From ba2cabed7de4854b8f2038f80baa8ba73e99bdc4 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 15 Feb 2024 11:01:13 +0000 Subject: [PATCH] Auto-Update: 2024-02-15T11:01:10.322305+00:00 --- CVE-2023/CVE-2023-45xx/CVE-2023-4537.json | 59 +++++++++++++++++++++ CVE-2023/CVE-2023-45xx/CVE-2023-4538.json | 59 +++++++++++++++++++++ CVE-2023/CVE-2023-45xx/CVE-2023-4539.json | 59 +++++++++++++++++++++ CVE-2023/CVE-2023-465xx/CVE-2023-46596.json | 6 +-- CVE-2024/CVE-2024-03xx/CVE-2024-0390.json | 36 +++++++++++++ CVE-2024/CVE-2024-238xx/CVE-2024-23855.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23856.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23857.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23858.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23859.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23860.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23861.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23862.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23863.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23864.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23865.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23866.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23867.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23868.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23869.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23870.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23871.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23872.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23873.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23874.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23875.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23876.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23877.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23878.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23879.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23880.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23881.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23882.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23883.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23884.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23885.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23886.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23887.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23888.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23889.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23890.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23891.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23892.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23893.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23894.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23895.json | 12 ++--- CVE-2024/CVE-2024-238xx/CVE-2024-23896.json | 12 ++--- README.md | 54 ++++++++++++------- 48 files changed, 502 insertions(+), 275 deletions(-) create mode 100644 CVE-2023/CVE-2023-45xx/CVE-2023-4537.json create mode 100644 CVE-2023/CVE-2023-45xx/CVE-2023-4538.json create mode 100644 CVE-2023/CVE-2023-45xx/CVE-2023-4539.json create mode 100644 CVE-2024/CVE-2024-03xx/CVE-2024-0390.json diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4537.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4537.json new file mode 100644 index 00000000000..756eb327c35 --- /dev/null +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4537.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4537", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-02-15T09:15:33.273", + "lastModified": "2024-02-15T09:15:33.273", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Comarch ERP XL client is vulnerable to MS SQL protocol downgrade request from a server side, what could lead to an unencrypted communication vulnerable to data interception and modification.\n\nThis issue affects ERP XL: from 2020.2.2 through 2023.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/02/CVE-2023-4537/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2023/02/CVE-2023-4537/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4538.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4538.json new file mode 100644 index 00000000000..b8f0c21dffe --- /dev/null +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4538.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4538", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-02-15T09:15:33.557", + "lastModified": "2024-02-15T09:15:33.557", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The database access credentials configured during installation are stored in a special table, and are encrypted with a shared key, same among all Comarch ERP XL client installations. This could allow an attacker with access to that table to retrieve plain text passwords.\n\nThis issue affects ERP XL: from 2020.2.2 through 2023.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/02/CVE-2023-4537/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/02/CVE-2023-4537/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4539.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4539.json new file mode 100644 index 00000000000..00f744403ae --- /dev/null +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4539.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-4539", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-02-15T09:15:33.740", + "lastModified": "2024-02-15T09:15:33.740", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use of a hard-coded password for a special database account created during Comarch ERP XL installation allows an attacker to retrieve embedded sensitive data stored in the database. The password is same among all Comarch ERP XL installations. \n\nThis issue affects ERP XL: from 2020.2.2 through 2023.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/02/CVE-2023-4537/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/02/CVE-2023-4537/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46596.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46596.json index ee778db05cc..dbcc1c6e0da 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46596.