester.com/php/16525/lost-and-found-information-system-using-php-and-mysql-db-source-code-free-download.html", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37068.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37068.json new file mode 100644 index 00000000000..2cd6b956e68 --- /dev/null +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37068.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-37068", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-09T20:15:10.497", + "lastModified": "2023-08-09T20:15:10.497", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Code-Projects Gym Management System V1.0 allows remote attackers to execute arbitrary SQL commands via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username and password fields, enabling SQL Injection attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Mr-Secure-Code/My-CVE/blob/main/CVE-2023-37068-Exploit.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37464.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37464.json index b7098d1696f..db29e374f96 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37464.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37464.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37464", "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-14T21:15:08.903", - "lastModified": "2023-08-04T13:15:11.000", + "lastModified": "2023-08-09T20:15:10.570", "vulnStatus": "Modified", "descriptions": [ { @@ -118,6 +118,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00002.html", "source": "security-advisories@github.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5472", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37470.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37470.json index cfe8989c66a..0991d0d1f1e 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37470.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37470.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37470", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-04T16:15:09.610", - "lastModified": "2023-08-04T17:10:50.263", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T20:57:29.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,7 +56,7 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,12 +64,93 @@ "value": "CWE-94" } ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*", + "versionEndExcluding": "0.43.7.3", + "matchCriteriaId": "AFE116C8-B5B5-48CE-873D-1E508D1A656A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "1.43.7.3", + "matchCriteriaId": "97C698D2-6F8A-4BD4-BC29-80086F1F87C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*", + "versionStartIncluding": "0.44.0", + "versionEndExcluding": "0.44.7.3", + "matchCriteriaId": "36C340AD-358E-478B-B75C-4A0A8F52F6C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*", + "versionStartIncluding": "0.45.0", + "versionEndExcluding": "0.45.4.3", + "matchCriteriaId": "A23C9D19-21F7-4529-8CF7-C20DACA524F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:-:*:*:*", + "versionStartIncluding": "0.46.0", + "versionEndExcluding": "0.46.6.4", + "matchCriteriaId": "87EA14BE-A683-44D4-904D-3DEB8A672958" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "1.44.0", + "versionEndExcluding": "1.44.7.3", + "matchCriteriaId": "A4F52A25-3933-4D5D-A69F-073D31C079D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "1.45.0", + "versionEndExcluding": "1.45.4.3", + "matchCriteriaId": "0ECC070D-27E2-40A2-A0D4-E818CBAB857D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "1.46.0", + "versionEndExcluding": "1.46.6.4", + "matchCriteriaId": "E025C478-8650-4B5E-B92F-9ACD2AA4C8C2" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/metabase/metabase/security/advisories/GHSA-p7w3-9m58-rq83", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38347.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38347.json new file mode 100644 index 00000000000..c9077a40f6a --- /dev/null +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38347.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-38347", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-09T20:15:10.690", + "lastModified": "2023-08-09T20:15:10.690", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in LWsystems Benno MailArchiv 2.10.1. Attackers can cause XSS via JavaScript content to a mailbox." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.sebastianschmitt.eu/security/xss-in-benno-mailarchiv-web-app-benno-rest-lib-cve-2023-38347/", + "source": "cve@mitre.org" + }, + { + "url": "https://wiki.benno-mailarchiv.de/doku.php", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38348.