Auto-Update: 2024-02-15T11:01:10.322305+00:00

This commit is contained in:
cad-safe-bot 2024-02-15 11:01:13 +00:00
parent d2060357ff
commit ba2cabed7d
48 changed files with 502 additions and 275 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-4537",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-02-15T09:15:33.273",
"lastModified": "2024-02-15T09:15:33.273",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Comarch ERP XL client is vulnerable to MS SQL protocol downgrade request from a server side, what could lead to an unencrypted communication vulnerable to data interception and modification.\n\nThis issue affects ERP XL: from 2020.2.2 through 2023.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-311"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/02/CVE-2023-4537/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2023/02/CVE-2023-4537/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-4538",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-02-15T09:15:33.557",
"lastModified": "2024-02-15T09:15:33.557",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The database access credentials configured during installation are stored in a special table, and are encrypted with a shared key, same among all Comarch ERP XL client installations. This could allow an attacker with access to that table to retrieve plain text passwords.\n\nThis issue affects ERP XL: from 2020.2.2 through 2023.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/02/CVE-2023-4537/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/02/CVE-2023-4537/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-4539",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-02-15T09:15:33.740",
"lastModified": "2024-02-15T09:15:33.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use of a hard-coded password for a special database account created during Comarch ERP XL installation allows an attacker to retrieve embedded sensitive data stored in the database. The password is same among all Comarch ERP XL installations. \n\nThis issue affects ERP XL: from 2020.2.2 through 2023.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/02/CVE-2023-4537/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/02/CVE-2023-4537/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-46596",
"sourceIdentifier": "security.vulnerabilities@algosec.com",
"published": "2024-02-15T06:15:45.453",
"lastModified": "2024-02-15T07:15:07.370",
"lastModified": "2024-02-15T10:15:08.777",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in Algosec FireFlow VisualFlow workflow editor via Name, Description and Configuration File field in\u00a0version A32.20, A32.50, A32.60 permits an attacker to initiate an XSS attack by injecting malicious executable scripts into the application's code. Fixed in version\u00a0A32.20 (b600 and\nabove),\u00a0A32.50 (b430 and\nabove),\u00a0A32.60 (b250 and\nabove)"
"value": "\nImproper input validation in Algosec FireFlow VisualFlow workflow editor via Name, Description and Configuration File field in version A32.20, A32.50, A32.60 permits an attacker to initiate an XSS attack by injecting malicious executable scripts into the application's code. Fixed in version A32.20 (b600 and above), A32.50 (b430 and above), A32.60 (b250 and above)\n\n"
}
],
"metrics": {
@ -48,7 +48,7 @@
],
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/79.html",
"url": "https://www.algosec.com/docs/en/cves/Content/tech-notes/cves/cve-2023-46596.htm",
"source": "security.vulnerabilities@algosec.com"
}
]

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-0390",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-02-15T10:15:09.043",
"lastModified": "2024-02-15T10:15:09.043",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "INPRAX \"iZZi connect\" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit \"reQnet iZZi\".This issue affects \"iZZi connect\" application versions before 2024010401.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/02/CVE-2024-0390/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/02/CVE-2024-0390/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23855",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-25T14:15:27.183",
"lastModified": "2024-01-27T00:39:46.050",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:09.167",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23856",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T09:15:08.620",
"lastModified": "2024-01-27T00:37:35.997",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:09.493",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23857",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T09:15:08.820",
"lastModified": "2024-01-27T00:37:34.170",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:09.737",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23858",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T09:15:09.023",
"lastModified": "2024-01-27T00:37:32.293",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:09.977",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23859",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T09:15:09.230",
"lastModified": "2024-01-27T00:37:30.137",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:10.320",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23860",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T09:15:09.427",
"lastModified": "2024-01-27T00:37:23.043",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:10.567",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23861",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T09:15:09.620",
"lastModified": "2024-01-27T00:37:21.280",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:10.917",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23862",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T09:15:09.840",
"lastModified": "2024-01-27T00:37:18.643",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:11.193",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23863",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:07.693",
