mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2023-10-11T16:00:24.797103+00:00
This commit is contained in:
parent
5063775eff
commit
ce063f05d9
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-1999-1170",
|
"id": "CVE-1999-1170",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "1999-01-02T05:00:00.000",
|
"published": "1999-01-02T05:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:21.853",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -63,13 +63,13 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "2CF69630-9F18-4DDE-81B3-7F37DB8F4498"
|
"matchCriteriaId": "D9BE1954-74C5-4A91-9C9A-C0647F281017"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "097FBE5A-56F2-4D49-9188-9AC0AAF43FA3"
|
"matchCriteriaId": "3DE6789D-5DA5-489F-A900-F4788286ACE5"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-1999-1171",
|
"id": "CVE-1999-1171",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "1999-02-02T05:00:00.000",
|
"published": "1999-02-02T05:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:21.853",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -63,13 +63,13 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "2CF69630-9F18-4DDE-81B3-7F37DB8F4498"
|
"matchCriteriaId": "D9BE1954-74C5-4A91-9C9A-C0647F281017"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "097FBE5A-56F2-4D49-9188-9AC0AAF43FA3"
|
"matchCriteriaId": "3DE6789D-5DA5-489F-A900-F4788286ACE5"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2001-1021",
|
"id": "CVE-2001-1021",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2001-07-26T04:00:00.000",
|
"published": "2001-07-26T04:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:34.857",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -58,8 +58,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A"
|
"matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2002-0826",
|
"id": "CVE-2002-0826",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2002-08-12T04:00:00.000",
|
"published": "2002-08-12T04:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:45.153",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -58,8 +58,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8"
|
"matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2003-0772",
|
"id": "CVE-2003-0772",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2003-09-22T04:00:00.000",
|
"published": "2003-09-22T04:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:50.873",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -67,8 +67,8 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA"
|
"matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -80,6 +80,10 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=106288825902868&w=2",
|
"url": "http://marc.info/?l=bugtraq&m=106288825902868&w=2",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "http://secunia.com/advisories/9671",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.kb.cert.org/vuls/id/219140",
|
"url": "http://www.kb.cert.org/vuls/id/219140",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2004-1643",
|
"id": "CVE-2004-1643",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2004-08-29T04:00:00.000",
|
"published": "2004-08-29T04:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:57.590",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -58,8 +58,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "2603E3E5-FF48-4C37-B4F4-5152561C5D59"
|
"matchCriteriaId": "ED4F7DAA-DB7C-4CCC-9521-131FEFC776FD"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -71,6 +71,14 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=109389890712888&w=2",
|
"url": "http://marc.info/?l=bugtraq&m=109389890712888&w=2",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "http://secunia.com/advisories/12406",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.securityfocus.com/bid/11065",
|
"url": "http://www.securityfocus.com/bid/11065",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2004-1848",
|
"id": "CVE-2004-1848",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2004-12-31T05:00:00.000",
|
"published": "2004-12-31T05:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:55.530",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -68,93 +68,93 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "A6286D79-17FC-4520-AE4E-CF2FEFB75DC4"
