From c5c2b6cecacff159430fdba8846e6348f52cb2ca Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 8 Jan 2024 17:00:28 +0000 Subject: [PATCH] Auto-Update: 2024-01-08T17:00:24.988335+00:00 --- CVE-2023/CVE-2023-326xx/CVE-2023-32650.json | 59 +++++++++++++++ CVE-2023/CVE-2023-340xx/CVE-2023-34087.json | 59 +++++++++++++++ CVE-2023/CVE-2023-344xx/CVE-2023-34436.json | 59 +++++++++++++++ CVE-2023/CVE-2023-350xx/CVE-2023-35004.json | 59 +++++++++++++++ CVE-2023/CVE-2023-350xx/CVE-2023-35057.json | 59 +++++++++++++++ CVE-2023/CVE-2023-351xx/CVE-2023-35128.json | 59 +++++++++++++++ CVE-2023/CVE-2023-357xx/CVE-2023-35702.json | 59 +++++++++++++++ CVE-2023/CVE-2023-357xx/CVE-2023-35703.json | 59 +++++++++++++++ CVE-2023/CVE-2023-357xx/CVE-2023-35704.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35955.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35956.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35957.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35958.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35959.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35960.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35961.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35962.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35963.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35964.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35969.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35970.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35989.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35992.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35994.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35995.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35996.json | 59 +++++++++++++++ CVE-2023/CVE-2023-359xx/CVE-2023-35997.json | 59 +++++++++++++++ CVE-2023/CVE-2023-367xx/CVE-2023-36746.json | 59 +++++++++++++++ CVE-2023/CVE-2023-367xx/CVE-2023-36747.json | 59 +++++++++++++++ CVE-2023/CVE-2023-368xx/CVE-2023-36861.json | 59 +++++++++++++++ CVE-2023/CVE-2023-368xx/CVE-2023-36864.json | 59 +++++++++++++++ CVE-2023/CVE-2023-369xx/CVE-2023-36915.json | 59 +++++++++++++++ CVE-2023/CVE-2023-369xx/CVE-2023-36916.json | 59 +++++++++++++++ CVE-2023/CVE-2023-372xx/CVE-2023-37282.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37416.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37417.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37418.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37419.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37420.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37442.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37443.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37444.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37445.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37446.json | 59 +++++++++++++++ CVE-2023/CVE-2023-374xx/CVE-2023-37447.json | 59 +++++++++++++++ CVE-2023/CVE-2023-375xx/CVE-2023-37573.json | 59 +++++++++++++++ CVE-2023/CVE-2023-375xx/CVE-2023-37574.json | 59 +++++++++++++++ CVE-2023/CVE-2023-375xx/CVE-2023-37575.json | 59 +++++++++++++++ CVE-2023/CVE-2023-375xx/CVE-2023-37576.json | 59 +++++++++++++++ CVE-2023/CVE-2023-375xx/CVE-2023-37577.json | 59 +++++++++++++++ CVE-2023/CVE-2023-375xx/CVE-2023-37578.json | 59 +++++++++++++++ CVE-2023/CVE-2023-379xx/CVE-2023-37921.json | 59 +++++++++++++++ CVE-2023/CVE-2023-379xx/CVE-2023-37922.json | 59 +++++++++++++++ CVE-2023/CVE-2023-379xx/CVE-2023-37923.json | 59 +++++++++++++++ CVE-2023/CVE-2023-385xx/CVE-2023-38583.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38618.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38619.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38620.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38621.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38622.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38623.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38648.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38649.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38650.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38651.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38652.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38653.json | 59 +++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38657.json | 59 +++++++++++++++ CVE-2023/CVE-2023-392xx/CVE-2023-39234.json | 59 +++++++++++++++ CVE-2023/CVE-2023-392xx/CVE-2023-39235.json | 59 +++++++++++++++ CVE-2023/CVE-2023-392xx/CVE-2023-39270.json | 59 +++++++++++++++ CVE-2023/CVE-2023-392xx/CVE-2023-39271.json | 59 +++++++++++++++ CVE-2023/CVE-2023-392xx/CVE-2023-39272.json | 59 +++++++++++++++ CVE-2023/CVE-2023-392xx/CVE-2023-39273.json | 59 +++++++++++++++ CVE-2023/CVE-2023-392xx/CVE-2023-39274.json | 59 +++++++++++++++ CVE-2023/CVE-2023-392xx/CVE-2023-39275.json | 59 +++++++++++++++ CVE-2023/CVE-2023-393xx/CVE-2023-39316.json | 59 +++++++++++++++ CVE-2023/CVE-2023-393xx/CVE-2023-39317.json | 59 +++++++++++++++ CVE-2023/CVE-2023-394xx/CVE-2023-39413.json | 59 +++++++++++++++ CVE-2023/CVE-2023-394xx/CVE-2023-39414.json | 59 +++++++++++++++ CVE-2023/CVE-2023-394xx/CVE-2023-39443.json | 59 +++++++++++++++ CVE-2023/CVE-2023-394xx/CVE-2023-39444.json | 59 +++++++++++++++ CVE-2023/CVE-2023-472xx/CVE-2023-47211.json | 63 ++++++++++++++++ CVE-2023/CVE-2023-507xx/CVE-2023-50714.json | 82 +++++++++++++++++++-- CVE-2023/CVE-2023-509xx/CVE-2023-50928.json | 56 +++++++++++++- CVE-2023/CVE-2023-514xx/CVE-2023-51421.json | 51 ++++++++++++- CVE-2023/CVE-2023-514xx/CVE-2023-51443.json | 8 +- CVE-2023/CVE-2023-517xx/CVE-2023-51701.json | 4 +- CVE-2023/CVE-2023-60xx/CVE-2023-6000.json | 73 ++++++++++++++++-- CVE-2023/CVE-2023-60xx/CVE-2023-6037.json | 67 +++++++++++++++-- CVE-2023/CVE-2023-65xx/CVE-2023-6552.json | 4 +- CVE-2023/CVE-2023-65xx/CVE-2023-6560.json | 6 +- CVE-2023/CVE-2023-69xx/CVE-2023-6921.json | 4 +- CVE-2023/CVE-2023-72xx/CVE-2023-7224.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0321.json | 4 +- CVE-2024/CVE-2024-03xx/CVE-2024-0322.json | 4 +- CVE-2024/CVE-2024-216xx/CVE-2024-21644.json | 4 +- CVE-2024/CVE-2024-216xx/CVE-2024-21645.json | 4 +- CVE-2024/CVE-2024-216xx/CVE-2024-21647.json | 4 +- CVE-2024/CVE-2024-216xx/CVE-2024-21650.json | 63 ++++++++++++++++ README.md | 74 ++++++++++++------- 101 files changed, 5343 insertions(+), 74 deletions(-) create mode 100644 CVE-2023/CVE-2023-326xx/CVE-2023-32650.json create mode 100644 CVE-2023/CVE-2023-340xx/CVE-2023-34087.json create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34436.json create mode 100644 CVE-2023/CVE-2023-350xx/CVE-2023-35004.json create mode 100644 CVE-2023/CVE-2023-350xx/CVE-2023-35057.json create mode 100644 CVE-2023/CVE-2023-351xx/CVE-2023-35128.json create mode 100644 CVE-2023/CVE-2023-357xx/CVE-2023-35702.json create mode 100644 CVE-2023/CVE-2023-357xx/CVE-2023-35703.json create mode 100644 CVE-2023/CVE-2023-357xx/CVE-2023-35704.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35955.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35956.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35957.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35958.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35959.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35960.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35961.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35962.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35963.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35964.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35969.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35970.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35989.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35992.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35994.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35995.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35996.json create mode 100644 CVE-2023/CVE-2023-359xx/CVE-2023-35997.json create mode 100644 CVE-2023/CVE-2023-367xx/CVE-2023-36746.json create mode 100644 CVE-2023/CVE-2023-367xx/CVE-2023-36747.json create mode 100644 CVE-2023/CVE-2023-368xx/CVE-2023-36861.json create mode 100644 CVE-2023/CVE-2023-368xx/CVE-2023-36864.json create mode 100644 CVE-2023/CVE-2023-369xx/CVE-2023-36915.json create mode 100644 CVE-2023/CVE-2023-369xx/CVE-2023-36916.json create mode 100644 CVE-2023/CVE-2023-372xx/CVE-2023-37282.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37416.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37417.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37418.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37419.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37420.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37442.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37443.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37444.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37445.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37446.json create mode 100644 CVE-2023/CVE-2023-374xx/CVE-2023-37447.json create mode 100644 CVE-2023/CVE-2023-375xx/CVE-2023-37573.json create mode 100644 CVE-2023/CVE-2023-375xx/CVE-2023-37574.json create mode 100644 CVE-2023/CVE-2023-375xx/CVE-2023-37575.json create mode 100644 CVE-2023/CVE-2023-375xx/CVE-2023-37576.json create mode 100644 CVE-2023/CVE-2023-375xx/CVE-2023-37577.json create mode 100644 CVE-2023/CVE-2023-375xx/CVE-2023-37578.json create mode 100644 CVE-2023/CVE-2023-379xx/CVE-2023-37921.json create mode 100644 CVE-2023/CVE-2023-379xx/CVE-2023-37922.json create mode 100644 CVE-2023/CVE-2023-379xx/CVE-2023-37923.json create mode 100644 CVE-2023/CVE-2023-385xx/CVE-2023-38583.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38618.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38619.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38620.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38621.