"lastModified": "2024-01-27T00:37:13.743",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:11.477",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23864",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:07.953",
"lastModified": "2024-01-27T00:37:11.693",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:11.807",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23865",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:08.223",
"lastModified": "2024-01-27T00:37:09.910",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:12.087",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23866",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:08.420",
"lastModified": "2024-01-27T00:37:08.137",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:12.360",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23867",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:08.640",
"lastModified": "2024-01-27T00:37:06.177",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:12.677",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23868",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:08.840",
"lastModified": "2024-01-27T00:37:01.887",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:12.930",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23869",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:09.047",
"lastModified": "2024-01-27T00:36:57.017",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:13.187",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23870",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:09.243",
"lastModified": "2024-01-27T00:36:52.997",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:13.437",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23871",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:09.437",
"lastModified": "2024-01-27T00:36:47.517",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:13.737",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23872",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:09.637",
"lastModified": "2024-01-27T00:36:44.227",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:14.013",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23873",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:09.830",
"lastModified": "2024-01-27T00:36:39.440",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:14.313",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23874",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:10.023",
"lastModified": "2024-01-27T00:40:23.187",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:14.577",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23875",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:10.213",
"lastModified": "2024-01-27T00:40:21.110",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:14.900",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23876",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:10.410",
"lastModified": "2024-01-27T00:40:18.700",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:15.150",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23877",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:10.597",
"lastModified": "2024-01-27T00:40:16.787",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:15.450",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23878",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:10.803",
"lastModified": "2024-01-27T00:40:15.257",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:15.707",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23879",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:10.997",
"lastModified": "2024-01-27T00:40:13.847",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:16.013",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23880",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:11.203",
"lastModified": "2024-01-27T00:40:12.270",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:16.270",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23881",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:11.410",
"lastModified": "2024-01-27T00:40:10.707",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:16.540",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23882",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:11.600",
"lastModified": "2024-01-27T00:40:08.750",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:16.773",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23883",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:11.800",
"lastModified": "2024-01-27T00:40:07.017",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:17.077",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23884",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:11.993",
"lastModified": "2024-01-27T00:40:05.440",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:17.360",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23885",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:12.180",
"lastModified": "2024-01-27T00:40:03.627",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:17.653",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23886",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:12.370",
"lastModified": "2024-01-27T00:40:02.080",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:17.903",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23887",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:12.570",
"lastModified": "2024-01-27T00:40:00.343",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:18.193",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23888",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:12.760",
"lastModified": "2024-01-27T00:39:58.610",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:18.453",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23889",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T10:15:12.953",
"lastModified": "2024-01-27T00:39:57.027",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:18.750",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23890",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T11:15:08.053",