|
"matchCriteriaId": "A886D80F-D72C-4BDF-A65F-27CA82348C48"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "BB026283-A9A2-4034-B843-C10E025637EB"
|
"matchCriteriaId": "4A0D7240-62C8-4003-A840-98E818709D9B"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "FB2CD59D-63E0-4C15-A304-3444B55C8330"
|
"matchCriteriaId": "BA99A58B-F751-4C04-B41B-CBE94998AA42"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "B13F54CE-66AB-491D-A5DB-4AD5F257CB74"
|
"matchCriteriaId": "51D8225C-A74A-451E-9589-F1E00E4728D3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "82E9F743-E294-4F82-9A0E-BC9943278A60"
|
"matchCriteriaId": "3C3438AF-FCF1-4D77-83D5-27B9989F0683"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "069B9D3F-936D-497B-8162-1093874D5AC5"
|
"matchCriteriaId": "843B6647-BF92-46D1-ADEE-92088D9AD1C4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "BAEC6109-1152-4DD0-AC37-C571500887E2"
|
"matchCriteriaId": "A4B80A25-3860-4CF5-B8ED-5370EBB42455"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A"
|
"matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6CF61E52-FF34-4557-9D4A-63030445743F"
|
"matchCriteriaId": "50BE9ECB-4799-48BD-B3BE-7EE27FE3AA40"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "79A8A663-F60A-4425-BFB1-40C132B9E899"
|
"matchCriteriaId": "CEBC59D2-405D-4374-812A-A3AEE0D6D594"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "47A96076-3BBA-45DC-9AF4-0F4A8DD3629F"
|
"matchCriteriaId": "755C3FB5-5D5B-4732-86F9-68A6612BC819"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "3DD94DE9-9ECB-48C5-877B-9B3CBA327A6D"
|
"matchCriteriaId": "968C0544-A2F5-4FA6-A4B8-89113EE95B0A"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8"
|
"matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "31B7C4D4-E347-40C0-8D09-CFB42AEA136D"
|
"matchCriteriaId": "D9D662A9-5D1B-465E-A4B1-A4C86BA207C7"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AC3F7672-4435-4968-A186-7541B742A00C"
|
"matchCriteriaId": "FBA7690C-8ADA-462E-B671-4D4CB243A483"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA"
|
"matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "5180850E-BA34-470D-807B-6D91DB04B25D"
|
"matchCriteriaId": "A71B59A7-9467-4729-9A24-D5291C059E66"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A"
|
"matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -166,6 +166,14 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=108006717731989&w=2",
|
"url": "http://marc.info/?l=bugtraq&m=108006717731989&w=2",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "http://secunia.com/advisories/11206",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://securitytracker.com/id?1009529",
|
"url": "http://securitytracker.com/id?1009529",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
@ -173,6 +181,10 @@
|
|||||||
"Exploit"
|
"Exploit"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.osvdb.org/4542",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.securityfocus.com/bid/9953",
|
"url": "http://www.securityfocus.com/bid/9953",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2004-1883",
|
"id": "CVE-2004-1883",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2004-12-31T05:00:00.000",
|
"published": "2004-12-31T05:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:55.530",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -58,8 +58,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A"
|
"matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -71,6 +71,13 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=108006553222397&w=2",
|
"url": "http://marc.info/?l=bugtraq&m=108006553222397&w=2",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "http://secunia.com/advisories/11206",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.securityfocus.com/archive/1/358361",
|
"url": "http://www.securityfocus.com/archive/1/358361",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2004-1884",
|
"id": "CVE-2004-1884",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2004-03-23T05:00:00.000",
|
"published": "2004-03-23T05:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:55.530",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -88,93 +88,93 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "A6286D79-17FC-4520-AE4E-CF2FEFB75DC4"
|