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38622.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38623.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38648.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38649.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38650.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38651.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38652.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38653.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38657.json create mode 100644 CVE-2023/CVE-2023-392xx/CVE-2023-39234.json create mode 100644 CVE-2023/CVE-2023-392xx/CVE-2023-39235.json create mode 100644 CVE-2023/CVE-2023-392xx/CVE-2023-39270.json create mode 100644 CVE-2023/CVE-2023-392xx/CVE-2023-39271.json create mode 100644 CVE-2023/CVE-2023-392xx/CVE-2023-39272.json create mode 100644 CVE-2023/CVE-2023-392xx/CVE-2023-39273.json create mode 100644 CVE-2023/CVE-2023-392xx/CVE-2023-39274.json create mode 100644 CVE-2023/CVE-2023-392xx/CVE-2023-39275.json create mode 100644 CVE-2023/CVE-2023-393xx/CVE-2023-39316.json create mode 100644 CVE-2023/CVE-2023-393xx/CVE-2023-39317.json create mode 100644 CVE-2023/CVE-2023-394xx/CVE-2023-39413.json create mode 100644 CVE-2023/CVE-2023-394xx/CVE-2023-39414.json create mode 100644 CVE-2023/CVE-2023-394xx/CVE-2023-39443.json create mode 100644 CVE-2023/CVE-2023-394xx/CVE-2023-39444.json create mode 100644 CVE-2023/CVE-2023-472xx/CVE-2023-47211.json create mode 100644 CVE-2024/CVE-2024-216xx/CVE-2024-21650.json diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32650.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32650.json new file mode 100644 index 00000000000..09306586aa0 --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32650.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-32650", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:08.543", + "lastModified": "2024-01-08T16:15:43.760", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An integer overflow vulnerability exists in the FST_BL_GEOM parsing maxhandle functionality of GTKWave 3.3.115, when compiled as a 32-bit binary. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1777", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1777", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34087.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34087.json new file mode 100644 index 00000000000..b8565ea8e7d --- /dev/null +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34087.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-34087", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:08.783", + "lastModified": "2024-01-08T16:15:43.850", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An improper array index validation vulnerability exists in the EVCD var len parsing functionality of GTKWave 3.3.115. A specially crafted .evcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1803", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1803", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34436.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34436.json new file mode 100644 index 00000000000..0eec27e945f --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34436.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-34436", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:08.990", + "lastModified": "2024-01-08T16:15:43.923", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write vulnerability exists in the LXT2 num_time_table_entries functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1819", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1819", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35004.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35004.json new file mode 100644 index 00000000000..f1cfdd84101 --- /dev/null +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35004.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35004", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:09.210", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An integer overflow vulnerability exists in the VZT longest_len value allocation functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1816", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1816", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35057.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35057.json new file mode 100644 index 00000000000..edbd2a57b14 --- /dev/null +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35057.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35057", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:09.407", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace value elements allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1821", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35128.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35128.json new file mode 100644 index 00000000000..4ebccb1e8cf --- /dev/null +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35128.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35128", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:09.600", + "lastModified": "2024-01-08T16:15:43.993", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An integer overflow vulnerability exists in the fstReaderIterBlocks2 time_table tsec_nitems functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1792", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1792", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35702.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35702.json new file mode 100644 index 00000000000..7cdbdc000bd --- /dev/null +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35702.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35702", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:09.793", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint32 function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1783", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35703.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35703.json new file mode 100644 index 00000000000..175f51b3b60 --- /dev/null +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35703.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35703", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:09.987", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint64 function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1783", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35704.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35704.json new file mode 100644 index 00000000000..f86107043b3 --- /dev/null +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35704.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35704", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:10.180", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint32WithSkip function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1783", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35955.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35955.json new file mode 100644 index 00000000000..a341dfc48f3 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35955.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35955", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:10.380", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the decompression function `LZ4_decompress_safe_partial`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35956.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35956.json new file mode 100644 index 00000000000..20285a119d1 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35956.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35956", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:10.620", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the decompression function `fastlz_decompress`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35957.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35957.json new file mode 100644 index 00000000000..5f4ee2c922c --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35957.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35957", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:10.903", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the decompression function `uncompress`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35958.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35958.json new file mode 100644 index 00000000000..7617a4cbdf9 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35958.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35958", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:11.090", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the copy function `fstFread`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1785", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35959.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35959.json new file mode 100644 index 00000000000..d36ef9e0486 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35959.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35959", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:11.280", + "lastModified": "2024-01-08T16:15:44.070", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns `.ghw` decompression." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35960.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35960.json new file mode 100644 index 00000000000..dcafc7627e8 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35960.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35960", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:11.460", + "lastModified": "2024-01-08T16:15:44.147", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns legacy decompression in `vcd_main`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35961.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35961.json new file mode 100644 index 00000000000..c57fdab8e47 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35961.