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38348.json new file mode 100644 index 00000000000..97ab0abddf0 --- /dev/null +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38348.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-38348", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-09T20:15:10.753", + "lastModified": "2023-08-09T20:15:10.753", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A CSRF issue was discovered in LWsystems Benno MailArchiv 2.10.1." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://blog.sebastianschmitt.eu/security/xsrf-in-benno-mailarchiv-web-app-benno-web-2-10-2-cve-2023-38348/", + "source": "cve@mitre.org" + }, + { + "url": "https://wiki.benno-mailarchiv.de/doku.php", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38688.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38688.json index 0bed5745d38..587315d659e 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38688.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38688.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38688", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-04T17:15:10.097", - "lastModified": "2023-08-04T18:53:28.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T21:05:36.740", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,18 +66,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xithrius:twitch-tui:*:*:*:*:*:rust:*:*", + "versionEndIncluding": "2.4.0", + "matchCriteriaId": "51E1B391-7145-4B2F-8183-B007928C21E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Xithrius/twitch-tui/blob/340afc3c8c07a83289fe6ef614aa7563c8b70756/src/twitch/connection.rs#L23", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Xithrius/twitch-tui/commit/74d13ddca35f8f0816f4933c229da1fd95c0350a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Xithrius/twitch-tui/security/advisories/GHSA-779w-xvpm-78jx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38997.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38997.json index 0c9efeede06..8b1ffa87d70 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38997.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38997.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38997", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:14.593", - "lastModified": "2023-08-09T19:15:14.593", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38998.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38998.json index ec17cb0c8f6..142594415ea 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38998.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38998.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38998", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:14.660", - "lastModified": "2023-08-09T19:15:14.660", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38999.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38999.json index 608227e774b..eae3c36f5c6 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38999.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38999.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38999", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:14.723", - "lastModified": "2023-08-09T19:15:14.723", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39000.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39000.json index 380de56c5f4..4659dd1b119 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39000.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39000.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39000", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:14.787", - "lastModified": "2023-08-09T19:15:14.787", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39001.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39001.json index 7724db28644..cc31566fbbc 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39001.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39001.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39001", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:14.850", - "lastModified": "2023-08-09T19:15:14.850", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39002.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39002.json index a1334320212..2158a959875 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39002.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39002.