"matchCriteriaId": "A886D80F-D72C-4BDF-A65F-27CA82348C48"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "BB026283-A9A2-4034-B843-C10E025637EB"
|
"matchCriteriaId": "4A0D7240-62C8-4003-A840-98E818709D9B"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "FB2CD59D-63E0-4C15-A304-3444B55C8330"
|
"matchCriteriaId": "BA99A58B-F751-4C04-B41B-CBE94998AA42"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "B13F54CE-66AB-491D-A5DB-4AD5F257CB74"
|
"matchCriteriaId": "51D8225C-A74A-451E-9589-F1E00E4728D3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "82E9F743-E294-4F82-9A0E-BC9943278A60"
|
"matchCriteriaId": "3C3438AF-FCF1-4D77-83D5-27B9989F0683"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "069B9D3F-936D-497B-8162-1093874D5AC5"
|
"matchCriteriaId": "843B6647-BF92-46D1-ADEE-92088D9AD1C4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "BAEC6109-1152-4DD0-AC37-C571500887E2"
|
"matchCriteriaId": "A4B80A25-3860-4CF5-B8ED-5370EBB42455"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A"
|
"matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6CF61E52-FF34-4557-9D4A-63030445743F"
|
"matchCriteriaId": "50BE9ECB-4799-48BD-B3BE-7EE27FE3AA40"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "79A8A663-F60A-4425-BFB1-40C132B9E899"
|
"matchCriteriaId": "CEBC59D2-405D-4374-812A-A3AEE0D6D594"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "47A96076-3BBA-45DC-9AF4-0F4A8DD3629F"
|
"matchCriteriaId": "755C3FB5-5D5B-4732-86F9-68A6612BC819"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "3DD94DE9-9ECB-48C5-877B-9B3CBA327A6D"
|
"matchCriteriaId": "968C0544-A2F5-4FA6-A4B8-89113EE95B0A"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8"
|
"matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "31B7C4D4-E347-40C0-8D09-CFB42AEA136D"
|
"matchCriteriaId": "D9D662A9-5D1B-465E-A4B1-A4C86BA207C7"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AC3F7672-4435-4968-A186-7541B742A00C"
|
"matchCriteriaId": "FBA7690C-8ADA-462E-B671-4D4CB243A483"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA"
|
"matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "5180850E-BA34-470D-807B-6D91DB04B25D"
|
"matchCriteriaId": "A71B59A7-9467-4729-9A24-D5291C059E66"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A"
|
"matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -186,6 +186,15 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=108006581418116&w=2",
|
"url": "http://marc.info/?l=bugtraq&m=108006581418116&w=2",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "http://secunia.com/advisories/11206",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.securityfocus.com/bid/9953",
|
"url": "http://www.securityfocus.com/bid/9953",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2004-1885",
|
"id": "CVE-2004-1885",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2004-12-31T05:00:00.000",
|
"published": "2004-12-31T05:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:55.530",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -58,8 +58,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A"
|
"matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -71,6 +71,14 @@
|
|||||||
"url": "http://marc.info/?l=bugtraq&m=108006581418116&w=2",
|
"url": "http://marc.info/?l=bugtraq&m=108006581418116&w=2",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "http://secunia.com/advisories/11206",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.securityfocus.com/bid/9953",
|
"url": "http://www.securityfocus.com/bid/9953",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2006-4847",
|
"id": "CVE-2006-4847",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2006-09-19T01:07:00.000",
|
"published": "2006-09-19T01:07:00.000",
|
||||||
"lastModified": "2019-08-13T14:40:00.340",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"evaluatorSolution": "This vulnerability is addressed in the following product update:\r\nIpswitch, WS_FTP Server, 5.05 Hotfix 1",
|
"evaluatorSolution": "This vulnerability is addressed in the following product update:\r\nIpswitch, WS_FTP Server, 5.05 Hotfix 1",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -93,109 +93,109 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*",
|
||||||
"versionEndIncluding": "5.05",
|
"versionEndIncluding": "5.05",
|
||||||
"matchCriteriaId": "4F2E45F2-D14B-4C30-88E8-AE443358C8E5"
|
