From ce063f05d96c4b03168c1952edca9d04151650e3 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 11 Oct 2023 16:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-10-11T16:00:24.797103+00:00 --- CVE-1999/CVE-1999-11xx/CVE-1999-1170.json | 10 +-- CVE-1999/CVE-1999-11xx/CVE-1999-1171.json | 10 +-- CVE-2001/CVE-2001-10xx/CVE-2001-1021.json | 6 +- CVE-2002/CVE-2002-08xx/CVE-2002-0826.json | 6 +- CVE-2003/CVE-2003-07xx/CVE-2003-0772.json | 10 ++- CVE-2004/CVE-2004-16xx/CVE-2004-1643.json | 14 ++- CVE-2004/CVE-2004-18xx/CVE-2004-1848.json | 86 ++++++++++-------- CVE-2004/CVE-2004-18xx/CVE-2004-1883.json | 13 ++- CVE-2004/CVE-2004-18xx/CVE-2004-1884.json | 83 +++++++++-------- CVE-2004/CVE-2004-18xx/CVE-2004-1885.json | 14 ++- CVE-2006/CVE-2006-48xx/CVE-2006-4847.json | 98 ++++++++++++--------- CVE-2006/CVE-2006-50xx/CVE-2006-5000.json | 6 +- CVE-2006/CVE-2006-50xx/CVE-2006-5001.json | 10 +-- CVE-2008/CVE-2008-05xx/CVE-2008-0590.json | 13 ++- CVE-2019/CVE-2019-121xx/CVE-2019-12143.json | 6 +- CVE-2021/CVE-2021-240xx/CVE-2021-24002.json | 4 +- CVE-2022/CVE-2022-258xx/CVE-2022-25852.json | 4 +- CVE-2022/CVE-2022-276xx/CVE-2022-27665.json | 6 +- CVE-2022/CVE-2022-48xx/CVE-2022-4864.json | 4 +- CVE-2023/CVE-2023-14xx/CVE-2023-1437.json | 34 +++++-- CVE-2023/CVE-2023-283xx/CVE-2023-28321.json | 6 +- CVE-2023/CVE-2023-349xx/CVE-2023-34985.json | 67 +++++++++++++- CVE-2023/CVE-2023-349xx/CVE-2023-34986.json | 67 +++++++++++++- CVE-2023/CVE-2023-349xx/CVE-2023-34987.json | 67 +++++++++++++- CVE-2023/CVE-2023-349xx/CVE-2023-34988.json | 67 +++++++++++++- CVE-2023/CVE-2023-349xx/CVE-2023-34989.json | 67 +++++++++++++- CVE-2023/CVE-2023-349xx/CVE-2023-34993.json | 67 +++++++++++++- CVE-2023/CVE-2023-365xx/CVE-2023-36547.json | 67 +++++++++++++- CVE-2023/CVE-2023-365xx/CVE-2023-36548.json | 67 +++++++++++++- CVE-2023/CVE-2023-365xx/CVE-2023-36549.json | 67 +++++++++++++- CVE-2023/CVE-2023-365xx/CVE-2023-36550.json | 67 +++++++++++++- CVE-2023/CVE-2023-375xx/CVE-2023-37538.json | 4 +- CVE-2023/CVE-2023-441xx/CVE-2023-44105.json | 4 +- CVE-2023/CVE-2023-441xx/CVE-2023-44107.json | 4 +- CVE-2023/CVE-2023-441xx/CVE-2023-44108.json | 4 +- CVE-2023/CVE-2023-441xx/CVE-2023-44114.json | 4 +- CVE-2023/CVE-2023-441xx/CVE-2023-44116.json | 4 +- CVE-2023/CVE-2023-441xx/CVE-2023-44118.json | 4 +- CVE-2023/CVE-2023-441xx/CVE-2023-44119.json | 4 +- CVE-2023/CVE-2023-449xx/CVE-2023-44981.json | 6 +- CVE-2023/CVE-2023-453xx/CVE-2023-45396.json | 20 +++++ CVE-2023/CVE-2023-49xx/CVE-2023-4957.json | 55 ++++++++++++ CVE-2023/CVE-2023-52xx/CVE-2023-5233.json | 58 ++++++++++-- README.md | 87 +++++++----------- 44 files changed, 1088 insertions(+), 283 deletions(-) create mode 100644 CVE-2023/CVE-2023-453xx/CVE-2023-45396.json create mode 100644 CVE-2023/CVE-2023-49xx/CVE-2023-4957.json diff --git a/CVE-1999/CVE-1999-11xx/CVE-1999-1170.json b/CVE-1999/CVE-1999-11xx/CVE-1999-1170.json index 0e56b88be51..fd4a2d20703 100644 --- a/CVE-1999/CVE-1999-11xx/CVE-1999-1170.json +++ b/CVE-1999/CVE-1999-11xx/CVE-1999-1170.json @@ -2,7 +2,7 @@ "id": "CVE-1999-1170", "sourceIdentifier": "cve@mitre.org", "published": "1999-01-02T05:00:00.000", - "lastModified": "2019-08-13T14:39:21.853", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -63,13 +63,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF69630-9F18-4DDE-81B3-7F37DB8F4498" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*", + "matchCriteriaId": "D9BE1954-74C5-4A91-9C9A-C0647F281017" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*", - "matchCriteriaId": "097FBE5A-56F2-4D49-9188-9AC0AAF43FA3" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*", + "matchCriteriaId": "3DE6789D-5DA5-489F-A900-F4788286ACE5" } ] } diff --git a/CVE-1999/CVE-1999-11xx/CVE-1999-1171.json b/CVE-1999/CVE-1999-11xx/CVE-1999-1171.json index fe61a6aa7ed..38b3d44427e 100644 --- a/CVE-1999/CVE-1999-11xx/CVE-1999-1171.json +++ b/CVE-1999/CVE-1999-11xx/CVE-1999-1171.json @@ -2,7 +2,7 @@ "id": "CVE-1999-1171", "sourceIdentifier": "cve@mitre.org", "published": "1999-02-02T05:00:00.000", - "lastModified": "2019-08-13T14:39:21.853", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -63,13 +63,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF69630-9F18-4DDE-81B3-7F37DB8F4498" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*", + "matchCriteriaId": "D9BE1954-74C5-4A91-9C9A-C0647F281017" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*", - "matchCriteriaId": "097FBE5A-56F2-4D49-9188-9AC0AAF43FA3" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*", + "matchCriteriaId": "3DE6789D-5DA5-489F-A900-F4788286ACE5" } ] } diff --git a/CVE-2001/CVE-2001-10xx/CVE-2001-1021.json b/CVE-2001/CVE-2001-10xx/CVE-2001-1021.json index efeef64f1c2..fbc71e8491e 100644 --- a/CVE-2001/CVE-2001-10xx/CVE-2001-1021.json +++ b/CVE-2001/CVE-2001-10xx/CVE-2001-1021.json @@ -2,7 +2,7 @@ "id": "CVE-2001-1021", "sourceIdentifier": "cve@mitre.org", "published": "2001-07-26T04:00:00.000", - "lastModified": "2019-08-13T14:39:34.857", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43" } ] } diff --git a/CVE-2002/CVE-2002-08xx/CVE-2002-0826.json b/CVE-2002/CVE-2002-08xx/CVE-2002-0826.json index adc287ee4b0..8310602fa5f 100644 --- a/CVE-2002/CVE-2002-08xx/CVE-2002-0826.json +++ b/CVE-2002/CVE-2002-08xx/CVE-2002-0826.json @@ -2,7 +2,7 @@ "id": "CVE-2002-0826", "sourceIdentifier": "cve@mitre.org", "published": "2002-08-12T04:00:00.000", - "lastModified": "2019-08-13T14:39:45.153", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Analyzed", "descriptions": [ { @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14" } ] } diff --git a/CVE-2003/CVE-2003-07xx/CVE-2003-0772.json b/CVE-2003/CVE-2003-07xx/CVE-2003-0772.json index 80714b93aa2..52994577355 100644 --- a/CVE-2003/CVE-2003-07xx/CVE-2003-0772.json +++ b/CVE-2003/CVE-2003-07xx/CVE-2003-0772.json @@ -2,7 +2,7 @@ "id": "CVE-2003-0772", "sourceIdentifier": "cve@mitre.org", "published": "2003-09-22T04:00:00.000", - "lastModified": "2019-08-13T14:39:50.873", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -67,8 +67,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058" } ] } @@ -80,6 +80,10 @@ "url": "http://marc.info/?l=bugtraq&m=106288825902868&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/9671", + "source": "cve@mitre.org" + }, { "url": "http://www.kb.cert.org/vuls/id/219140", "source": "cve@mitre.org", diff --git a/CVE-2004/CVE-2004-16xx/CVE-2004-1643.json b/CVE-2004/CVE-2004-16xx/CVE-2004-1643.json index 9e4c998fd40..191b7a8cccb 100644 --- a/CVE-2004/CVE-2004-16xx/CVE-2004-1643.json +++ b/CVE-2004/CVE-2004-16xx/CVE-2004-1643.