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39002", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:14.900", - "lastModified": "2023-08-09T19:15:14.900", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39003.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39003.json index ee76d90f3c7..44708d9f54a 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39003.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39003.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39003", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:14.953", - "lastModified": "2023-08-09T19:15:14.953", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39004.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39004.json index 89e48aec607..97315a74337 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39004.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39004.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39004", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:15.013", - "lastModified": "2023-08-09T19:15:15.013", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39005.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39005.json index 9946b5e79b1..56617253225 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39005.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39005.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39005", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:15.077", - "lastModified": "2023-08-09T19:15:15.077", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39006.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39006.json index 78631fdb862..b6e714af554 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39006.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39006.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39006", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:15.140", - "lastModified": "2023-08-09T19:15:15.140", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39007.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39007.json index 93de1a53d59..ec2513f881e 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39007.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39007.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39007", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:15.207", - "lastModified": "2023-08-09T19:15:15.207", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39008.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39008.json index 891b2e20dec..35ad2e604a0 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39008.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39008.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39008", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-09T19:15:15.270", - "lastModified": "2023-08-09T19:15:15.270", - "vulnStatus": "Received", + "lastModified": "2023-08-09T20:12:10.860", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39526.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39526.json index 505e0496cf3..35027dcf1ec 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39526.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39526.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39526", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-07T21:15:10.347", - "lastModified": "2023-08-08T12:51:11.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T20:18:36.627", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +66,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.8.10", + "matchCriteriaId": "67B46788-7E3F-49C3-A69A-2F1922BCA5A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.0.5", + "matchCriteriaId": "1E3B54B4-4484-44F8-A0F1-714EA40399CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prestashop:prestashop:8.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D34AD75A-BC2E-46F5-BFCD-671C06A23898" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PrestaShop/PrestaShop/commit/817847e2347844a9b6add017581f1932bcd28c09", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gf46-prm4-56pc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39527.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39527.json index b499c9a969d..8cd870f9cf4 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39527.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39527.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39527", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-07T21:15:10.480", - "lastModified": "2023-08-08T12:51:11.