"matchCriteriaId": "50BFB437-2855-401A-AD99-D20A51F2DA82"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "A6286D79-17FC-4520-AE4E-CF2FEFB75DC4"
|
"matchCriteriaId": "A886D80F-D72C-4BDF-A65F-27CA82348C48"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "2CF69630-9F18-4DDE-81B3-7F37DB8F4498"
|
"matchCriteriaId": "D9BE1954-74C5-4A91-9C9A-C0647F281017"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "BB026283-A9A2-4034-B843-C10E025637EB"
|
"matchCriteriaId": "4A0D7240-62C8-4003-A840-98E818709D9B"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "097FBE5A-56F2-4D49-9188-9AC0AAF43FA3"
|
"matchCriteriaId": "3DE6789D-5DA5-489F-A900-F4788286ACE5"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "FB2CD59D-63E0-4C15-A304-3444B55C8330"
|
"matchCriteriaId": "BA99A58B-F751-4C04-B41B-CBE94998AA42"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "B13F54CE-66AB-491D-A5DB-4AD5F257CB74"
|
"matchCriteriaId": "51D8225C-A74A-451E-9589-F1E00E4728D3"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "82E9F743-E294-4F82-9A0E-BC9943278A60"
|
"matchCriteriaId": "3C3438AF-FCF1-4D77-83D5-27B9989F0683"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "069B9D3F-936D-497B-8162-1093874D5AC5"
|
"matchCriteriaId": "843B6647-BF92-46D1-ADEE-92088D9AD1C4"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "BAEC6109-1152-4DD0-AC37-C571500887E2"
|
"matchCriteriaId": "A4B80A25-3860-4CF5-B8ED-5370EBB42455"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A"
|
"matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "6CF61E52-FF34-4557-9D4A-63030445743F"
|
"matchCriteriaId": "50BE9ECB-4799-48BD-B3BE-7EE27FE3AA40"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "79A8A663-F60A-4425-BFB1-40C132B9E899"
|
"matchCriteriaId": "CEBC59D2-405D-4374-812A-A3AEE0D6D594"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "47A96076-3BBA-45DC-9AF4-0F4A8DD3629F"
|
"matchCriteriaId": "755C3FB5-5D5B-4732-86F9-68A6612BC819"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "3DD94DE9-9ECB-48C5-877B-9B3CBA327A6D"
|
"matchCriteriaId": "968C0544-A2F5-4FA6-A4B8-89113EE95B0A"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8"
|
"matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "31B7C4D4-E347-40C0-8D09-CFB42AEA136D"
|
"matchCriteriaId": "D9D662A9-5D1B-465E-A4B1-A4C86BA207C7"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "AC3F7672-4435-4968-A186-7541B742A00C"
|
"matchCriteriaId": "FBA7690C-8ADA-462E-B671-4D4CB243A483"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA"
|
"matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "5180850E-BA34-470D-807B-6D91DB04B25D"
|
"matchCriteriaId": "A71B59A7-9467-4729-9A24-D5291C059E66"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A"
|
"matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -210,6 +210,18 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "http://secunia.com/advisories/21932",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Patch",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.osvdb.org/28939",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://www.securityfocus.com/bid/20076",
|
"url": "http://www.securityfocus.com/bid/20076",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2006-5000",
|
"id": "CVE-2006-5000",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2006-09-26T20:07:00.000",
|
"published": "2006-09-26T20:07:00.000",
|
||||||
"lastModified": "2019-08-13T14:39:57.590",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -77,8 +77,8 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "2603E3E5-FF48-4C37-B4F4-5152561C5D59"
|
"matchCriteriaId": "ED4F7DAA-DB7C-4CCC-9521-131FEFC776FD"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2006-5001",
|
"id": "CVE-2006-5001",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2006-09-26T20:07:00.000",
|
"published": "2006-09-26T20:07:00.000",
|
||||||
"lastModified": "2019-08-13T14:40:00.340",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -72,14 +72,14 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*",
|
||||||
"versionEndIncluding": "5.05",
|
"versionEndIncluding": "5.05",
|
||||||
"matchCriteriaId": "4F2E45F2-D14B-4C30-88E8-AE443358C8E5"
|
"matchCriteriaId": "50BFB437-2855-401A-AD99-D20A51F2DA82"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "2603E3E5-FF48-4C37-B4F4-5152561C5D59"
|