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46596.json @@ -2,12 +2,12 @@ "id": "CVE-2023-46596", "sourceIdentifier": "security.vulnerabilities@algosec.com", "published": "2024-02-15T06:15:45.453", - "lastModified": "2024-02-15T07:15:07.370", + "lastModified": "2024-02-15T10:15:08.777", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Improper input validation in Algosec FireFlow VisualFlow workflow editor via Name, Description and Configuration File field in\u00a0version A32.20, A32.50, A32.60 permits an attacker to initiate an XSS attack by injecting malicious executable scripts into the application's code. Fixed in version\u00a0A32.20 (b600 and\nabove),\u00a0A32.50 (b430 and\nabove),\u00a0A32.60 (b250 and\nabove)" + "value": "\nImproper input validation in Algosec FireFlow VisualFlow workflow editor via Name, Description and Configuration File field in version A32.20, A32.50, A32.60 permits an attacker to initiate an XSS attack by injecting malicious executable scripts into the application's code. Fixed in version A32.20 (b600 and above), A32.50 (b430 and above), A32.60 (b250 and above)\n\n" } ], "metrics": { @@ -48,7 +48,7 @@ ], "references": [ { - "url": "https://cwe.mitre.org/data/definitions/79.html", + "url": "https://www.algosec.com/docs/en/cves/Content/tech-notes/cves/cve-2023-46596.htm", "source": "security.vulnerabilities@algosec.com" } ] diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0390.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0390.json new file mode 100644 index 00000000000..67dcf915849 --- /dev/null +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0390.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-0390", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-02-15T10:15:09.043", + "lastModified": "2024-02-15T10:15:09.043", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "INPRAX \"iZZi connect\" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit \"reQnet iZZi\".This issue affects \"iZZi connect\" application versions before 2024010401.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://cert.pl/en/posts/2024/02/CVE-2024-0390/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/02/CVE-2024-0390/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23855.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23855.json index 0b5f45a59a9..5fba4e20abd 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23855.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23855.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23855", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-25T14:15:27.183", - "lastModified": "2024-01-27T00:39:46.050", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:09.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23856.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23856.json index e2475700b9b..db08883bb21 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23856.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23856.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23856", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T09:15:08.620", - "lastModified": "2024-01-27T00:37:35.997", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:09.493", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23857.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23857.json index ab076119c2f..1e3224be0a8 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23857.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23857.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23857", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T09:15:08.820", - "lastModified": "2024-01-27T00:37:34.170", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:09.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23858.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23858.json index 1699a818c0d..e74e05fd33c 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23858.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23858.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23858", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T09:15:09.023", - "lastModified": "2024-01-27T00:37:32.293", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:09.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23859.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23859.json index 3ea07f2fd37..8caa598c1a2 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23859.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23859.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23859", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T09:15:09.230", - "lastModified": "2024-01-27T00:37:30.137", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:10.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23860.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23860.json index 6cfbebfd5b3..069b5348bd1 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23860.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23860.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23860", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T09:15:09.427", - "lastModified": "2024-01-27T00:37:23.043", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:10.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23861.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23861.json index 6a38844888c..27893b2b75c 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23861.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23861.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23861", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T09:15:09.620", - "lastModified": "2024-01-27T00:37:21.280", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:10.917", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23862.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23862.json index e542b4b971b..cf1a126d778 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23862.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23862.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23862", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T09:15:09.840", - "lastModified": "2024-01-27T00:37:18.643", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:11.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23863.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23863.json index 3361c61d64c..00871b6abcb 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23863.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23863.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23863", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:07.693", - "lastModified": "2024-01-27T00:37:13.743", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:11.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23864.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23864.json index dcb920b56e0..39f4fb0a97a 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23864.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23864.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23864", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:07.953", - "lastModified": "2024-01-27T00:37:11.693", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:11.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23865.