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35961", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:11.667", + "lastModified": "2024-01-08T16:15:44.220", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns decompression in `vcd_recorder_main`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35962.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35962.json new file mode 100644 index 00000000000..0026af63179 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35962.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35962", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:11.877", + "lastModified": "2024-01-08T16:15:44.297", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns decompression in the `vcd2vzt` utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35963.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35963.json new file mode 100644 index 00000000000..cfc521e50cd --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35963.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35963", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:12.060", + "lastModified": "2024-01-08T16:15:44.370", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns decompression in the `vcd2lxt2` utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35964.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35964.json new file mode 100644 index 00000000000..0a08d95df35 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35964.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35964", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:12.257", + "lastModified": "2024-01-08T16:15:44.447", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns decompression in the `vcd2lxt` utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1786", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35969.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35969.json new file mode 100644 index 00000000000..ec75cf486f7 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35969.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35969", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:12.437", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 chain_table parsing functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the chain_table of `FST_BL_VCDATA` and `FST_BL_VCDATA_DYN_ALIAS` section types." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1789", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35970.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35970.json new file mode 100644 index 00000000000..36df28e6760 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35970.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35970", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:12.617", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 chain_table parsing functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the chain_table of the `FST_BL_VCDATA_DYN_ALIAS2` section type." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1789", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35989.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35989.json new file mode 100644 index 00000000000..aac63b062c2 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35989.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35989", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:12.800", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An integer overflow vulnerability exists in the LXT2 zlib block allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1822", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1822", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35992.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35992.json new file mode 100644 index 00000000000..ac0b30e97a0 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35992.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35992", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:12.987", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An integer overflow vulnerability exists in the FST fstReaderIterBlocks2 vesc allocation functionality of GTKWave 3.3.115, when compiled as a 32-bit binary. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1790", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1790", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35994.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35994.json new file mode 100644 index 00000000000..e70e5c7159e --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35994.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35994", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:13.163", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta initialization part." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1791", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35995.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35995.json new file mode 100644 index 00000000000..496ec5f4336 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35995.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35995", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:13.370", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1791", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35996.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35996.json new file mode 100644 index 00000000000..974d8527e22 --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35996.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35996", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:13.590", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1791", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35997.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35997.json new file mode 100644 index 00000000000..c41a5f24efa --- /dev/null +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35997.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-35997", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:13.780", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 2 or more." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1791", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36746.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36746.json new file mode 100644 index 00000000000..ee4f084a169 --- /dev/null +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36746.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-36746", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:13.967", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 fstWritex len functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the handling of `len` in `fstWritex` when parsing the time table." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1793", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1793", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-367xx/CVE-2023-36747.json b/CVE-2023/CVE-2023-367xx/CVE-2023-36747.json new file mode 100644 index 00000000000..233f8ddb05c --- /dev/null +++ b/CVE-2023/CVE-2023-367xx/CVE-2023-36747.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-36747", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:14.190", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 fstWritex len functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the handling of `len` in `fstWritex` when `beg_time` does not match the start of the time table." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1793", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1793", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36861.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36861.json new file mode 100644 index 00000000000..61f642b73a1 --- /dev/null +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36861.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-36861", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:14.377", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write vulnerability exists in the VZT LZMA_read_varint functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1811", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1811", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36864.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36864.json new file mode 100644 index 00000000000..26030f824ae --- /dev/null +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36864.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-36864", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:14.593", + "lastModified": "2024-01-08T16:15:44.513", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An integer overflow vulnerability exists in the fstReaderIterBlocks2 temp_signal_value_buf allocation functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1797", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1797", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36915.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36915.json new file mode 100644 index 00000000000..bb71cd37943 --- /dev/null +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36915.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-36915", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:14.790", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the FST fstReaderIterBlocks2 chain_table allocation functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the allocation of the `chain_table` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1798", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1798", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36916.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36916.json new file mode 100644 index 00000000000..d2070336247 --- /dev/null +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36916.