"matchCriteriaId": "ED4F7DAA-DB7C-4CCC-9521-131FEFC776FD"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2008-0590",
|
"id": "CVE-2008-0590",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2008-02-05T12:00:00.000",
|
"published": "2008-02-05T12:00:00.000",
|
||||||
"lastModified": "2019-08-13T14:40:02.327",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -62,8 +62,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:6.1.0.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:6.1.0.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "9415DF7B-ACD0-4CF9-8560-B04D50A9CCCB"
|
"matchCriteriaId": "1886ECC8-BF8B-4CD6-93BA-39409DD05AE9"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -71,6 +71,13 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://secunia.com/advisories/28753",
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "http://securityreason.com/securityalert/3609",
|
"url": "http://securityreason.com/securityalert/3609",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2019-12143",
|
"id": "CVE-2019-12143",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2019-06-11T21:29:01.053",
|
"published": "2019-06-11T21:29:01.053",
|
||||||
"lastModified": "2019-08-14T11:30:29.080",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -84,9 +84,9 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:*:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*",
|
||||||
"versionEndExcluding": "8.6.1",
|
"versionEndExcluding": "8.6.1",
|
||||||
"matchCriteriaId": "924A9F75-DB9A-4A68-8EAA-8FB3DC151234"
|
"matchCriteriaId": "3E2A0713-785A-47ED-9B41-5679E3707E3F"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2021-24002",
|
"id": "CVE-2021-24002",
|
||||||
"sourceIdentifier": "security@mozilla.org",
|
"sourceIdentifier": "security@mozilla.org",
|
||||||
"published": "2021-06-24T14:15:09.577",
|
"published": "2021-06-24T14:15:09.577",
|
||||||
"lastModified": "2021-07-02T17:01:11.053",
|
"lastModified": "2023-10-11T15:28:21.907",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -70,7 +70,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-88"
|
"value": "CWE-74"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-25852",
|
"id": "CVE-2022-25852",
|
||||||
"sourceIdentifier": "report@snyk.io",
|
"sourceIdentifier": "report@snyk.io",
|
||||||
"published": "2022-06-17T20:15:10.547",
|
"published": "2022-06-17T20:15:10.547",
|
||||||
"lastModified": "2022-06-28T14:53:11.197",
|
"lastModified": "2023-10-11T15:27:34.157",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -90,7 +90,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-88"
|
"value": "CWE-704"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-27665",
|
"id": "CVE-2022-27665",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2023-04-03T14:15:07.327",
|
"published": "2023-04-03T14:15:07.327",
|
||||||
"lastModified": "2023-09-28T20:15:10.110",
|
"lastModified": "2023-10-11T14:45:44.747",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -55,8 +55,8 @@
|
|||||||
"cpeMatch": [
|
"cpeMatch": [
|
||||||
{
|
{
|
||||||
"vulnerable": true,
|
"vulnerable": true,
|
||||||
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:8.6.0:*:*:*:*:*:*:*",
|
"criteria": "cpe:2.3:a:progress:ws_ftp_server:8.6.0:*:*:*:*:*:*:*",
|
||||||
"matchCriteriaId": "99005653-02C0-4C69-A44A-30E2DACB3092"
|
"matchCriteriaId": "C49D4BC9-F739-4BA0-A6D2-E2A0DF15549A"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-4864",
|
"id": "CVE-2022-4864",
|
||||||
"sourceIdentifier": "security@huntr.dev",
|
"sourceIdentifier": "security@huntr.dev",
|
||||||
"published": "2022-12-30T23:15:11.910",
|
"published": "2022-12-30T23:15:11.910",
|
||||||
"lastModified": "2023-01-06T19:33:02.667",
|
"lastModified": "2023-10-11T15:24:48.003",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -63,7 +63,7 @@
|
|||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-88"
|
"value": "CWE-74"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2023-1437",
|
"id": "CVE-2023-1437",
|
||||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||||
"published": "2023-08-02T23:15:10.153",
|
"published": "2023-08-02T23:15:10.153",
|
||||||
"lastModified": "2023-08-08T13:50:58.210",
|
"lastModified": "2023-10-11T15:15:09.400",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent client could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files."