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T20:19:10.417", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -54,14 +74,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.8.10", + "matchCriteriaId": "67B46788-7E3F-49C3-A69A-2F1922BCA5A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.0.5", + "matchCriteriaId": "1E3B54B4-4484-44F8-A0F1-714EA40399CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prestashop:prestashop:8.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D34AD75A-BC2E-46F5-BFCD-671C06A23898" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PrestaShop/PrestaShop/commit/afc14f8eaa058b3e6a20ac43e033ee2656fb88b4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-xw2r-f8xv-c8xp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39550.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39550.json index 9e40fe41e78..c3e09fa92f1 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39550.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39550.json @@ -2,23 +2,148 @@ "id": "CVE-2023-39550", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-07T19:15:11.987", - "lastModified": "2023-08-07T19:30:20.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-08-09T20:32:27.357", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Netgear JWNR2000v2 v1.0.0.11, XWN5001 v0.4.1.1, and XAVN2001v2 v0.4.0.7 were discovered to contain multiple buffer overflows via the http_passwd and http_username parameters in the check_auth function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:jwnr2000v2_firmware:1.0.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "21E91328-4F46-42D4-A99F-A83AE71C8F2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:jwnr2000v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32886871-051A-40D8-97FA-6DCD20714D79" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:xwn5001_firmware:0.4.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9C025A46-FB26-409A-888F-7336F871AC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:xwn5001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EEF5DCA-0EDB-4966-95AC-52B2661B8D1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:xavn2001v2_firmware:0.4.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "6A2B5F63-7A1F-41F9-8184-112AB2D0979C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:xavn2001v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DA4AFAA-8FBF-43FB-B2FB-8FF806FF2BBB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FirmRec/IoT-Vulns/blob/main/netgear/http_passwd_auth/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json index 113ad684228..f93770ee119 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4045", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.783", - "lastModified": "2023-08-08T12:15:12.560", + "lastModified": "2023-08-09T21:15:11.137", "vulnStatus": "Modified", "descriptions": [ { @@ -111,6 +111,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json index 48a7c7036c9..c884a9ef4d9 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4046", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.847", - "lastModified": "2023-08-08T12:15:12.687", + "lastModified": "2023-08-09T21:15:11.253", "vulnStatus": "Modified", "descriptions": [ { @@ -111,6 +111,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json index 7ef9d9ac716..1a41d5aa01d 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4047", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.903", - "lastModified": "2023-08-08T12:15:12.817", + "lastModified": "2023-08-09T21:15:11.370", "vulnStatus": "Modified", "descriptions": [ { @@ -111,6 +111,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json index a7ad0644a75..936e3a34214 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4048", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.967", - "lastModified": "2023-08-08T12:15:12.967", + "lastModified": "2023-08-09T21:15:11.467", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -103,6 +103,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json index fa94b5c5cc1..943e57605da 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4049", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:10.030", - "lastModified": "2023-08-08T12:15:13.090", + "lastModified": "2023-08-09T21:15:11.627", "vulnStatus": "Modified", "descriptions": [ { @@ -111,6 +111,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json index 0b7c7b143aa..cb2b1754d0a 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4050", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:10.090", - "lastModified": "2023-08-08T12:15:13.250", + "lastModified": "2023-08-09T21:15:11.723", "vulnStatus": "Modified", "descriptions": [ { @@ -111,6 +111,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json index e162fd5522b..9d47965574e 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4055", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T16:15:09.967", - "lastModified": "2023-08-08T12:15:13.390", + "lastModified": "2023-08-09T21:15:11.820", "vulnStatus": "Modified", "descriptions": [ { @@ -111,6 +111,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json index efa968af46b..ee7b5fa006c 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4056", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T16:15:10.020", - "lastModified": "2023-08-08T12:15:13.503", + "lastModified": "2023-08-09T21:15:11.917", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -102,6 +102,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", + "source": "security@mozilla.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org", diff --git a/README.md b/README.md index 77d3f3740d0..286b33f1238 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-09T20:00:27.134268+00:00 +2023-08-09T22:00:28.750231+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-09T19:58:40.947000+00:00 +2023-08-09T21:15:11.917000+00:00 ``` ### Last Data Feed Release @@ -29,69 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -222201 +222207 ``` ### CVEs added in the last Commit -Recently added CVEs: `38` +Recently added CVEs: `6` -* [CVE-2022-48593](CVE-2022/CVE-2022-485xx/CVE-2022-48593.json) (`2023-08-09T19:15:13.253`) -* [CVE-2022-48594](CVE-2022/CVE-2022-485xx/CVE-2022-48594.json) (`2023-08-09T19:15:13.367`) -* [CVE-2022-48595](CVE-2022/CVE-2022-485xx/CVE-2022-48595.json) (`2023-08-09T19:15:13.467`) -* [CVE-2022-48596](CVE-2022/CVE-2022-485xx/CVE-2022-48596.json) (`2023-08-09T19:15:13.567`) -* [CVE-2022-48597](CVE-2022/CVE-2022-485xx/CVE-2022-48597.json) (`2023-08-09T19:15:13.667`) -* [CVE-2022-48598](CVE-2022/CVE-2022-485xx/CVE-2022-48598.json) (`2023-08-09T19:15:13.770`) -* [CVE-2022-48599](CVE-2022/CVE-2022-485xx/CVE-2022-48599.json) (`2023-08-09T19:15:13.877`) -* [CVE-2022-48600](CVE-2022/CVE-2022-486xx/CVE-2022-48600.json) (`2023-08-09T19:15:13.973`) -* [CVE-2022-48601](CVE-2022/CVE-2022-486xx/CVE-2022-48601.json) (`2023-08-09T19:15:14.080`) -* [CVE-2022-48602](CVE-2022/CVE-2022-486xx/CVE-2022-48602.json) (`2023-08-09T19:15:14.190`) -* [CVE-2022-48603](CVE-2022/CVE-2022-486xx/CVE-2022-48603.json) (`2023-08-09T19:15:14.297`) -* [CVE-2022-48604](CVE-2022/CVE-2022-486xx/CVE-2022-48604.json) (`2023-08-09T19:15:14.393`) -* [CVE-2023-23346](CVE-2023/CVE-2023-233xx/CVE-2023-23346.json) (`2023-08-09T19:15:14.500`) -* [CVE-2023-38997](CVE-2023/CVE-2023-389xx/CVE-2023-38997.json) (`2023-08-09T19:15:14.593`) -* [CVE-2023-38998](CVE-2023/CVE-2023-389xx/CVE-2023-38998.json) (`2023-08-09T19:15:14.660`) -* [CVE-2023-38999](CVE-2023/CVE-2023-389xx/CVE-2023-38999.json) (`2023-08-09T19:15:14.723`) -* [CVE-2023-39000](CVE-2023/CVE-2023-390xx/CVE-2023-39000.json) (`2023-08-09T19:15:14.787`) -* [CVE-2023-39001](CVE-2023/CVE-2023-390xx/CVE-2023-39001.json) (`2023-08-09T19:15:14.850`) -* [CVE-2023-39002](CVE-2023/CVE-2023-390xx/CVE-2023-39002.json) (`2023-08-09T19:15:14.900`) -* [CVE-2023-39003](CVE-2023/CVE-2023-390xx/CVE-2023-39003.json) (`2023-08-09T19:15:14.953`) -* [CVE-2023-39004](CVE-2023/CVE-2023-390xx/CVE-2023-39004.json) (`2023-08-09T19:15:15.013`) -* [CVE-2023-39005](CVE-2023/CVE-2023-390xx/CVE-2023-39005.json) (`2023-08-09T19:15:15.077`) -* [CVE-2023-39006](CVE-2023/CVE-2023-390xx/CVE-2023-39006.json) (`2023-08-09T19:15:15.140`) -* [CVE-2023-39007](CVE-2023/CVE-2023-390xx/CVE-2023-39007.json) (`2023-08-09T19:15:15.207`) -* [CVE-2023-39008](CVE-2023/CVE-2023-390xx/CVE-2023-39008.json) (`2023-08-09T19:15:15.270`) +* [CVE-2023-23347](CVE-2023/CVE-2023-233xx/CVE-2023-23347.json) (`2023-08-09T20:15:09.903`) +* [CVE-2023-33468](CVE-2023/CVE-2023-334xx/CVE-2023-33468.json) (`2023-08-09T20:15:10.357`) +* [CVE-2023-33469](CVE-2023/CVE-2023-334xx/CVE-2023-33469.json) (`2023-08-09T20:15:10.427`) +* [CVE-2023-37068](CVE-2023/CVE-2023-370xx/CVE-2023-37068.json) (`2023-08-09T20:15:10.497`) +* [CVE-2023-38347](CVE-2023/CVE-2023-383xx/CVE-2023-38347.json) (`2023-08-09T20:15:10.690`) +* [CVE-2023-38348](CVE-2023/CVE-2023-383xx/CVE-2023-38348.json) (`2023-08-09T20:15:10.753`) ### CVEs modified in the last Commit -Recently modified CVEs: `52` +Recently modified CVEs: `49` -* [CVE-2023-20802](CVE-2023/CVE-2023-208xx/CVE-2023-20802.json) (`2023-08-09T18:07:36.453`) -* [CVE-2023-29689](CVE-2023/CVE-2023-296xx/CVE-2023-29689.json) (`2023-08-09T18:15:12.643`) -* [CVE-2023-37569](CVE-2023/CVE-2023-375xx/CVE-2023-37569.json) (`2023-08-09T18:15:12.777`) -* [CVE-2023-38646](CVE-2023/CVE-2023-386xx/CVE-2023-38646.json) (`2023-08-09T18:15:13.213`) -* [CVE-2023-4192](CVE-2023/CVE-2023-41xx/CVE-2023-4192.json) (`2023-08-09T18:15:25.423`) -* [CVE-2023-39437](CVE-2023/CVE-2023-394xx/CVE-2023-39437.json) (`2023-08-09T18:19:10.230`) -* [CVE-2023-39436](CVE-2023/CVE-2023-394xx/CVE-2023-39436.json) (`2023-08-09T18:19:29.723`) -* [CVE-2023-37492](CVE-2023/CVE-2023-374xx/CVE-2023-37492.json) (`2023-08-09T18:20:16.060`) -* [CVE-2023-37491](CVE-2023/CVE-2023-374xx/CVE-2023-37491.json) (`2023-08-09T18:20:38.800`) -* [CVE-2023-37490](CVE-2023/CVE-2023-374xx/CVE-2023-37490.json) (`2023-08-09T18:21:14.410`) -* [CVE-2023-37487](CVE-2023/CVE-2023-374xx/CVE-2023-37487.json) (`2023-08-09T18:21:30.300`) -* [CVE-2023-37484](CVE-2023/CVE-2023-374xx/CVE-2023-37484.json) (`2023-08-09T18:21:40.633`) -* [CVE-2023-37483](CVE-2023/CVE-2023-374xx/CVE-2023-37483.json) (`2023-08-09T18:21:52.827`) -* [CVE-2023-39440](CVE-2023/CVE-2023-394xx/CVE-2023-39440.json) (`2023-08-09T18:22:07.123`) -* [CVE-2023-4166](CVE-2023/CVE-2023-41xx/CVE-2023-4166.json) (`2023-08-09T18:30:04.680`) -* [CVE-2023-4167](CVE-2023/CVE-2023-41xx/CVE-2023-4167.json) (`2023-08-09T18:37:23.557`) -* [CVE-2023-4185](CVE-2023/CVE-2023-41xx/CVE-2023-4185.json) (`2023-08-09T18:52:43.840`) -* [CVE-2023-4165](CVE-2023/CVE-2023-41xx/CVE-2023-4165.json) (`2023-08-09T18:54:06.607`) -* [CVE-2023-4169](CVE-2023/CVE-2023-41xx/CVE-2023-4169.json) (`2023-08-09T19:24:47.690`) -* [CVE-2023-4170](CVE-2023/CVE-2023-41xx/CVE-2023-4170.json) (`2023-08-09T19:35:58.457`) -* [CVE-2023-39530](CVE-2023/CVE-2023-395xx/CVE-2023-39530.json) (`2023-08-09T19:36:10.557`) -* [CVE-2023-39528](CVE-2023/CVE-2023-395xx/CVE-2023-39528.json) (`2023-08-09T19:45:03.020`) -* [CVE-2023-39529](CVE-2023/CVE-2023-395xx/CVE-2023-39529.json) (`2023-08-09T19:46:13.237`) -* [CVE-2023-4199](CVE-2023/CVE-2023-41xx/CVE-2023-4199.json) (`2023-08-09T19:52:53.200`) -* [CVE-2023-4168](CVE-2023/CVE-2023-41xx/CVE-2023-4168.json) (`2023-08-09T19:58:40.947`) +* [CVE-2023-39003](CVE-2023/CVE-2023-390xx/CVE-2023-39003.json) (`2023-08-09T20:12:10.860`) +* [CVE-2023-39004](CVE-2023/CVE-2023-390xx/CVE-2023-39004.json) (`2023-08-09T20:12:10.860`) +* [CVE-2023-39005](CVE-2023/CVE-2023-390xx/CVE-2023-39005.json) (`2023-08-09T20:12:10.860`) +* [CVE-2023-39006](CVE-2023/CVE-2023-390xx/CVE-2023-39006.json) (`2023-08-09T20:12:10.860`) +* [CVE-2023-39007](CVE-2023/CVE-2023-390xx/CVE-2023-39007.json) (`2023-08-09T20:12:10.860`) +* [CVE-2023-39008](CVE-2023/CVE-2023-390xx/CVE-2023-39008.json) (`2023-08-09T20:12:10.860`) +* [CVE-2023-33466](CVE-2023/CVE-2023-334xx/CVE-2023-33466.json) (`2023-08-09T20:15:10.200`) +* [CVE-2023-37464](CVE-2023/CVE-2023-374xx/CVE-2023-37464.json) (`2023-08-09T20:15:10.570`) +* [CVE-2023-39526](CVE-2023/CVE-2023-395xx/CVE-2023-39526.json) (`2023-08-09T20:18:36.627`) +* [CVE-2023-39527](CVE-2023/CVE-2023-395xx/CVE-2023-39527.json) (`2023-08-09T20:19:10.417`) +* [CVE-2023-39550](CVE-2023/CVE-2023-395xx/CVE-2023-39550.json) (`2023-08-09T20:32:27.357`) +* [CVE-2023-28468](CVE-2023/CVE-2023-284xx/CVE-2023-28468.json) (`2023-08-09T20:48:19.957`) +* [CVE-2023-33906](CVE-2023/CVE-2023-339xx/CVE-2023-33906.json) (`2023-08-09T20:54:32.290`) +* [CVE-2023-37470](CVE-2023/CVE-2023-374xx/CVE-2023-37470.json) (`2023-08-09T20:57:29.157`) +* [CVE-2023-2754](CVE-2023/CVE-2023-27xx/CVE-2023-2754.json) (`2023-08-09T21:04:48.440`) +* [CVE-2023-38688](CVE-2023/CVE-2023-386xx/CVE-2023-38688.json) (`2023-08-09T21:05:36.740`) +* [CVE-2023-36159](CVE-2023/CVE-2023-361xx/CVE-2023-36159.json) (`2023-08-09T21:15:10.677`) +* [CVE-2023-4045](CVE-2023/CVE-2023-40xx/CVE-2023-4045.json) (`2023-08-09T21:15:11.137`) +* [CVE-2023-4046](CVE-2023/CVE-2023-40xx/CVE-2023-4046.json) (`2023-08-09T21:15:11.253`) +* [CVE-2023-4047](CVE-2023/CVE-2023-40xx/CVE-2023-4047.json) (`2023-08-09T21:15:11.370`) +* [CVE-2023-4048](CVE-2023/CVE-2023-40xx/CVE-2023-4048.json) (`2023-08-09T21:15:11.467`) +* [CVE-2023-4049](CVE-2023/CVE-2023-40xx/CVE-2023-4049.json) (`2023-08-09T21:15:11.627`) +* [CVE-2023-4050](CVE-2023/CVE-2023-40xx/CVE-2023-4050.json) (`2023-08-09T21:15:11.723`) +* [CVE-2023-4055](CVE-2023/CVE-2023-40xx/CVE-2023-4055.json) (`2023-08-09T21:15:11.820`) +* [CVE-2023-4056](CVE-2023/CVE-2023-40xx/CVE-2023-4056.json) (`2023-08-09T21:15:11.917`) ## Download and Usage