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1643", "sourceIdentifier": "cve@mitre.org", "published": "2004-08-29T04:00:00.000", - "lastModified": "2019-08-13T14:39:57.590", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2603E3E5-FF48-4C37-B4F4-5152561C5D59" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "ED4F7DAA-DB7C-4CCC-9521-131FEFC776FD" } ] } @@ -71,6 +71,14 @@ "url": "http://marc.info/?l=bugtraq&m=109389890712888&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/12406", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/11065", "source": "cve@mitre.org", diff --git a/CVE-2004/CVE-2004-18xx/CVE-2004-1848.json b/CVE-2004/CVE-2004-18xx/CVE-2004-1848.json index 25ec911f3ef..747f46535e9 100644 --- a/CVE-2004/CVE-2004-18xx/CVE-2004-1848.json +++ b/CVE-2004/CVE-2004-18xx/CVE-2004-1848.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1848", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2019-08-13T14:39:55.530", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -68,93 +68,93 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A6286D79-17FC-4520-AE4E-CF2FEFB75DC4" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A886D80F-D72C-4BDF-A65F-27CA82348C48" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "BB026283-A9A2-4034-B843-C10E025637EB" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4A0D7240-62C8-4003-A840-98E818709D9B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "FB2CD59D-63E0-4C15-A304-3444B55C8330" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "BA99A58B-F751-4C04-B41B-CBE94998AA42" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B13F54CE-66AB-491D-A5DB-4AD5F257CB74" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "51D8225C-A74A-451E-9589-F1E00E4728D3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "82E9F743-E294-4F82-9A0E-BC9943278A60" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "3C3438AF-FCF1-4D77-83D5-27B9989F0683" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "069B9D3F-936D-497B-8162-1093874D5AC5" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "843B6647-BF92-46D1-ADEE-92088D9AD1C4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BAEC6109-1152-4DD0-AC37-C571500887E2" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A4B80A25-3860-4CF5-B8ED-5370EBB42455" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "6CF61E52-FF34-4557-9D4A-63030445743F" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "50BE9ECB-4799-48BD-B3BE-7EE27FE3AA40" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "79A8A663-F60A-4425-BFB1-40C132B9E899" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBC59D2-405D-4374-812A-A3AEE0D6D594" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "47A96076-3BBA-45DC-9AF4-0F4A8DD3629F" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "755C3FB5-5D5B-4732-86F9-68A6612BC819" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DD94DE9-9ECB-48C5-877B-9B3CBA327A6D" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "968C0544-A2F5-4FA6-A4B8-89113EE95B0A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "31B7C4D4-E347-40C0-8D09-CFB42AEA136D" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D9D662A9-5D1B-465E-A4B1-A4C86BA207C7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AC3F7672-4435-4968-A186-7541B742A00C" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "FBA7690C-8ADA-462E-B671-4D4CB243A483" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5180850E-BA34-470D-807B-6D91DB04B25D" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A71B59A7-9467-4729-9A24-D5291C059E66" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21" } ] } @@ -166,6 +166,14 @@ "url": "http://marc.info/?l=bugtraq&m=108006717731989&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11206", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch" + ] + }, { "url": "http://securitytracker.com/id?1009529", "source": "cve@mitre.org", @@ -173,6 +181,10 @@ "Exploit" ] }, + { + "url": "http://www.osvdb.org/4542", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/9953", "source": "cve@mitre.org", diff --git a/CVE-2004/CVE-2004-18xx/CVE-2004-1883.json b/CVE-2004/CVE-2004-18xx/CVE-2004-1883.json index 90efa4ba4c6..26977255f71 100644 --- a/CVE-2004/CVE-2004-18xx/CVE-2004-1883.json +++ b/CVE-2004/CVE-2004-18xx/CVE-2004-1883.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1883", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2019-08-13T14:39:55.530", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21" } ] } @@ -71,6 +71,13 @@ "url": "http://marc.info/?l=bugtraq&m=108006553222397&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11206", + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] + }, { "url": "http://www.securityfocus.com/archive/1/358361", "source": "cve@mitre.org" diff --git a/CVE-2004/CVE-2004-18xx/CVE-2004-1884.json b/CVE-2004/CVE-2004-18xx/CVE-2004-1884.json index 2d1c2841b7e..f91d93e95f7 100644 --- a/CVE-2004/CVE-2004-18xx/CVE-2004-1884.json +++ b/CVE-2004/CVE-2004-18xx/CVE-2004-1884.