|
"value": "All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.\n\n"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
@ -31,27 +31,47 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "ics-cert@hq.dhs.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-119"
|
"value": "CWE-822"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "ics-cert@hq.dhs.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "CWE-822"
|
"value": "CWE-119"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-28321",
|
"id": "CVE-2023-28321",
|
||||||
"sourceIdentifier": "support@hackerone.com",
|
"sourceIdentifier": "support@hackerone.com",
|
||||||
"published": "2023-05-26T21:15:16.020",
|
"published": "2023-05-26T21:15:16.020",
|
||||||
"lastModified": "2023-10-11T11:15:12.713",
|
"lastModified": "2023-10-11T15:15:09.543",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -284,6 +284,10 @@
|
|||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html",
|
||||||
|
"source": "support@hackerone.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/",
|
||||||
"source": "support@hackerone.com",
|
"source": "support@hackerone.com",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-34985",
|
"id": "CVE-2023-34985",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2023-10-10T17:15:11.283",
|
"published": "2023-10-10T17:15:11.283",
|
||||||
"lastModified": "2023-10-10T17:52:17.703",
|
"lastModified": "2023-10-11T14:28:07.943",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@fortinet.com",
|
"source": "psirt@fortinet.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -34,10 +54,51 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@fortinet.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.5.0",
|
||||||
|
"versionEndIncluding": "8.5.4",
|
||||||
|
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.6.0",
|
||||||
|
"versionEndIncluding": "8.6.5",
|
||||||
|
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
|
||||||
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-34986",
|
"id": "CVE-2023-34986",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2023-10-10T17:15:11.343",
|
"published": "2023-10-10T17:15:11.343",
|
||||||
"lastModified": "2023-10-10T17:52:17.703",
|
"lastModified": "2023-10-11T14:01:04.407",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@fortinet.com",
|
"source": "psirt@fortinet.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -34,10 +54,51 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@fortinet.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.5.0",
|
||||||
|
"versionEndIncluding": "8.5.4",
|
||||||
|
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.6.0",
|
||||||
|
"versionEndIncluding": "8.6.5",
|
||||||
|
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
|
||||||
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-34987",
|
"id": "CVE-2023-34987",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2023-10-10T17:15:11.403",
|
"published": "2023-10-10T17:15:11.403",
|
||||||
"lastModified": "2023-10-10T17:52:17.703",
|
"lastModified": "2023-10-11T14:28:16.647",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@fortinet.com",
|
"source": "psirt@fortinet.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -34,10 +54,51 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@fortinet.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.5.0",
|
||||||
|
"versionEndIncluding": "8.5.4",
|
||||||
|
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.6.0",
|
||||||
|
"versionEndIncluding": "8.6.5",
|
||||||
|
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
|
||||||
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-34988",
|
"id": "CVE-2023-34988",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2023-10-10T17:15:11.463",
|
"published": "2023-10-10T17:15:11.463",
|
||||||
"lastModified": "2023-10-10T17:52:17.703",
|
"lastModified": "2023-10-11T14:28:24.797",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@fortinet.com",
|
"source": "psirt@fortinet.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -34,10 +54,51 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@fortinet.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.5.0",
|
||||||
|
"versionEndIncluding": "8.5.4",
|
||||||
|
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.6.0",
|
||||||
|
"versionEndIncluding": "8.6.5",
|
||||||
|
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
|
||||||
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-34989",
|
"id": "CVE-2023-34989",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2023-10-10T17:15:11.520",
|
"published": "2023-10-10T17:15:11.520",
|
||||||
"lastModified": "2023-10-10T17:52:17.703",
|
"lastModified": "2023-10-11T14:28:40.233",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@fortinet.com",
|