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-36916", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:14.990", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the FST fstReaderIterBlocks2 chain_table allocation functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the allocation of the `chain_table_lengths` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1798", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1798", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37282.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37282.json new file mode 100644 index 00000000000..d56d6064135 --- /dev/null +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37282.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37282", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:15.187", + "lastModified": "2024-01-08T16:15:44.603", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write vulnerability exists in the VZT LZMA_Read dmem extraction functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1810", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1810", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37416.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37416.json new file mode 100644 index 00000000000..9ba69c7ad29 --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37416.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37416", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:15.367", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the GUI's legacy VCD parsing code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1804", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37417.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37417.json new file mode 100644 index 00000000000..6c64a6ccbc4 --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37417.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37417", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:15.563", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the GUI's interactive VCD parsing code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1804", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37418.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37418.json new file mode 100644 index 00000000000..ebd8deb80a7 --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37418.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37418", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:15.767", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2vzt conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1804", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37419.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37419.json new file mode 100644 index 00000000000..f0bdba9b2fb --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37419.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37419", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:15.950", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2lxt2 conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1804", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37420.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37420.json new file mode 100644 index 00000000000..3072ba489da --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37420.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37420", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:16.133", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2lxt conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1804", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37442.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37442.json new file mode 100644 index 00000000000..ecef8c6d7cc --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37442.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37442", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:16.320", + "lastModified": "2024-01-08T16:15:44.677", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds read when triggered via the GUI's default VCD parsing code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37443.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37443.json new file mode 100644 index 00000000000..bb81177b578 --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37443.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37443", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:16.517", + "lastModified": "2024-01-08T16:15:44.750", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds read when triggered via the GUI's legacy VCD parsing code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37444.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37444.json new file mode 100644 index 00000000000..5b1bcee71da --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37444.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37444", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:16.700", + "lastModified": "2024-01-08T16:15:44.823", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds read when triggered via the GUI's interactive VCD parsing code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37445.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37445.json new file mode 100644 index 00000000000..edf8e0ce3a2 --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37445.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37445", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:16.910", + "lastModified": "2024-01-08T16:15:44.890", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2vzt conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37446.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37446.json new file mode 100644 index 00000000000..bf93863d096 --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37446.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37446", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:17.100", + "lastModified": "2024-01-08T16:15:44.960", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2lxt2 conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37447.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37447.json new file mode 100644 index 00000000000..5351df2d5fb --- /dev/null +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37447.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37447", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:17.290", + "lastModified": "2024-01-08T16:15:45.037", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds read vulnerabilities exist in the VCD var definition section functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the vcd2lxt conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1805", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37573.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37573.json new file mode 100644 index 00000000000..5813b12bf62 --- /dev/null +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37573.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37573", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:17.473", + "lastModified": "2024-01-08T16:15:45.103", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the GUI's recoder (default) VCD parsing code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37574.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37574.json new file mode 100644 index 00000000000..652e5c36d57 --- /dev/null +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37574.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37574", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:17.667", + "lastModified": "2024-01-08T16:15:45.173", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the GUI's legacy VCD parsing code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37575.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37575.json new file mode 100644 index 00000000000..7a89efcc7dc --- /dev/null +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37575.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37575", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:17.860", + "lastModified": "2024-01-08T16:15:45.243", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the GUI's interactive VCD parsing code." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37576.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37576.json new file mode 100644 index 00000000000..092e3d6e8ff --- /dev/null +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37576.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37576", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:18.050", + "lastModified": "2024-01-08T16:15:45.323", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the vcd2vzt conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37577.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37577.json new file mode 100644 index 00000000000..c6cd4dfcb61 --- /dev/null +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37577.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37577", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:18.233", + "lastModified": "2024-01-08T16:15:45.390", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the vcd2lxt2 conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37578.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37578.json new file mode 100644 index 00000000000..9052e0c2c68 --- /dev/null +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37578.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37578", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:18.413", + "lastModified": "2024-01-08T16:15:45.457", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the vcd2lxt conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1806", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37921.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37921.json new file mode 100644 index 00000000000..c2a13dd269b --- /dev/null +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37921.