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1884", "sourceIdentifier": "cve@mitre.org", "published": "2004-03-23T05:00:00.000", - "lastModified": "2019-08-13T14:39:55.530", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -88,93 +88,93 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A6286D79-17FC-4520-AE4E-CF2FEFB75DC4" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A886D80F-D72C-4BDF-A65F-27CA82348C48" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "BB026283-A9A2-4034-B843-C10E025637EB" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4A0D7240-62C8-4003-A840-98E818709D9B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "FB2CD59D-63E0-4C15-A304-3444B55C8330" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "BA99A58B-F751-4C04-B41B-CBE94998AA42" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B13F54CE-66AB-491D-A5DB-4AD5F257CB74" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "51D8225C-A74A-451E-9589-F1E00E4728D3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "82E9F743-E294-4F82-9A0E-BC9943278A60" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "3C3438AF-FCF1-4D77-83D5-27B9989F0683" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "069B9D3F-936D-497B-8162-1093874D5AC5" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "843B6647-BF92-46D1-ADEE-92088D9AD1C4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BAEC6109-1152-4DD0-AC37-C571500887E2" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A4B80A25-3860-4CF5-B8ED-5370EBB42455" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "6CF61E52-FF34-4557-9D4A-63030445743F" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "50BE9ECB-4799-48BD-B3BE-7EE27FE3AA40" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "79A8A663-F60A-4425-BFB1-40C132B9E899" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBC59D2-405D-4374-812A-A3AEE0D6D594" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "47A96076-3BBA-45DC-9AF4-0F4A8DD3629F" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "755C3FB5-5D5B-4732-86F9-68A6612BC819" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DD94DE9-9ECB-48C5-877B-9B3CBA327A6D" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "968C0544-A2F5-4FA6-A4B8-89113EE95B0A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "31B7C4D4-E347-40C0-8D09-CFB42AEA136D" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D9D662A9-5D1B-465E-A4B1-A4C86BA207C7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AC3F7672-4435-4968-A186-7541B742A00C" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "FBA7690C-8ADA-462E-B671-4D4CB243A483" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5180850E-BA34-470D-807B-6D91DB04B25D" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A71B59A7-9467-4729-9A24-D5291C059E66" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21" } ] } @@ -186,6 +186,15 @@ "url": "http://marc.info/?l=bugtraq&m=108006581418116&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11206", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] + }, { "url": "http://www.securityfocus.com/bid/9953", "source": "cve@mitre.org", diff --git a/CVE-2004/CVE-2004-18xx/CVE-2004-1885.json b/CVE-2004/CVE-2004-18xx/CVE-2004-1885.json index c2f38590050..97de22fef60 100644 --- a/CVE-2004/CVE-2004-18xx/CVE-2004-1885.json +++ b/CVE-2004/CVE-2004-18xx/CVE-2004-1885.json @@ -2,7 +2,7 @@ "id": "CVE-2004-1885", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", - "lastModified": "2019-08-13T14:39:55.530", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -58,8 +58,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21" } ] } @@ -71,6 +71,14 @@ "url": "http://marc.info/?l=bugtraq&m=108006581418116&w=2", "source": "cve@mitre.org" }, + { + "url": "http://secunia.com/advisories/11206", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch" + ] + }, { "url": "http://www.securityfocus.com/bid/9953", "source": "cve@mitre.org", diff --git a/CVE-2006/CVE-2006-48xx/CVE-2006-4847.json b/CVE-2006/CVE-2006-48xx/CVE-2006-4847.json index 568a259d39f..89989338309 100644 --- a/CVE-2006/CVE-2006-48xx/CVE-2006-4847.json +++ b/CVE-2006/CVE-2006-48xx/CVE-2006-4847.json @@ -2,7 +2,7 @@ "id": "CVE-2006-4847", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-19T01:07:00.000", - "lastModified": "2019-08-13T14:40:00.340", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "evaluatorSolution": "This vulnerability is addressed in the following product update:\r\nIpswitch, WS_FTP Server, 5.05 Hotfix 1", "descriptions": [ @@ -93,109 +93,109 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*", "versionEndIncluding": "5.05", - "matchCriteriaId": "4F2E45F2-D14B-4C30-88E8-AE443358C8E5" + "matchCriteriaId": "50BFB437-2855-401A-AD99-D20A51F2DA82" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "A6286D79-17FC-4520-AE4E-CF2FEFB75DC4" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A886D80F-D72C-4BDF-A65F-27CA82348C48" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF69630-9F18-4DDE-81B3-7F37DB8F4498" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*", + "matchCriteriaId": "D9BE1954-74C5-4A91-9C9A-C0647F281017" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "BB026283-A9A2-4034-B843-C10E025637EB" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4A0D7240-62C8-4003-A840-98E818709D9B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*", - "matchCriteriaId": "097FBE5A-56F2-4D49-9188-9AC0AAF43FA3" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*", + "matchCriteriaId": "3DE6789D-5DA5-489F-A900-F4788286ACE5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "FB2CD59D-63E0-4C15-A304-3444B55C8330" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "BA99A58B-F751-4C04-B41B-CBE94998AA42" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "B13F54CE-66AB-491D-A5DB-4AD5F257CB74" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "51D8225C-A74A-451E-9589-F1E00E4728D3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*", - "matchCriteriaId": "82E9F743-E294-4F82-9A0E-BC9943278A60" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "3C3438AF-FCF1-4D77-83D5-27B9989F0683" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "069B9D3F-936D-497B-8162-1093874D5AC5" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "843B6647-BF92-46D1-ADEE-92088D9AD1C4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "BAEC6109-1152-4DD0-AC37-C571500887E2" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A4B80A25-3860-4CF5-B8ED-5370EBB42455" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "6CF61E52-FF34-4557-9D4A-63030445743F" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "50BE9ECB-4799-48BD-B3BE-7EE27FE3AA40" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*", - "matchCriteriaId": "79A8A663-F60A-4425-BFB1-40C132B9E899" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBC59D2-405D-4374-812A-A3AEE0D6D594" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*", - "matchCriteriaId": "47A96076-3BBA-45DC-9AF4-0F4A8DD3629F" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "755C3FB5-5D5B-4732-86F9-68A6612BC819" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*", - "matchCriteriaId": "3DD94DE9-9ECB-48C5-877B-9B3CBA327A6D" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "968C0544-A2F5-4FA6-A4B8-89113EE95B0A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*", - "matchCriteriaId": "31B7C4D4-E347-40C0-8D09-CFB42AEA136D" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D9D662A9-5D1B-465E-A4B1-A4C86BA207C7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "AC3F7672-4435-4968-A186-7541B742A00C" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "FBA7690C-8ADA-462E-B671-4D4CB243A483" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*", - "matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5180850E-BA34-470D-807B-6D91DB04B25D" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A71B59A7-9467-4729-9A24-D5291C059E66" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21" } ] } @@ -210,6 +210,18 @@ "Patch" ] }, + { + "url": "http://secunia.com/advisories/21932", + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "http://www.osvdb.org/28939", + "source": "cve@mitre.org" + }, { "url": "http://www.securityfocus.com/bid/20076", "source": "cve@mitre.org" diff --git a/CVE-2006/CVE-2006-50xx/CVE-2006-5000.json b/CVE-2006/CVE-2006-50xx/CVE-2006-5000.json index 644f1556f0b..6d00cfe4baf 100644 --- a/CVE-2006/CVE-2006-50xx/CVE-2006-5000.json +++ b/CVE-2006/CVE-2006-50xx/CVE-2006-5000.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5000", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-26T20:07:00.000", - "lastModified": "2019-08-13T14:39:57.590", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -77,8 +77,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2603E3E5-FF48-4C37-B4F4-5152561C5D59" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "ED4F7DAA-DB7C-4CCC-9521-131FEFC776FD" } ] } diff --git a/CVE-2006/CVE-2006-50xx/CVE-2006-5001.json b/CVE-2006/CVE-2006-50xx/CVE-2006-5001.json index 5fb21da1a07..b6112ac7de4 100644 --- a/CVE-2006/CVE-2006-50xx/CVE-2006-5001.json +++ b/CVE-2006/CVE-2006-50xx/CVE-2006-5001.json @@ -2,7 +2,7 @@ "id": "CVE-2006-5001", "sourceIdentifier": "cve@mitre.org", "published": "2006-09-26T20:07:00.000", - "lastModified": "2019-08-13T14:40:00.340", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Analyzed", "descriptions": [ { @@ -72,14 +72,14 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*", "versionEndIncluding": "5.05", - "matchCriteriaId": "4F2E45F2-D14B-4C30-88E8-AE443358C8E5" + "matchCriteriaId": "50BFB437-2855-401A-AD99-D20A51F2DA82" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*", - "matchCriteriaId": "2603E3E5-FF48-4C37-B4F4-5152561C5D59" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:5.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "ED4F7DAA-DB7C-4CCC-9521-131FEFC776FD" } ] } diff --git a/CVE-2008/CVE-2008-05xx/CVE-2008-0590.json b/CVE-2008/CVE-2008-05xx/CVE-2008-0590.json index acc5cd4ebe7..6f301aa9359 100644 --- a/CVE-2008/CVE-2008-05xx/CVE-2008-0590.json +++ b/CVE-2008/CVE-2008-05xx/CVE-2008-0590.json @@ -2,7 +2,7 @@ "id": "CVE-2008-0590", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-05T12:00:00.000", - "lastModified": "2019-08-13T14:40:02.327", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -62,8 +62,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:6.1.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "9415DF7B-ACD0-4CF9-8560-B04D50A9CCCB" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:6.1.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1886ECC8-BF8B-4CD6-93BA-39409DD05AE9" } ] } @@ -71,6 +71,13 @@ } ], "references": [ + { + "url": "http://secunia.com/advisories/28753", + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] + }, { "url": "http://securityreason.com/securityalert/3609", "source": "cve@mitre.org" diff --git a/CVE-2019/CVE-2019-121xx/CVE-2019-12143.json b/CVE-2019/CVE-2019-121xx/CVE-2019-12143.json index 92283447201..364303dc2a2 100644 --- a/CVE-2019/CVE-2019-121xx/CVE-2019-12143.json +++ b/CVE-2019/CVE-2019-121xx/CVE-2019-12143.json @@ -2,7 +2,7 @@ "id": "CVE-2019-12143", "sourceIdentifier": "cve@mitre.org", "published": "2019-06-11T21:29:01.053", - "lastModified": "2019-08-14T11:30:29.080", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*", "versionEndExcluding": "8.6.1", - "matchCriteriaId": "924A9F75-DB9A-4A68-8EAA-8FB3DC151234" + "matchCriteriaId": "3E2A0713-785A-47ED-9B41-5679E3707E3F" } ] } diff --git a/CVE-2021/CVE-2021-240xx/CVE-2021-24002.json b/CVE-2021/CVE-2021-240xx/CVE-2021-24002.json index c88a97edb36..14a5c8bca07 100644 --- a/CVE-2021/CVE-2021-240xx/CVE-2021-24002.json +++ b/CVE-2021/CVE-2021-240xx/CVE-2021-24002.json @@ -2,7 +2,7 @@ "id": "CVE-2021-24002", "sourceIdentifier": "security@mozilla.org", "published": "2021-06-24T14:15:09.577", - "lastModified": "2021-07-02T17:01:11.053", + "lastModified": "2023-10-11T15:28:21.907", "vulnStatus": "Analyzed", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-88" + "value": "CWE-74" } ] } diff --git a/CVE-2022/CVE-2022-258xx/CVE-2022-25852.json b/CVE-2022/CVE-2022-258xx/CVE-2022-25852.json index c2cba3f0f38..2b108d6a0ee 100644 --- a/CVE-2022/CVE-2022-258xx/CVE-2022-25852.json +++ b/CVE-2022/CVE-2022-258xx/CVE-2022-25852.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25852", "sourceIdentifier": "report@snyk.io", "published": "2022-06-17T20:15:10.547", - "lastModified": "2022-06-28T14:53:11.197", + "lastModified": "2023-10-11T15:27:34.157", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-88" + "value": "CWE-704" } ] } diff --git a/CVE-2022/CVE-2022-276xx/CVE-2022-27665.json b/CVE-2022/CVE-2022-276xx/CVE-2022-27665.json index 449f13e3c37..82f25bde13e 100644 --- a/CVE-2022/CVE-2022-276xx/CVE-2022-27665.json +++ b/CVE-2022/CVE-2022-276xx/CVE-2022-27665.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27665", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-03T14:15:07.327", - "lastModified": "2023-09-28T20:15:10.110", + "lastModified": "2023-10-11T14:45:44.747", "vulnStatus": "Modified", "descriptions": [ { @@ -55,8 +55,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:8.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "99005653-02C0-4C69-A44A-30E2DACB3092" + "criteria": "cpe:2.3:a:progress:ws_ftp_server:8.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C49D4BC9-F739-4BA0-A6D2-E2A0DF15549A" } ] } diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4864.