"source": "psirt@fortinet.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -34,10 +54,51 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@fortinet.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.5.0",
|
||||||
|
"versionEndIncluding": "8.5.4",
|
||||||
|
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.6.0",
|
||||||
|
"versionEndIncluding": "8.6.5",
|
||||||
|
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
|
||||||
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-34993",
|
"id": "CVE-2023-34993",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2023-10-10T17:15:11.670",
|
"published": "2023-10-10T17:15:11.670",
|
||||||
"lastModified": "2023-10-10T17:52:17.703",
|
"lastModified": "2023-10-11T14:29:10.010",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@fortinet.com",
|
"source": "psirt@fortinet.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -34,10 +54,51 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@fortinet.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.5.0",
|
||||||
|
"versionEndIncluding": "8.5.4",
|
||||||
|
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.6.0",
|
||||||
|
"versionEndIncluding": "8.6.5",
|
||||||
|
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
|
||||||
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-36547",
|
"id": "CVE-2023-36547",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2023-10-10T17:15:11.827",
|
"published": "2023-10-10T17:15:11.827",
|
||||||
"lastModified": "2023-10-10T17:52:17.703",
|
"lastModified": "2023-10-11T14:29:22.937",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@fortinet.com",
|
"source": "psirt@fortinet.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -34,10 +54,51 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@fortinet.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.5.0",
|
||||||
|
"versionEndIncluding": "8.5.4",
|
||||||
|
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.6.0",
|
||||||
|
"versionEndIncluding": "8.6.5",
|
||||||
|
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
|
||||||
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-36548",
|
"id": "CVE-2023-36548",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2023-10-10T17:15:11.890",
|
"published": "2023-10-10T17:15:11.890",
|
||||||
"lastModified": "2023-10-10T17:52:09.820",
|
"lastModified": "2023-10-11T14:29:33.770",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@fortinet.com",
|
"source": "psirt@fortinet.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -34,10 +54,51 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@fortinet.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.5.0",
|
||||||
|
"versionEndIncluding": "8.5.4",
|
||||||
|
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.6.0",
|
||||||
|
"versionEndIncluding": "8.6.5",
|
||||||
|
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
|
||||||
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-36549",
|
"id": "CVE-2023-36549",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2023-10-10T17:15:11.953",
|
"published": "2023-10-10T17:15:11.953",
|
||||||
"lastModified": "2023-10-10T17:52:09.820",
|
"lastModified": "2023-10-11T14:30:18.603",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@fortinet.com",
|
"source": "psirt@fortinet.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -34,10 +54,51 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@fortinet.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.5.0",
|
||||||
|
"versionEndIncluding": "8.5.4",
|
||||||
|
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.6.0",
|
||||||
|
"versionEndIncluding": "8.6.5",
|
||||||
|
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
|
||||||
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-36550",
|
"id": "CVE-2023-36550",
|
||||||
"sourceIdentifier": "psirt@fortinet.com",
|
"sourceIdentifier": "psirt@fortinet.com",
|
||||||
"published": "2023-10-10T17:15:12.017",
|
"published": "2023-10-10T17:15:12.017",
|
||||||
"lastModified": "2023-10-10T17:52:09.820",
|
"lastModified": "2023-10-11T14:30:45.603",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -12,6 +12,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "psirt@fortinet.com",
|
"source": "psirt@fortinet.com",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -34,10 +54,51 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"references": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
|
"source": "nvd@nist.gov",
|
||||||
"source": "psirt@fortinet.com"
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-78"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.5.0",
|
||||||
|
"versionEndIncluding": "8.5.4",
|
||||||
|
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.6.0",
|
||||||
|
"versionEndIncluding": "8.6.5",
|
||||||
|
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
|
||||||
|