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37921", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:18.610", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple arbitrary write vulnerabilities exist in the VCD sorted bsearch functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the arbitrary write when triggered via the vcd2vzt conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-118" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1807", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1807", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37922.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37922.json new file mode 100644 index 00000000000..de0930990f7 --- /dev/null +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37922.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37922", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:18.800", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple arbitrary write vulnerabilities exist in the VCD sorted bsearch functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the arbitrary write when triggered via the vcd2lxt2 conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-118" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1807", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1807", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37923.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37923.json new file mode 100644 index 00000000000..154c6881686 --- /dev/null +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37923.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-37923", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:18.980", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple arbitrary write vulnerabilities exist in the VCD sorted bsearch functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the arbitrary write when triggered via the vcd2lxt conversion utility." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-118" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1807", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1807", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38583.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38583.json new file mode 100644 index 00000000000..0407febbc18 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38583.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38583", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:19.187", + "lastModified": "2024-01-08T16:15:45.527", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow vulnerability exists in the LXT2 lxt2_rd_expand_integer_to_bits function of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1827", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1827", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38618.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38618.json new file mode 100644 index 00000000000..523daa55d05 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38618.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38618", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:19.383", + "lastModified": "2024-01-08T16:15:45.600", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `rows` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38619.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38619.json new file mode 100644 index 00000000000..6a38a765f87 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38619.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38619", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:19.630", + "lastModified": "2024-01-08T16:15:45.667", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `msb` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38620.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38620.json new file mode 100644 index 00000000000..065603bbb3b --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38620.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38620", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:19.873", + "lastModified": "2024-01-08T16:15:45.733", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `lsb` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38621.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38621.json new file mode 100644 index 00000000000..0bb0efc2534 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38621.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38621", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:20.173", + "lastModified": "2024-01-08T16:15:45.810", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `flags` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38622.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38622.json new file mode 100644 index 00000000000..d850c5da7cf --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38622.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38622", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:20.430", + "lastModified": "2024-01-08T16:15:45.880", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `len` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38623.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38623.json new file mode 100644 index 00000000000..a881c9ed514 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38623.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38623", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:20.680", + "lastModified": "2024-01-08T16:15:45.950", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `vindex_offset` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1812", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38648.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38648.json new file mode 100644 index 00000000000..defc128d8d3 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38648.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38648", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:20.990", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_get_facname decompression functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the prefix copy loop." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1813", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1813", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38649.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38649.json new file mode 100644 index 00000000000..c3eed18dbe9 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38649.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38649", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:21.203", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_get_facname decompression functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the string copy loop." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1813", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1813", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38650.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38650.json new file mode 100644 index 00000000000..0398b794b50 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38650.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38650", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:21.387", + "lastModified": "2024-01-08T16:15:46.023", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode times parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is not zero." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1814", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38651.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38651.json new file mode 100644 index 00000000000..2b5c0e39c2a --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38651.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38651", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:21.583", + "lastModified": "2024-01-08T16:15:46.093", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode times parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is zero." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1814", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38652.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38652.json new file mode 100644 index 00000000000..d4f008aa576 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38652.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38652", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:21.987", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode dict parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is not zero." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1815", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1815", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38653.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38653.json new file mode 100644 index 00000000000..b33fe4661a9 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38653.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38653", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:22.190", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode dict parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is zero." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1815", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1815", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38657.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38657.json new file mode 100644 index 00000000000..b6b240dcf74 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38657.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-38657", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:22.390", + "lastModified": "2024-01-08T16:15:46.163", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write vulnerability exists in the LXT2 zlib block decompression functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1823", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1823", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39234.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39234.json new file mode 100644 index 00000000000..144c3a11b7d --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39234.