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4864.json index 47a36a746f6..30d47704f46 100644 --- a/CVE-2022/CVE-2022-48xx/CVE-2022-4864.json +++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4864.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4864", "sourceIdentifier": "security@huntr.dev", "published": "2022-12-30T23:15:11.910", - "lastModified": "2023-01-06T19:33:02.667", + "lastModified": "2023-10-11T15:24:48.003", "vulnStatus": "Analyzed", "descriptions": [ { @@ -63,7 +63,7 @@ "description": [ { "lang": "en", - "value": "CWE-88" + "value": "CWE-74" } ] }, diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1437.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1437.json index 74451ba18ac..2ba99405f1c 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1437.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1437.json @@ -2,12 +2,12 @@ "id": "CVE-2023-1437", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-08-02T23:15:10.153", - "lastModified": "2023-08-08T13:50:58.210", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-11T15:15:09.400", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent client could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files." + "value": "All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.\n\n" } ], "metrics": { @@ -31,27 +31,47 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "ics-cert@hq.dhs.gov", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-822" } ] }, { - "source": "ics-cert@hq.dhs.gov", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-822" + "value": "CWE-119" } ] } diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28321.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28321.json index c4c27f511eb..d54f49a6e65 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28321.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28321.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28321", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-26T21:15:16.020", - "lastModified": "2023-10-11T11:15:12.713", + "lastModified": "2023-10-11T15:15:09.543", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -284,6 +284,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html", + "source": "support@hackerone.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/", "source": "support@hackerone.com", diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34985.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34985.json index 0bc741a5e4d..c97590f27f7 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34985.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34985.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34985", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-10-10T17:15:11.283", - "lastModified": "2023-10-10T17:52:17.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:28:07.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndIncluding": "8.6.5", + "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-141", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34986.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34986.json index ccf74897443..09257257b7e 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34986.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34986.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34986", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-10-10T17:15:11.343", - "lastModified": "2023-10-10T17:52:17.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:01:04.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndIncluding": "8.6.5", + "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-141", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34987.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34987.json index 5dd148d55dc..6ad73b5195d 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34987.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34987.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34987", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-10-10T17:15:11.403", - "lastModified": "2023-10-10T17:52:17.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:28:16.647", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndIncluding": "8.6.5", + "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-141", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34988.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34988.json index 2e43545f5e2..45e72987cc2 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34988.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34988.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34988", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-10-10T17:15:11.463", - "lastModified": "2023-10-10T17:52:17.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:28:24.797", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndIncluding": "8.6.5", + "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-141", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34989.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34989.json index c7b847eac0a..fd788d5ada9 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34989.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34989.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34989", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-10-10T17:15:11.520", - "lastModified": "2023-10-10T17:52:17.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:28:40.233", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndIncluding": "8.6.5", + "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-141", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34993.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34993.json index 668388f416b..5530db87dc4 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34993.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34993.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34993", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-10-10T17:15:11.670", - "lastModified": "2023-10-10T17:52:17.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:29:10.010", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndIncluding": "8.6.5", + "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-140", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36547.