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23865.json index d3bbf01a7ea..166045cc9e1 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23865.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23865.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23865", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:08.223", - "lastModified": "2024-01-27T00:37:09.910", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:12.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23866.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23866.json index 2f0bec615a3..d5a784d47df 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23866.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23866.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23866", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:08.420", - "lastModified": "2024-01-27T00:37:08.137", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:12.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23867.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23867.json index 31126459714..ac8790f0fe3 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23867.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23867", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:08.640", - "lastModified": "2024-01-27T00:37:06.177", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:12.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23868.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23868.json index f2e076d761b..1944a74bf58 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23868.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23868.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23868", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:08.840", - "lastModified": "2024-01-27T00:37:01.887", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:12.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23869.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23869.json index 924f305eac0..1ecf3af1a21 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23869.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23869.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23869", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:09.047", - "lastModified": "2024-01-27T00:36:57.017", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:13.187", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23870.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23870.json index d7c890aac44..0c572c97495 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23870.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23870.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23870", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:09.243", - "lastModified": "2024-01-27T00:36:52.997", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:13.437", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23871.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23871.json index 6caf1d1c4dc..efaae92eca4 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23871.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23871.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23871", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:09.437", - "lastModified": "2024-01-27T00:36:47.517", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:13.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23872.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23872.json index 90d9dee386f..403ce08de90 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23872.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23872.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23872", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:09.637", - "lastModified": "2024-01-27T00:36:44.227", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:14.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23873.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23873.json index d329df30f3f..bb3cc844c79 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23873.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23873", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:09.830", - "lastModified": "2024-01-27T00:36:39.440", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:14.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23874.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23874.json index 28cd15f4bd6..e4237bab1c5 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23874.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23874.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23874", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:10.023", - "lastModified": "2024-01-27T00:40:23.187", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:14.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23875.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23875.json index 06cc63e9c30..ef005bc49c8 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23875.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23875.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23875", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:10.213", - "lastModified": "2024-01-27T00:40:21.110", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:14.900", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23876.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23876.json index 2ed58455d16..76de6e5ffc9 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23876.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23876.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23876", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:10.410", - "lastModified": "2024-01-27T00:40:18.700", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:15.150", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23877.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23877.json index ad6790c2fc8..bdee97563f4 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23877.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23877.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23877", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:10.597", - "lastModified": "2024-01-27T00:40:16.787", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:15.450", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23878.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23878.json index 80f1f320cb9..a291d0460e6 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23878.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23878.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23878", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:10.803", - "lastModified": "2024-01-27T00:40:15.257", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:15.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23879.