"lastModified": "2024-01-27T00:39:55.580",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:18.997",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23891",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T11:15:08.707",
"lastModified": "2024-01-27T00:39:54.103",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:19.320",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23892",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T11:15:08.970",
"lastModified": "2024-01-27T00:39:52.617",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:19.567",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23893",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T11:15:09.223",
"lastModified": "2024-01-27T00:39:51.037",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:19.850",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23894",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T11:15:09.477",
"lastModified": "2024-01-27T00:39:49.377",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:20.110",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23895",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-02-02T10:15:08.623",
"lastModified": "2024-02-09T15:13:03.010",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:20.403",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23896",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-01-26T11:15:09.747",
"lastModified": "2024-01-27T00:39:47.627",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-15T10:15:20.657",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
"impactScore": 4.7
}
]
},

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-15T09:01:12.503487+00:00
2024-02-15T11:01:10.322305+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-15T08:15:46.497000+00:00
2024-02-15T10:15:20.657000+00:00
```
### Last Data Feed Release
@ -29,34 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
238640
238644
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `4`
* [CVE-2024-0708](CVE-2024/CVE-2024-07xx/CVE-2024-0708.json) (`2024-02-15T07:15:10.757`)
* [CVE-2024-21727](CVE-2024/CVE-2024-217xx/CVE-2024-21727.json) (`2024-02-15T07:15:11.167`)
* [CVE-2024-0353](CVE-2024/CVE-2024-03xx/CVE-2024-0353.json) (`2024-02-15T08:15:46.023`)
* [CVE-2024-24256](CVE-2024/CVE-2024-242xx/CVE-2024-24256.json) (`2024-02-15T08:15:46.410`)
* [CVE-2024-24386](CVE-2024/CVE-2024-243xx/CVE-2024-24386.json) (`2024-02-15T08:15:46.497`)
* [CVE-2023-4537](CVE-2023/CVE-2023-45xx/CVE-2023-4537.json) (`2024-02-15T09:15:33.273`)
* [CVE-2023-4538](CVE-2023/CVE-2023-45xx/CVE-2023-4538.json) (`2024-02-15T09:15:33.557`)
* [CVE-2023-4539](CVE-2023/CVE-2023-45xx/CVE-2023-4539.json) (`2024-02-15T09:15:33.740`)
* [CVE-2024-0390](CVE-2024/CVE-2024-03xx/CVE-2024-0390.json) (`2024-02-15T10:15:09.043`)
### CVEs modified in the last Commit
Recently modified CVEs: `10`
Recently modified CVEs: `43`
* [CVE-2023-46596](CVE-2023/CVE-2023-465xx/CVE-2023-46596.json) (`2024-02-15T07:15:07.370`)
* [CVE-2023-47256](CVE-2023/CVE-2023-472xx/CVE-2023-47256.json) (`2024-02-15T07:15:08.250`)
* [CVE-2023-47257](CVE-2023/CVE-2023-472xx/CVE-2023-47257.json) (`2024-02-15T07:15:08.777`)
* [CVE-2023-6246](CVE-2023/CVE-2023-62xx/CVE-2023-6246.json) (`2024-02-15T07:15:09.137`)
* [CVE-2023-6779](CVE-2023/CVE-2023-67xx/CVE-2023-6779.json) (`2024-02-15T07:15:10.220`)
* [CVE-2023-43609](CVE-2023/CVE-2023-436xx/CVE-2023-43609.json) (`2024-02-15T07:22:35.487`)
* [CVE-2023-46687](CVE-2023/CVE-2023-466xx/CVE-2023-46687.json) (`2024-02-15T07:22:46.397`)
* [CVE-2023-49716](CVE-2023/CVE-2023-497xx/CVE-2023-49716.json) (`2024-02-15T07:23:22.473`)
* [CVE-2023-51761](CVE-2023/CVE-2023-517xx/CVE-2023-51761.json) (`2024-02-15T07:24:09.660`)
* [CVE-2023-6240](CVE-2023/CVE-2023-62xx/CVE-2023-6240.json) (`2024-02-15T08:15:45.610`)
* [CVE-2024-23872](CVE-2024/CVE-2024-238xx/CVE-2024-23872.json) (`2024-02-15T10:15:14.013`)
* [CVE-2024-23873](CVE-2024/CVE-2024-238xx/CVE-2024-23873.json) (`2024-02-15T10:15:14.313`)
* [CVE-2024-23874](CVE-2024/CVE-2024-238xx/CVE-2024-23874.json) (`2024-02-15T10:15:14.577`)
* [CVE-2024-23875](CVE-2024/CVE-2024-238xx/CVE-2024-23875.json) (`2024-02-15T10:15:14.900`)
* [CVE-2024-23876](CVE-2024/CVE-2024-238xx/CVE-2024-23876.json) (`2024-02-15T10:15:15.150`)
* [CVE-2024-23877](CVE-2024/CVE-2024-238xx/CVE-2024-23877.json) (`2024-02-15T10:15:15.450`)
* [CVE-2024-23878](CVE-2024/CVE-2024-238xx/CVE-2024-23878.json) (`2024-02-15T10:15:15.707`)
* [CVE-2024-23879](CVE-2024/CVE-2024-238xx/CVE-2024-23879.json) (`2024-02-15T10:15:16.013`)
* [CVE-2024-23880](CVE-2024/CVE-2024-238xx/CVE-2024-23880.json) (`2024-02-15T10:15:16.270`)
* [CVE-2024-23881](CVE-2024/CVE-2024-238xx/CVE-2024-23881.json) (`2024-02-15T10:15:16.540`)
* [CVE-2024-23882](CVE-2024/CVE-2024-238xx/CVE-2024-23882.json) (`2024-02-15T10:15:16.773`)
* [CVE-2024-23883](CVE-2024/CVE-2024-238xx/CVE-2024-23883.json) (`2024-02-15T10:15:17.077`)
* [CVE-2024-23884](CVE-2024/CVE-2024-238xx/CVE-2024-23884.json) (`2024-02-15T10:15:17.360`)
* [CVE-2024-23885](CVE-2024/CVE-2024-238xx/CVE-2024-23885.json) (`2024-02-15T10:15:17.653`)
* [CVE-2024-23886](CVE-2024/CVE-2024-238xx/CVE-2024-23886.json) (`2024-02-15T10:15:17.903`)
* [CVE-2024-23887](CVE-2024/CVE-2024-238xx/CVE-2024-23887.json) (`2024-02-15T10:15:18.193`)
* [CVE-2024-23888](CVE-2024/CVE-2024-238xx/CVE-2024-23888.json) (`2024-02-15T10:15:18.453`)
* [CVE-2024-23889](CVE-2024/CVE-2024-238xx/CVE-2024-23889.json) (`2024-02-15T10:15:18.750`)
* [CVE-2024-23890](CVE-2024/CVE-2024-238xx/CVE-2024-23890.json) (`2024-02-15T10:15:18.997`)
* [CVE-2024-23891](CVE-2024/CVE-2024-238xx/CVE-2024-23891.json) (`2024-02-15T10:15:19.320`)
* [CVE-2024-23892](CVE-2024/CVE-2024-238xx/CVE-2024-23892.json) (`2024-02-15T10:15:19.567`)
* [CVE-2024-23893](CVE-2024/CVE-2024-238xx/CVE-2024-23893.json) (`2024-02-15T10:15:19.850`)
* [CVE-2024-23894](CVE-2024/CVE-2024-238xx/CVE-2024-23894.json) (`2024-02-15T10:15:20.110`)
* [CVE-2024-23895](CVE-2024/CVE-2024-238xx/CVE-2024-23895.json) (`2024-02-15T10:15:20.403`)
* [CVE-2024-23896](CVE-2024/CVE-2024-238xx/CVE-2024-23896.json) (`2024-02-15T10:15:20.657`)
## Download and Usage