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36547.json index ec0069ee46c..76d93ef1de5 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36547.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36547.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36547", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-10-10T17:15:11.827", - "lastModified": "2023-10-10T17:52:17.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:29:22.937", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndIncluding": "8.6.5", + "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-140", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36548.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36548.json index d159ca565ee..282f843bb5f 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36548.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36548.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36548", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-10-10T17:15:11.890", - "lastModified": "2023-10-10T17:52:09.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:29:33.770", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndIncluding": "8.6.5", + "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-140", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36549.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36549.json index 6cdb8bbd0f0..04fb304fdad 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36549.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36549.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36549", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-10-10T17:15:11.953", - "lastModified": "2023-10-10T17:52:09.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:30:18.603", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndIncluding": "8.6.5", + "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-140", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36550.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36550.json index df68fb5567e..c86780702c9 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36550.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36550.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36550", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-10-10T17:15:12.017", - "lastModified": "2023-10-10T17:52:09.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:30:45.603", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.5.0", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndIncluding": "8.6.5", + "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-140", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37538.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37538.json index af90fede0ef..adf86194db8 100644 --- a/CVE-2023/CVE-2023-375xx/CVE-2023-37538.json +++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37538.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37538", "sourceIdentifier": "psirt@hcl.com", "published": "2023-10-11T13:15:09.557", - "lastModified": "2023-10-11T13:15:09.557", - "vulnStatus": "Received", + "lastModified": "2023-10-11T14:23:06.207", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44105.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44105.json index b4c37d5d3f8..eeefa6b3a23 100644 --- a/CVE-2023/CVE-2023-441xx/CVE-2023-44105.json +++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44105.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44105", "sourceIdentifier": "psirt@huawei.com", "published": "2023-10-11T13:15:09.820", - "lastModified": "2023-10-11T13:15:09.820", - "vulnStatus": "Received", + "lastModified": "2023-10-11T14:23:06.207", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44107.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44107.json index f9c169534ca..7029320782d 100644 --- a/CVE-2023/CVE-2023-441xx/CVE-2023-44107.json +++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44107.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44107", "sourceIdentifier": "psirt@huawei.com", "published": "2023-10-11T13:15:09.977", - "lastModified": "2023-10-11T13:15:09.977", - "vulnStatus": "Received", + "lastModified": "2023-10-11T14:23:06.207", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44108.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44108.json index d96454eb262..ee48f6e95d4 100644 --- a/CVE-2023/CVE-2023-441xx/CVE-2023-44108.json +++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44108.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44108", "sourceIdentifier": "psirt@huawei.com", "published": "2023-10-11T13:15:10.030", - "lastModified": "2023-10-11T13:15:10.030", - "vulnStatus": "Received", + "lastModified": "2023-10-11T14:23:06.207", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44114.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44114.json index 07e124fe872..23a5eb7264e 100644 --- a/CVE-2023/CVE-2023-441xx/CVE-2023-44114.json +++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44114.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44114", "sourceIdentifier": "psirt@huawei.com", "published": "2023-10-11T13:15:10.097", - "lastModified": "2023-10-11T13:15:10.097", - "vulnStatus": "Received", + "lastModified": "2023-10-11T14:23:06.207", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44116.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44116.json index ab95d94ac19..ac4708f98c2 100644 --- a/CVE-2023/CVE-2023-441xx/CVE-2023-44116.json +++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44116.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44116", "sourceIdentifier": "psirt@huawei.com", "published": "2023-10-11T13:15:10.160", - "lastModified": "2023-10-11T13:15:10.160", - "vulnStatus": "Received", + "lastModified": "2023-10-11T14:23:06.207", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44118.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44118.json index 1f15c6a4434..7885ad59026 100644 --- a/CVE-2023/CVE-2023-441xx/CVE-2023-44118.json +++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44118.