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23879.json index e4d26fb9e27..3bbd0ce8a78 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23879.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23879.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23879", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:10.997", - "lastModified": "2024-01-27T00:40:13.847", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:16.013", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23880.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23880.json index 02ff3d99d6f..473c2a68cbc 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23880.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23880.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23880", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:11.203", - "lastModified": "2024-01-27T00:40:12.270", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:16.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23881.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23881.json index 79f0891b9ad..ba4e65c4bd6 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23881.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23881.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23881", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:11.410", - "lastModified": "2024-01-27T00:40:10.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:16.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23882.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23882.json index b90ad1d061d..36170982b02 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23882.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23882", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:11.600", - "lastModified": "2024-01-27T00:40:08.750", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:16.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23883.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23883.json index c693ed789ce..93c73689962 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23883.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23883", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:11.800", - "lastModified": "2024-01-27T00:40:07.017", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:17.077", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23884.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23884.json index 93049a4e4b6..d7ebac54143 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23884.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23884.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23884", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:11.993", - "lastModified": "2024-01-27T00:40:05.440", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:17.360", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23885.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23885.json index e7424831ad3..dff5da1a502 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23885.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23885.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23885", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:12.180", - "lastModified": "2024-01-27T00:40:03.627", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:17.653", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23886.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23886.json index 27b34ac2756..39e446ef560 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23886.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23886.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23886", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:12.370", - "lastModified": "2024-01-27T00:40:02.080", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:17.903", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23887.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23887.json index a5093062760..319a9abf4ef 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23887.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23887.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23887", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:12.570", - "lastModified": "2024-01-27T00:40:00.343", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:18.193", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23888.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23888.json index 33956a5fe88..f8b4a8c9a65 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23888.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23888.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23888", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:12.760", - "lastModified": "2024-01-27T00:39:58.610", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:18.453", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23889.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23889.json index a2d9753d8b5..5980fccd52f 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23889.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23889.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23889", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T10:15:12.953", - "lastModified": "2024-01-27T00:39:57.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:18.750", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23890.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23890.json index f64b69051b5..bf7949d3d6f 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23890.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23890.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23890", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T11:15:08.053", - "lastModified": "2024-01-27T00:39:55.580", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:18.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23891.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23891.json index 98418bd4338..c6283b9fe8b 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23891.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23891", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T11:15:08.707", - "lastModified": "2024-01-27T00:39:54.103", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:19.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23892.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23892.json index 57e10d71178..76907bb3b0a 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23892.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23892.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23892", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T11:15:08.970", - "lastModified": "2024-01-27T00:39:52.617", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:19.567", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23893.