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39234", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:22.593", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_process_block autosort functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when looping over `lt->numrealfacs`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1817", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1817", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39235.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39235.json new file mode 100644 index 00000000000..79c903b4b4e --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39235.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39235", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:22.790", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_process_block autosort functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when looping over `lt->num_time_ticks`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1817", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1817", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39270.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39270.json new file mode 100644 index 00000000000..a26b60719d9 --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39270.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39270", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:22.980", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `rows` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39271.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39271.json new file mode 100644 index 00000000000..4cb9a906c0c --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39271.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39271", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:23.163", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `msb` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39272.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39272.json new file mode 100644 index 00000000000..c71a8e06d7f --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39272.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39272", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:23.357", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `lsb` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39273.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39273.json new file mode 100644 index 00000000000..1c2e2823a80 --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39273.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39273", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:23.557", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `flags` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39274.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39274.json new file mode 100644 index 00000000000..4dcb7580cac --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39274.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39274", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:23.750", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `len` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39275.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39275.json new file mode 100644 index 00000000000..ec16c7e322c --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39275.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39275", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:23.937", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the LXT2 facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `value` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1818", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39316.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39316.json new file mode 100644 index 00000000000..f53d9eea532 --- /dev/null +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39316.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39316", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:24.127", + "lastModified": "2024-01-08T16:15:46.237", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the LXT2 num_dict_entries functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `string_pointers` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1820", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1820", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39317.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39317.json new file mode 100644 index 00000000000..3f1735b6d09 --- /dev/null +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39317.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39317", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:24.330", + "lastModified": "2024-01-08T16:15:46.333", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer overflow vulnerabilities exist in the LXT2 num_dict_entries functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `string_lens` array." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1820", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1820", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39413.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39413.json new file mode 100644 index 00000000000..8784d27b4da --- /dev/null +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39413.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39413", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:24.517", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_iter_radix shift operation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer underflow when performing the left shift operation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1824", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1824", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39414.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39414.json new file mode 100644 index 00000000000..1c4aefb028f --- /dev/null +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39414.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39414", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:24.710", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_iter_radix shift operation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer underflow when performing the right shift operation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1824", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1824", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39443.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39443.json new file mode 100644 index 00000000000..e4cb6efdce8 --- /dev/null +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39443.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39443", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:24.897", + "lastModified": "2024-01-08T16:15:46.417", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing functionality of GTKWave 3.3.115. A specially-crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the prefix copy loop." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1826", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39444.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39444.json new file mode 100644 index 00000000000..d34ffef094d --- /dev/null +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39444.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-39444", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:25.090", + "lastModified": "2024-01-08T16:15:46.493", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing functionality of GTKWave 3.3.115. A specially-crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the string copy loop." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1826", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47211.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47211.json new file mode 100644 index 00000000000..d318f2e329d --- /dev/null +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47211.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-47211", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-01-08T15:15:25.287", + "lastModified": "2024-01-08T16:15:46.600", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.manageengine.com/itom/advisory/cve-2023-47211.html", + "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1851", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50714.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50714.json index 626d8cc73c5..b32a2368274 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50714.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50714.json @@ -2,16 +2,40 @@ "id": "CVE-2023-50714", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T19:15:09.057", - "lastModified": "2023-12-22T20:32:25.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-08T15:12:05.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "yii2-authclient is an extension that adds OpenID, OAuth, OAuth2 and OpenId Connect consumers for the Yii framework 2.0. In yii2-authclient prior to version 2.2.15, the Oauth2 PKCE implementation is vulnerable in 2 ways. First, the `authCodeVerifier` should be removed after usage (similar to `authState`). Second, there is a risk for a `downgrade attack` if PKCE is being relied on for CSRF protection. Version 2.2.15 contains a patch for the issue. No known workarounds are available." + }, + { + "lang": "es", + "value": "yii2-authclient es una extensi\u00f3n que agrega consumidores OpenID, OAuth, OAuth2 y OpenId Connect para el framework Yii 2.0. En yii2-authclient anterior a la versi\u00f3n 2.2.15, la implementaci\u00f3n de Oauth2 PKCE es vulnerable de 2 maneras. Primero, \"authCodeVerifier\" debe eliminarse despu\u00e9s de su uso (similar a \"authState\"). En segundo lugar, existe el riesgo de un \"downgrade attack\" si se conf\u00eda en PKCE para la protecci\u00f3n CSRF. La versi\u00f3n 2.2.15 contiene un parche para el problema. No hay workarounds disponibles." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,26 +84,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yiiframework:yii2-authclient:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.15", + "matchCriteriaId": "AA4F5AF6-EA08-40F8-9C22-EA09F0653F11" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth1.php#L158", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth2.php#L121", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OpenIdConnect.php#L420", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/yiisoft/yii2-authclient/commit/721ed974bc44137437b0cdc8454e137fff8db213", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/yiisoft/yii2-authclient/security/advisories/GHSA-rw54-6826-c8j5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50928.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50928.json index 69eff8c2559..b32a8bd6eb3 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50928.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50928.json @@ -2,16 +2,40 @@ "id": "CVE-2023-50928", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:08.580", - "lastModified": "2023-12-25T03:08:20.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-08T15:23:00.327", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "\"Sandbox Accounts for Events\" provides multiple, temporary AWS accounts to a number of authenticated users simultaneously via a browser-based GUI. Authenticated users could potentially claim and access empty AWS accounts by sending request payloads to the account API containing non-existent event ids and self-defined budget & duration. This issue only affects cleaned AWS accounts, it is not possible to access AWS accounts in use or existing data/infrastructure. This issue has been patched in version 1.1.0." + }, + { + "lang": "es", + "value": "Sandbox Accounts for Events proporciona m\u00faltiples cuentas temporales de AWS a varios usuarios autenticados simult\u00e1neamente a trav\u00e9s de una GUI basada en navegador. Los usuarios autenticados podr\u00edan reclamar y acceder a cuentas vac\u00edas de AWS enviando payloads de solicitud a la API de la cuenta que contienen identificadores de eventos inexistentes y un presupuesto y una duraci\u00f3n autodefinidos. Este problema solo afecta a las cuentas de AWS limpiadas; no es posible acceder a las cuentas de AWS en uso ni a los datos/infraestructura existentes. Este problema se solucion\u00f3 en la versi\u00f3n 1.1.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +70,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amazon:awslabs_sandbox_accounts_for_events:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.0", + "matchCriteriaId": "BC15DDF8-BE84-4B47-A804-CEF17DCC9722" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/awslabs/sandbox-accounts-for-events/commit/f30a0662f0a28734eb33c5868cccc1c319eb6e79", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/awslabs/sandbox-accounts-for-events/security/advisories/GHSA-cg8w-7q5v-g32r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51421.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51421.json index 12e353a7412..fbb225f54fd 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51421.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51421.json @@ -2,16 +2,40 @@ "id": "CVE-2023-51421", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-29T14:15:47.270", - "lastModified": "2023-12-29T14:46:03.957", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-08T15:02:55.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Soft8Soft LLC Verge3D Publishing and E-Commerce.This issue affects Verge3D Publishing and E-Commerce: from n/a through 4.5.2.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga sin restricciones de archivos con tipo peligroso en Soft8Soft LLC Verge3D Publishing and E-Commerce. Este problema afecta a Verge3D Publishing and E-Commerce: desde n/a hasta 4.5.2." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:soft8soft:verge3d:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.5.2", + "matchCriteriaId": "9D565E60-6E22-49FD-9F8C-7BC270B31BEC" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/verge3d/wordpress-verge3d-plugin-4-5-2-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51443.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51443.json index fb50c82204a..c973ed94f0b 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51443.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51443.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51443", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-27T17:15:08.093", - "lastModified": "2024-01-04T16:57:57.387", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-08T16:15:46.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -89,6 +89,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/signalwire/freeswitch/commit/86cbda90b84ba186e508fbc7bfae469270a97d11", "source": "security-advisories@github.com", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51701.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51701.json index 38eaabd7b18..e5997da8556 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51701.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51701.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51701", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-08T14:15:46.677", - "lastModified": "2024-01-08T14:15:46.677", - "vulnStatus": "Received", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6000.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6000.json index 47d2f3d33c9..2f1981540f7 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6000.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6000.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6000", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-01T15:15:43.100", - "lastModified": "2024-01-02T13:47:38.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-08T15:14:56.640", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,18 +11,79 @@ }, { "lang": "es", - "value": "Popup Builder WordPress plugin anterior a 4.2.3 no impide que los visitantes simples actualicen las ventanas emergentes existentes e inyecten JavaScript sin formato en ellas, lo que podr\u00eda provocar ataques XSS almacenados." + "value": "El complemento Popup Builder de WordPress anterior a 4.2.3 no impide que los visitantes simples actualicen las ventanas emergentes existentes e inyecten JavaScript sin formato en ellas, lo que podr\u00eda provocar ataques XSS almacenados." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.3", + "matchCriteriaId": "7BF7560F-8435-4BB5-9FC7-85C706B4FEB4" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://wpscan.com/blog/stored-xss-fixed-in-popup-builder-4-2-3/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/cdb3a8bd-4ee0-4ce0-9029-0490273bcfc8", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6037.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6037.json index bfecf5aabf5..aab65b798da 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6037.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6037.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6037", "sourceIdentifier": "contact@wpscan.com", "published": "2024-01-01T15:15:43.147", - "lastModified": "2024-01-02T13:47:38.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-08T15:06:29.210", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,14 +11,71 @@ }, { "lang": "es", - "value": "WP TripAdvisor Review Slider WordPress plugin anterior a 11.9 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." + "value": "El complemento WP TripAdvisor Review Slider de WordPress anterior a 11.9 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ljapps:wp_tripadvisor_review_slider:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "11.9", + "matchCriteriaId": "6F57AC24-433B-4346-A77A-F07252E6A87B" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://wpscan.com/vulnerability/753df046-9fd7-4d15-9114-45cde6d6539b", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6552.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6552.json index 4291bcf2817..70abe1269e4 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6552.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6552.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6552", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-08T13:15:09.257", - "lastModified": "2024-01-08T13:15:09.257", - "vulnStatus": "Received", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6560.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6560.json index cb2180966ef..79adfd1bb56 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6560.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6560.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6560", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-09T00:15:07.877", - "lastModified": "2023-12-14T03:15:36.360", + "lastModified": "2024-01-08T16:15:46.783", "vulnStatus": "Modified", "descriptions": [ { @@ -119,6 +119,10 @@ } ], "references": [ + { + "url": "http://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6560", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6921.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6921.json index 1364f7363e8..d2febc37a88 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6921.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6921.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6921", "sourceIdentifier": "cvd@cert.pl", "published": "2024-01-08T12:15:46.513", - "lastModified": "2024-01-08T12:15:46.513", - "vulnStatus": "Received", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7224.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7224.json index 2c46ab10bec..1c0dc44b254 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7224.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7224.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7224", "sourceIdentifier": "security@openvpn.net", "published": "2024-01-08T14:15:47.130", - "lastModified": "2024-01-08T14:15:47.130", - "vulnStatus": "Received", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0321.