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44118", "sourceIdentifier": "psirt@huawei.com", "published": "2023-10-11T13:15:10.223", - "lastModified": "2023-10-11T13:15:10.223", - "vulnStatus": "Received", + "lastModified": "2023-10-11T14:23:06.207", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-441xx/CVE-2023-44119.json b/CVE-2023/CVE-2023-441xx/CVE-2023-44119.json index 1e733ed3f3b..e57e6ae44fd 100644 --- a/CVE-2023/CVE-2023-441xx/CVE-2023-44119.json +++ b/CVE-2023/CVE-2023-441xx/CVE-2023-44119.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44119", "sourceIdentifier": "psirt@huawei.com", "published": "2023-10-11T13:15:10.277", - "lastModified": "2023-10-11T13:15:10.277", - "vulnStatus": "Received", + "lastModified": "2023-10-11T14:23:06.207", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json b/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json index edcf659bc66..3d02f3042ca 100644 --- a/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json +++ b/CVE-2023/CVE-2023-449xx/CVE-2023-44981.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44981", "sourceIdentifier": "security@apache.org", "published": "2023-10-11T12:15:11.760", - "lastModified": "2023-10-11T12:54:05.787", + "lastModified": "2023-10-11T15:15:09.733", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2023/10/11/4", + "source": "security@apache.org" + }, { "url": "https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b", "source": "security@apache.org" diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45396.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45396.json new file mode 100644 index 00000000000..e92478704f5 --- /dev/null +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45396.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-45396", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-10-11T14:15:09.993", + "lastModified": "2023-10-11T14:23:06.207", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An Insecure Direct Object Reference (IDOR) vulnerability leads to events profiles access in Elenos ETG150 FM transmitter running on version 3.12." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/strik3r0x1/Vulns/blob/main/(IDOR)%20leads%20to%20events%20profiles%20access%20-%20Elenos.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4957.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4957.json new file mode 100644 index 00000000000..b2fd9be9d61 --- /dev/null +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4957.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-4957", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2023-10-11T14:15:10.047", + "lastModified": "2023-10-11T14:23:06.207", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": " A vulnerability of authentication bypass has been found on a Zebra Technologies ZTC ZT410-203dpi ZPL printer. This vulnerability allows an attacker that is in the same network as the printer, to change the username and password for the Web Page by sending a specially crafted POST request to the setvarsResults.cgi file. For this vulnerability to be exploitable, the printers protected mode must be disabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/authentication-bypass-zebra-ztc", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5233.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5233.json index f692909f84b..cab2fe04f10 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5233.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5233.json @@ -2,19 +2,43 @@ "id": "CVE-2023-5233", "sourceIdentifier": "security@wordfence.com", "published": "2023-09-28T05:15:46.513", - "lastModified": "2023-09-28T12:44:04.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-10-11T14:10:16.687", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Font Awesome Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'fawesome' shortcode in versions up to, and including, 5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Font Awesome Integration para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de un c\u00f3digo abreviado 'fawesome' en versiones hasta la 5.0 incluida, debido a una insuficiente sanitizaci\u00f3n de entrada y escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada.\n" } ], "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -46,14 +70,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fontawesome:font_awesome_integration:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.0", + "matchCriteriaId": "772F3254-6115-46FD-9429-9BDAD69EA8D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/font-awesome-integration/tags/5.0/font-awesome-integration.php#L48", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2791f48-895f-4099-87ec-41aaac2494a2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 9ffc3c38895..6657e58eddd 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-11T14:00:25.388339+00:00 +2023-10-11T16:00:24.797103+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-11T14:00:08.897000+00:00 +2023-10-11T15:28:21.907000+00:00 ``` ### Last Data Feed Release @@ -29,69 +29,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -227562 +227564 ``` ### CVEs added in the last Commit -Recently added CVEs: `25` +Recently added CVEs: `2` -* [CVE-2023-26370](CVE-2023/CVE-2023-263xx/CVE-2023-26370.json) (`2023-10-11T12:15:10.580`) -* [CVE-2023-38216](CVE-2023/CVE-2023-382xx/CVE-2023-38216.json) (`2023-10-11T12:15:10.797`) -* [CVE-2023-38217](CVE-2023/CVE-2023-382xx/CVE-2023-38217.json) (`2023-10-11T12:15:10.907`) -* [CVE-2023-41304](CVE-2023/CVE-2023-413xx/CVE-2023-41304.json) (`2023-10-11T12:15:10.993`) -* [CVE-2023-44095](CVE-2023/CVE-2023-440xx/CVE-2023-44095.json) (`2023-10-11T12:15:11.070`) -* [CVE-2023-44097](CVE-2023/CVE-2023-440xx/CVE-2023-44097.json) (`2023-10-11T12:15:11.130`) -* [CVE-2023-44100](CVE-2023/CVE-2023-441xx/CVE-2023-44100.json) (`2023-10-11T12:15:11.193`) -* [CVE-2023-44101](CVE-2023/CVE-2023-441xx/CVE-2023-44101.json) (`2023-10-11T12:15:11.250`) -* [CVE-2023-44102](CVE-2023/CVE-2023-441xx/CVE-2023-44102.json) (`2023-10-11T12:15:11.313`) -* [CVE-2023-44103](CVE-2023/CVE-2023-441xx/CVE-2023-44103.json) (`2023-10-11T12:15:11.357`) -* [CVE-2023-44104](CVE-2023/CVE-2023-441xx/CVE-2023-44104.json) (`2023-10-11T12:15:11.520`) -* [CVE-2023-44106](CVE-2023/CVE-2023-441xx/CVE-2023-44106.json) (`2023-10-11T12:15:11.570`) -* [CVE-2023-44110](CVE-2023/CVE-2023-441xx/CVE-2023-44110.json) (`2023-10-11T12:15:11.623`) -* [CVE-2023-44111](CVE-2023/CVE-2023-441xx/CVE-2023-44111.json) (`2023-10-11T12:15:11.713`) -* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2023-10-11T12:15:11.760`) -* [CVE-2023-5520](CVE-2023/CVE-2023-55xx/CVE-2023-5520.json) (`2023-10-11T12:15:11.857`) -* [CVE-2023-5521](CVE-2023/CVE-2023-55xx/CVE-2023-5521.json) (`2023-10-11T12:15:11.937`) -* [CVE-2023-37538](CVE-2023/CVE-2023-375xx/CVE-2023-37538.json) (`2023-10-11T13:15:09.557`) -* [CVE-2023-44105](CVE-2023/CVE-2023-441xx/CVE-2023-44105.json) (`2023-10-11T13:15:09.820`) -* [CVE-2023-44107](CVE-2023/CVE-2023-441xx/CVE-2023-44107.json) (`2023-10-11T13:15:09.977`) -* [CVE-2023-44108](CVE-2023/CVE-2023-441xx/CVE-2023-44108.json) (`2023-10-11T13:15:10.030`) -* [CVE-2023-44114](CVE-2023/CVE-2023-441xx/CVE-2023-44114.json) (`2023-10-11T13:15:10.097`) -* [CVE-2023-44116](CVE-2023/CVE-2023-441xx/CVE-2023-44116.json) (`2023-10-11T13:15:10.160`) -* [CVE-2023-44118](CVE-2023/CVE-2023-441xx/CVE-2023-44118.json) (`2023-10-11T13:15:10.223`) -* [CVE-2023-44119](CVE-2023/CVE-2023-441xx/CVE-2023-44119.json) (`2023-10-11T13:15:10.277`) +* [CVE-2023-45396](CVE-2023/CVE-2023-453xx/CVE-2023-45396.json) (`2023-10-11T14:15:09.993`) +* [CVE-2023-4957](CVE-2023/CVE-2023-49xx/CVE-2023-4957.json) (`2023-10-11T14:15:10.047`) ### CVEs modified in the last Commit -Recently modified CVEs: `28` +Recently modified CVEs: `41` -* [CVE-2021-31806](CVE-2021/CVE-2021-318xx/CVE-2021-31806.json) (`2023-10-11T12:15:10.147`) -* [CVE-2021-31807](CVE-2021/CVE-2021-318xx/CVE-2021-31807.json) (`2023-10-11T12:15:10.237`) -* [CVE-2021-31808](CVE-2021/CVE-2021-318xx/CVE-2021-31808.json) (`2023-10-11T12:15:10.333`) -* [CVE-2021-33620](CVE-2021/CVE-2021-336xx/CVE-2021-33620.json) (`2023-10-11T12:15:10.413`) -* [CVE-2022-42451](CVE-2022/CVE-2022-424xx/CVE-2022-42451.json) (`2023-10-11T12:54:12.883`) -* [CVE-2022-44757](CVE-2022/CVE-2022-447xx/CVE-2022-44757.json) (`2023-10-11T12:54:12.883`) -* [CVE-2022-44758](CVE-2022/CVE-2022-447xx/CVE-2022-44758.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-44094](CVE-2023/CVE-2023-440xx/CVE-2023-44094.json) (`2023-10-11T12:54:05.787`) -* [CVE-2023-44096](CVE-2023/CVE-2023-440xx/CVE-2023-44096.json) (`2023-10-11T12:54:05.787`) -* [CVE-2023-44109](CVE-2023/CVE-2023-441xx/CVE-2023-44109.json) (`2023-10-11T12:54:05.787`) -* [CVE-2023-44689](CVE-2023/CVE-2023-446xx/CVE-2023-44689.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-45194](CVE-2023/CVE-2023-451xx/CVE-2023-45194.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-5511](CVE-2023/CVE-2023-55xx/CVE-2023-5511.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-26318](CVE-2023/CVE-2023-263xx/CVE-2023-26318.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-26319](CVE-2023/CVE-2023-263xx/CVE-2023-26319.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-26320](CVE-2023/CVE-2023-263xx/CVE-2023-26320.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-37536](CVE-2023/CVE-2023-375xx/CVE-2023-37536.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-44997](CVE-2023/CVE-2023-449xx/CVE-2023-44997.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-4990](CVE-2023/CVE-2023-49xx/CVE-2023-4990.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-42138](CVE-2023/CVE-2023-421xx/CVE-2023-42138.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-44093](CVE-2023/CVE-2023-440xx/CVE-2023-44093.json) (`2023-10-11T12:54:12.883`) -* [CVE-2023-26239](CVE-2023/CVE-2023-262xx/CVE-2023-26239.json) (`2023-10-11T13:59:48.340`) -* [CVE-2023-26236](CVE-2023/CVE-2023-262xx/CVE-2023-26236.json) (`2023-10-11T14:00:04.993`) -* [CVE-2023-26237](CVE-2023/CVE-2023-262xx/CVE-2023-26237.json) (`2023-10-11T14:00:07.037`) -* [CVE-2023-26238](CVE-2023/CVE-2023-262xx/CVE-2023-26238.json) (`2023-10-11T14:00:08.897`) +* [CVE-2022-27665](CVE-2022/CVE-2022-276xx/CVE-2022-27665.json) (`2023-10-11T14:45:44.747`) +* [CVE-2022-4864](CVE-2022/CVE-2022-48xx/CVE-2022-4864.json) (`2023-10-11T15:24:48.003`) +* [CVE-2022-25852](CVE-2022/CVE-2022-258xx/CVE-2022-25852.json) (`2023-10-11T15:27:34.157`) +* [CVE-2023-34986](CVE-2023/CVE-2023-349xx/CVE-2023-34986.json) (`2023-10-11T14:01:04.407`) +* [CVE-2023-5233](CVE-2023/CVE-2023-52xx/CVE-2023-5233.json) (`2023-10-11T14:10:16.687`) +* [CVE-2023-37538](CVE-2023/CVE-2023-375xx/CVE-2023-37538.json) (`2023-10-11T14:23:06.207`) +* [CVE-2023-44105](CVE-2023/CVE-2023-441xx/CVE-2023-44105.json) (`2023-10-11T14:23:06.207`) +* [CVE-2023-44107](CVE-2023/CVE-2023-441xx/CVE-2023-44107.json) (`2023-10-11T14:23:06.207`) +* [CVE-2023-44108](CVE-2023/CVE-2023-441xx/CVE-2023-44108.json) (`2023-10-11T14:23:06.207`) +* [CVE-2023-44114](CVE-2023/CVE-2023-441xx/CVE-2023-44114.json) (`2023-10-11T14:23:06.207`) +* [CVE-2023-44116](CVE-2023/CVE-2023-441xx/CVE-2023-44116.json) (`2023-10-11T14:23:06.207`) +* [CVE-2023-44118](CVE-2023/CVE-2023-441xx/CVE-2023-44118.json) (`2023-10-11T14:23:06.207`) +* [CVE-2023-44119](CVE-2023/CVE-2023-441xx/CVE-2023-44119.json) (`2023-10-11T14:23:06.207`) +* [CVE-2023-34985](CVE-2023/CVE-2023-349xx/CVE-2023-34985.json) (`2023-10-11T14:28:07.943`) +* [CVE-2023-34987](CVE-2023/CVE-2023-349xx/CVE-2023-34987.json) (`2023-10-11T14:28:16.647`) +* [CVE-2023-34988](CVE-2023/CVE-2023-349xx/CVE-2023-34988.json) (`2023-10-11T14:28:24.797`) +* [CVE-2023-34989](CVE-2023/CVE-2023-349xx/CVE-2023-34989.json) (`2023-10-11T14:28:40.233`) +* [CVE-2023-34993](CVE-2023/CVE-2023-349xx/CVE-2023-34993.json) (`2023-10-11T14:29:10.010`) +* [CVE-2023-36547](CVE-2023/CVE-2023-365xx/CVE-2023-36547.json) (`2023-10-11T14:29:22.937`) +* [CVE-2023-36548](CVE-2023/CVE-2023-365xx/CVE-2023-36548.json) (`2023-10-11T14:29:33.770`) +* [CVE-2023-36549](CVE-2023/CVE-2023-365xx/CVE-2023-36549.json) (`2023-10-11T14:30:18.603`) +* [CVE-2023-36550](CVE-2023/CVE-2023-365xx/CVE-2023-36550.json) (`2023-10-11T14:30:45.603`) +* [CVE-2023-1437](CVE-2023/CVE-2023-14xx/CVE-2023-1437.json) (`2023-10-11T15:15:09.400`) +* [CVE-2023-28321](CVE-2023/CVE-2023-283xx/CVE-2023-28321.json) (`2023-10-11T15:15:09.543`) +* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2023-10-11T15:15:09.733`) ## Download and Usage