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23893.json index 49cae7e0e3a..2e95ff80470 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23893.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23893.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23893", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T11:15:09.223", - "lastModified": "2024-01-27T00:39:51.037", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:19.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23894.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23894.json index 14071e03891..d83959c3639 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23894.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23894.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23894", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T11:15:09.477", - "lastModified": "2024-01-27T00:39:49.377", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:20.110", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23895.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23895.json index f0101edb09a..778b1029a93 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23895.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23895.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23895", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-02-02T10:15:08.623", - "lastModified": "2024-02-09T15:13:03.010", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:20.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23896.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23896.json index d8a56aec8cb..ca312cd8d0a 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23896.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23896.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23896", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-26T11:15:09.747", - "lastModified": "2024-01-27T00:39:47.627", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-15T10:15:20.657", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 7.1, + "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 4.2 + "impactScore": 4.7 } ] }, diff --git a/README.md b/README.md index 8a4cff69e21..bb2356259d1 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-15T09:01:12.503487+00:00 +2024-02-15T11:01:10.322305+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-15T08:15:46.497000+00:00 +2024-02-15T10:15:20.657000+00:00 ``` ### Last Data Feed Release @@ -29,34 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -238640 +238644 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `4` -* [CVE-2024-0708](CVE-2024/CVE-2024-07xx/CVE-2024-0708.json) (`2024-02-15T07:15:10.757`) -* [CVE-2024-21727](CVE-2024/CVE-2024-217xx/CVE-2024-21727.json) (`2024-02-15T07:15:11.167`) -* [CVE-2024-0353](CVE-2024/CVE-2024-03xx/CVE-2024-0353.json) (`2024-02-15T08:15:46.023`) -* [CVE-2024-24256](CVE-2024/CVE-2024-242xx/CVE-2024-24256.json) (`2024-02-15T08:15:46.410`) -* [CVE-2024-24386](CVE-2024/CVE-2024-243xx/CVE-2024-24386.json) (`2024-02-15T08:15:46.497`) +* [CVE-2023-4537](CVE-2023/CVE-2023-45xx/CVE-2023-4537.json) (`2024-02-15T09:15:33.273`) +* [CVE-2023-4538](CVE-2023/CVE-2023-45xx/CVE-2023-4538.json) (`2024-02-15T09:15:33.557`) +* [CVE-2023-4539](CVE-2023/CVE-2023-45xx/CVE-2023-4539.json) (`2024-02-15T09:15:33.740`) +* [CVE-2024-0390](CVE-2024/CVE-2024-03xx/CVE-2024-0390.json) (`2024-02-15T10:15:09.043`) ### CVEs modified in the last Commit -Recently modified CVEs: `10` +Recently modified CVEs: `43` -* [CVE-2023-46596](CVE-2023/CVE-2023-465xx/CVE-2023-46596.json) (`2024-02-15T07:15:07.370`) -* [CVE-2023-47256](CVE-2023/CVE-2023-472xx/CVE-2023-47256.json) (`2024-02-15T07:15:08.250`) -* [CVE-2023-47257](CVE-2023/CVE-2023-472xx/CVE-2023-47257.json) (`2024-02-15T07:15:08.777`) -* [CVE-2023-6246](CVE-2023/CVE-2023-62xx/CVE-2023-6246.json) (`2024-02-15T07:15:09.137`) -* [CVE-2023-6779](CVE-2023/CVE-2023-67xx/CVE-2023-6779.json) (`2024-02-15T07:15:10.220`) -* [CVE-2023-43609](CVE-2023/CVE-2023-436xx/CVE-2023-43609.json) (`2024-02-15T07:22:35.487`) -* [CVE-2023-46687](CVE-2023/CVE-2023-466xx/CVE-2023-46687.json) (`2024-02-15T07:22:46.397`) -* [CVE-2023-49716](CVE-2023/CVE-2023-497xx/CVE-2023-49716.json) (`2024-02-15T07:23:22.473`) -* [CVE-2023-51761](CVE-2023/CVE-2023-517xx/CVE-2023-51761.json) (`2024-02-15T07:24:09.660`) -* [CVE-2023-6240](CVE-2023/CVE-2023-62xx/CVE-2023-6240.json) (`2024-02-15T08:15:45.610`) +* [CVE-2024-23872](CVE-2024/CVE-2024-238xx/CVE-2024-23872.json) (`2024-02-15T10:15:14.013`) +* [CVE-2024-23873](CVE-2024/CVE-2024-238xx/CVE-2024-23873.json) (`2024-02-15T10:15:14.313`) +* [CVE-2024-23874](CVE-2024/CVE-2024-238xx/CVE-2024-23874.json) (`2024-02-15T10:15:14.577`) +* [CVE-2024-23875](CVE-2024/CVE-2024-238xx/CVE-2024-23875.json) (`2024-02-15T10:15:14.900`) +* [CVE-2024-23876](CVE-2024/CVE-2024-238xx/CVE-2024-23876.json) (`2024-02-15T10:15:15.150`) +* [CVE-2024-23877](CVE-2024/CVE-2024-238xx/CVE-2024-23877.json) (`2024-02-15T10:15:15.450`) +* [CVE-2024-23878](CVE-2024/CVE-2024-238xx/CVE-2024-23878.json) (`2024-02-15T10:15:15.707`) +* [CVE-2024-23879](CVE-2024/CVE-2024-238xx/CVE-2024-23879.json) (`2024-02-15T10:15:16.013`) +* [CVE-2024-23880](CVE-2024/CVE-2024-238xx/CVE-2024-23880.json) (`2024-02-15T10:15:16.270`) +* [CVE-2024-23881](CVE-2024/CVE-2024-238xx/CVE-2024-23881.json) (`2024-02-15T10:15:16.540`) +* [CVE-2024-23882](CVE-2024/CVE-2024-238xx/CVE-2024-23882.json) (`2024-02-15T10:15:16.773`) +* [CVE-2024-23883](CVE-2024/CVE-2024-238xx/CVE-2024-23883.json) (`2024-02-15T10:15:17.077`) +* [CVE-2024-23884](CVE-2024/CVE-2024-238xx/CVE-2024-23884.json) (`2024-02-15T10:15:17.360`) +* [CVE-2024-23885](CVE-2024/CVE-2024-238xx/CVE-2024-23885.json) (`2024-02-15T10:15:17.653`) +* [CVE-2024-23886](CVE-2024/CVE-2024-238xx/CVE-2024-23886.json) (`2024-02-15T10:15:17.903`) +* [CVE-2024-23887](CVE-2024/CVE-2024-238xx/CVE-2024-23887.json) (`2024-02-15T10:15:18.193`) +* [CVE-2024-23888](CVE-2024/CVE-2024-238xx/CVE-2024-23888.json) (`2024-02-15T10:15:18.453`) +* [CVE-2024-23889](CVE-2024/CVE-2024-238xx/CVE-2024-23889.json) (`2024-02-15T10:15:18.750`) +* [CVE-2024-23890](CVE-2024/CVE-2024-238xx/CVE-2024-23890.json) (`2024-02-15T10:15:18.997`) +* [CVE-2024-23891](CVE-2024/CVE-2024-238xx/CVE-2024-23891.json) (`2024-02-15T10:15:19.320`) +* [CVE-2024-23892](CVE-2024/CVE-2024-238xx/CVE-2024-23892.json) (`2024-02-15T10:15:19.567`) +* [CVE-2024-23893](CVE-2024/CVE-2024-238xx/CVE-2024-23893.json) (`2024-02-15T10:15:19.850`) +* [CVE-2024-23894](CVE-2024/CVE-2024-238xx/CVE-2024-23894.json) (`2024-02-15T10:15:20.110`) +* [CVE-2024-23895](CVE-2024/CVE-2024-238xx/CVE-2024-23895.json) (`2024-02-15T10:15:20.403`) +* [CVE-2024-23896](CVE-2024/CVE-2024-238xx/CVE-2024-23896.json) (`2024-02-15T10:15:20.657`) ## Download and Usage