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0321.json index ad8072f81a9..4c37a21972e 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0321.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0321", "sourceIdentifier": "security@huntr.dev", "published": "2024-01-08T13:15:09.347", - "lastModified": "2024-01-08T13:15:09.347", - "vulnStatus": "Received", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0322.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0322.json index 46b8193f113..252cc6e7c63 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0322.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0322.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0322", "sourceIdentifier": "security@huntr.dev", "published": "2024-01-08T13:15:09.557", - "lastModified": "2024-01-08T13:15:09.557", - "vulnStatus": "Received", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21644.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21644.json index 8a16574e7e3..a84d53948d2 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21644.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21644.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21644", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-08T14:15:47.217", - "lastModified": "2024-01-08T14:15:47.217", - "vulnStatus": "Received", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21645.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21645.json index 220afd876c4..8c5d11b7903 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21645.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21645.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21645", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-08T14:15:47.420", - "lastModified": "2024-01-08T14:15:47.420", - "vulnStatus": "Received", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21647.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21647.json index 5bef2096d42..3787cef5709 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21647.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21647.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21647", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-08T14:15:47.640", - "lastModified": "2024-01-08T14:15:47.640", - "vulnStatus": "Received", + "lastModified": "2024-01-08T15:27:36.193", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21650.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21650.json new file mode 100644 index 00000000000..6a9fbd5d424 --- /dev/null +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21650.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-21650", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-01-08T16:15:46.903", + "lastModified": "2024-01-08T16:15:46.903", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to a remote code execution (RCE) attack through its user registration feature. This issue allows an attacker to execute arbitrary code by crafting malicious payloads in the \"first name\" or \"last name\" fields during user registration. This impacts all installations that have user registration enabled for guests. This vulnerability has been patched in XWiki 14.10.17, 15.5.3 and 15.8 RC1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-95" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/b290bfd573c6f7db6cc15a88dd4111d9fcad0d31", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rj7p-xjv7-7229", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-21173", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 8e402e66684..5cc23ab8df7 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-08T15:00:24.957880+00:00 +2024-01-08T17:00:24.988335+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-08T14:58:32.780000+00:00 +2024-01-08T16:15:46.903000+00:00 ``` ### Last Data Feed Release @@ -29,42 +29,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -235044 +235128 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `84` -* [CVE-2023-6552](CVE-2023/CVE-2023-65xx/CVE-2023-6552.json) (`2024-01-08T13:15:09.257`) -* [CVE-2023-51701](CVE-2023/CVE-2023-517xx/CVE-2023-51701.json) (`2024-01-08T14:15:46.677`) -* [CVE-2023-7224](CVE-2023/CVE-2023-72xx/CVE-2023-7224.json) (`2024-01-08T14:15:47.130`) -* [CVE-2024-0321](CVE-2024/CVE-2024-03xx/CVE-2024-0321.json) (`2024-01-08T13:15:09.347`) -* [CVE-2024-0322](CVE-2024/CVE-2024-03xx/CVE-2024-0322.json) (`2024-01-08T13:15:09.557`) -* [CVE-2024-21644](CVE-2024/CVE-2024-216xx/CVE-2024-21644.json) (`2024-01-08T14:15:47.217`) -* [CVE-2024-21645](CVE-2024/CVE-2024-216xx/CVE-2024-21645.json) (`2024-01-08T14:15:47.420`) -* [CVE-2024-21647](CVE-2024/CVE-2024-216xx/CVE-2024-21647.json) (`2024-01-08T14:15:47.640`) +* [CVE-2023-37445](CVE-2023/CVE-2023-374xx/CVE-2023-37445.json) (`2024-01-08T15:15:16.910`) +* [CVE-2023-37446](CVE-2023/CVE-2023-374xx/CVE-2023-37446.json) (`2024-01-08T15:15:17.100`) +* [CVE-2023-37447](CVE-2023/CVE-2023-374xx/CVE-2023-37447.json) (`2024-01-08T15:15:17.290`) +* [CVE-2023-37573](CVE-2023/CVE-2023-375xx/CVE-2023-37573.json) (`2024-01-08T15:15:17.473`) +* [CVE-2023-37574](CVE-2023/CVE-2023-375xx/CVE-2023-37574.json) (`2024-01-08T15:15:17.667`) +* [CVE-2023-37575](CVE-2023/CVE-2023-375xx/CVE-2023-37575.json) (`2024-01-08T15:15:17.860`) +* [CVE-2023-37576](CVE-2023/CVE-2023-375xx/CVE-2023-37576.json) (`2024-01-08T15:15:18.050`) +* [CVE-2023-37577](CVE-2023/CVE-2023-375xx/CVE-2023-37577.json) (`2024-01-08T15:15:18.233`) +* [CVE-2023-37578](CVE-2023/CVE-2023-375xx/CVE-2023-37578.json) (`2024-01-08T15:15:18.413`) +* [CVE-2023-38583](CVE-2023/CVE-2023-385xx/CVE-2023-38583.json) (`2024-01-08T15:15:19.187`) +* [CVE-2023-38618](CVE-2023/CVE-2023-386xx/CVE-2023-38618.json) (`2024-01-08T15:15:19.383`) +* [CVE-2023-38619](CVE-2023/CVE-2023-386xx/CVE-2023-38619.json) (`2024-01-08T15:15:19.630`) +* [CVE-2023-38620](CVE-2023/CVE-2023-386xx/CVE-2023-38620.json) (`2024-01-08T15:15:19.873`) +* [CVE-2023-38621](CVE-2023/CVE-2023-386xx/CVE-2023-38621.json) (`2024-01-08T15:15:20.173`) +* [CVE-2023-38622](CVE-2023/CVE-2023-386xx/CVE-2023-38622.json) (`2024-01-08T15:15:20.430`) +* [CVE-2023-38623](CVE-2023/CVE-2023-386xx/CVE-2023-38623.json) (`2024-01-08T15:15:20.680`) +* [CVE-2023-38650](CVE-2023/CVE-2023-386xx/CVE-2023-38650.json) (`2024-01-08T15:15:21.387`) +* [CVE-2023-38651](CVE-2023/CVE-2023-386xx/CVE-2023-38651.json) (`2024-01-08T15:15:21.583`) +* [CVE-2023-38657](CVE-2023/CVE-2023-386xx/CVE-2023-38657.json) (`2024-01-08T15:15:22.390`) +* [CVE-2023-39316](CVE-2023/CVE-2023-393xx/CVE-2023-39316.json) (`2024-01-08T15:15:24.127`) +* [CVE-2023-39317](CVE-2023/CVE-2023-393xx/CVE-2023-39317.json) (`2024-01-08T15:15:24.330`) +* [CVE-2023-39443](CVE-2023/CVE-2023-394xx/CVE-2023-39443.json) (`2024-01-08T15:15:24.897`) +* [CVE-2023-39444](CVE-2023/CVE-2023-394xx/CVE-2023-39444.json) (`2024-01-08T15:15:25.090`) +* [CVE-2023-47211](CVE-2023/CVE-2023-472xx/CVE-2023-47211.json) (`2024-01-08T15:15:25.287`) +* [CVE-2024-21650](CVE-2024/CVE-2024-216xx/CVE-2024-21650.json) (`2024-01-08T16:15:46.903`) ### CVEs modified in the last Commit -Recently modified CVEs: `15` +Recently modified CVEs: `16` -* [CVE-2018-25096](CVE-2018/CVE-2018-250xx/CVE-2018-25096.json) (`2024-01-08T14:53:38.617`) -* [CVE-2022-46486](CVE-2022/CVE-2022-464xx/CVE-2022-46486.json) (`2024-01-08T14:20:14.670`) -* [CVE-2023-31302](CVE-2023/CVE-2023-313xx/CVE-2023-31302.json) (`2024-01-08T13:04:07.097`) -* [CVE-2023-7173](CVE-2023/CVE-2023-71xx/CVE-2023-7173.json) (`2024-01-08T13:46:32.740`) -* [CVE-2023-7172](CVE-2023/CVE-2023-71xx/CVE-2023-7172.json) (`2024-01-08T13:53:41.707`) -* [CVE-2023-6710](CVE-2023/CVE-2023-67xx/CVE-2023-6710.json) (`2024-01-08T14:15:46.957`) -* [CVE-2023-52240](CVE-2023/CVE-2023-522xx/CVE-2023-52240.json) (`2024-01-08T14:32:47.203`) -* [CVE-2023-7175](CVE-2023/CVE-2023-71xx/CVE-2023-7175.json) (`2024-01-08T14:38:08.007`) -* [CVE-2023-51079](CVE-2023/CVE-2023-510xx/CVE-2023-51079.json) (`2024-01-08T14:38:55.560`) -* [CVE-2023-52180](CVE-2023/CVE-2023-521xx/CVE-2023-52180.json) (`2024-01-08T14:46:37.220`) -* [CVE-2023-50550](CVE-2023/CVE-2023-505xx/CVE-2023-50550.json) (`2024-01-08T14:58:32.780`) -* [CVE-2024-0192](CVE-2024/CVE-2024-01xx/CVE-2024-0192.json) (`2024-01-08T13:54:59.710`) -* [CVE-2024-0191](CVE-2024/CVE-2024-01xx/CVE-2024-0191.json) (`2024-01-08T13:55:46.670`) -* [CVE-2024-0190](CVE-2024/CVE-2024-01xx/CVE-2024-0190.json) (`2024-01-08T13:56:00.663`) -* [CVE-2024-0189](CVE-2024/CVE-2024-01xx/CVE-2024-0189.json) (`2024-01-08T13:56:09.703`) +* [CVE-2023-51421](CVE-2023/CVE-2023-514xx/CVE-2023-51421.json) (`2024-01-08T15:02:55.727`) +* [CVE-2023-6037](CVE-2023/CVE-2023-60xx/CVE-2023-6037.json) (`2024-01-08T15:06:29.210`) +* [CVE-2023-50714](CVE-2023/CVE-2023-507xx/CVE-2023-50714.json) (`2024-01-08T15:12:05.227`) +* [CVE-2023-6000](CVE-2023/CVE-2023-60xx/CVE-2023-6000.json) (`2024-01-08T15:14:56.640`) +* [CVE-2023-50928](CVE-2023/CVE-2023-509xx/CVE-2023-50928.json) (`2024-01-08T15:23:00.327`) +* [CVE-2023-6921](CVE-2023/CVE-2023-69xx/CVE-2023-6921.json) (`2024-01-08T15:27:36.193`) +* [CVE-2023-6552](CVE-2023/CVE-2023-65xx/CVE-2023-6552.json) (`2024-01-08T15:27:36.193`) +* [CVE-2023-51701](CVE-2023/CVE-2023-517xx/CVE-2023-51701.json) (`2024-01-08T15:27:36.193`) +* [CVE-2023-7224](CVE-2023/CVE-2023-72xx/CVE-2023-7224.json) (`2024-01-08T15:27:36.193`) +* [CVE-2023-51443](CVE-2023/CVE-2023-514xx/CVE-2023-51443.json) (`2024-01-08T16:15:46.677`) +* [CVE-2023-6560](CVE-2023/CVE-2023-65xx/CVE-2023-6560.json) (`2024-01-08T16:15:46.783`) +* [CVE-2024-0321](CVE-2024/CVE-2024-03xx/CVE-2024-0321.json) (`2024-01-08T15:27:36.193`) +* [CVE-2024-0322](CVE-2024/CVE-2024-03xx/CVE-2024-0322.json) (`2024-01-08T15:27:36.193`) +* [CVE-2024-21644](CVE-2024/CVE-2024-216xx/CVE-2024-21644.json) (`2024-01-08T15:27:36.193`) +* [CVE-2024-21645](CVE-2024/CVE-2024-216xx/CVE-2024-21645.json) (`2024-01-08T15:27:36.193`) +* [CVE-2024-21647](CVE-2024/CVE-2024-216xx/CVE-2024-21647.json) (`2024-01-08T15:27:36.193`) ## Download and Usage