"source": "psirt@fortinet.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-37538",
|
"id": "CVE-2023-37538",
|
||||||
"sourceIdentifier": "psirt@hcl.com",
|
"sourceIdentifier": "psirt@hcl.com",
|
||||||
"published": "2023-10-11T13:15:09.557",
|
"published": "2023-10-11T13:15:09.557",
|
||||||
"lastModified": "2023-10-11T13:15:09.557",
|
"lastModified": "2023-10-11T14:23:06.207",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-44105",
|
"id": "CVE-2023-44105",
|
||||||
"sourceIdentifier": "psirt@huawei.com",
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
"published": "2023-10-11T13:15:09.820",
|
"published": "2023-10-11T13:15:09.820",
|
||||||
"lastModified": "2023-10-11T13:15:09.820",
|
"lastModified": "2023-10-11T14:23:06.207",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-44107",
|
"id": "CVE-2023-44107",
|
||||||
"sourceIdentifier": "psirt@huawei.com",
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
"published": "2023-10-11T13:15:09.977",
|
"published": "2023-10-11T13:15:09.977",
|
||||||
"lastModified": "2023-10-11T13:15:09.977",
|
"lastModified": "2023-10-11T14:23:06.207",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-44108",
|
"id": "CVE-2023-44108",
|
||||||
"sourceIdentifier": "psirt@huawei.com",
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
"published": "2023-10-11T13:15:10.030",
|
"published": "2023-10-11T13:15:10.030",
|
||||||
"lastModified": "2023-10-11T13:15:10.030",
|
"lastModified": "2023-10-11T14:23:06.207",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-44114",
|
"id": "CVE-2023-44114",
|
||||||
"sourceIdentifier": "psirt@huawei.com",
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
"published": "2023-10-11T13:15:10.097",
|
"published": "2023-10-11T13:15:10.097",
|
||||||
"lastModified": "2023-10-11T13:15:10.097",
|
"lastModified": "2023-10-11T14:23:06.207",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-44116",
|
"id": "CVE-2023-44116",
|
||||||
"sourceIdentifier": "psirt@huawei.com",
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
"published": "2023-10-11T13:15:10.160",
|
"published": "2023-10-11T13:15:10.160",
|
||||||
"lastModified": "2023-10-11T13:15:10.160",
|
"lastModified": "2023-10-11T14:23:06.207",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-44118",
|
"id": "CVE-2023-44118",
|
||||||
"sourceIdentifier": "psirt@huawei.com",
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
"published": "2023-10-11T13:15:10.223",
|
"published": "2023-10-11T13:15:10.223",
|
||||||
"lastModified": "2023-10-11T13:15:10.223",
|
"lastModified": "2023-10-11T14:23:06.207",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-44119",
|
"id": "CVE-2023-44119",
|
||||||
"sourceIdentifier": "psirt@huawei.com",
|
"sourceIdentifier": "psirt@huawei.com",
|
||||||
"published": "2023-10-11T13:15:10.277",
|
"published": "2023-10-11T13:15:10.277",
|
||||||
"lastModified": "2023-10-11T13:15:10.277",
|
"lastModified": "2023-10-11T14:23:06.207",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-44981",
|
"id": "CVE-2023-44981",
|
||||||
"sourceIdentifier": "security@apache.org",
|
"sourceIdentifier": "security@apache.org",
|
||||||
"published": "2023-10-11T12:15:11.760",
|
"published": "2023-10-11T12:15:11.760",
|
||||||
"lastModified": "2023-10-11T12:54:05.787",
|
"lastModified": "2023-10-11T15:15:09.733",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -24,6 +24,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/4",
|
||||||
|
"source": "security@apache.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b",
|
"url": "https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b",
|
||||||
"source": "security@apache.org"
|
"source": "security@apache.org"
|
||||||
|
20
CVE-2023/CVE-2023-453xx/CVE-2023-45396.json
Normal file
20
CVE-2023/CVE-2023-453xx/CVE-2023-45396.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-45396",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-10-11T14:15:09.993",
|
||||||
|
"lastModified": "2023-10-11T14:23:06.207",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An Insecure Direct Object Reference (IDOR) vulnerability leads to events profiles access in Elenos ETG150 FM transmitter running on version 3.12."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/strik3r0x1/Vulns/blob/main/(IDOR)%20leads%20to%20events%20profiles%20access%20-%20Elenos.md",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-49xx/CVE-2023-4957.json
Normal file
55
CVE-2023/CVE-2023-49xx/CVE-2023-4957.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-4957",
|
||||||
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||||
|
"published": "2023-10-11T14:15:10.047",
|
||||||
|
"lastModified": "2023-10-11T14:23:06.207",
|
||||||
|
"vulnStatus": "Awaiting Analysis",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": " A vulnerability of authentication bypass has been found on a Zebra Technologies ZTC ZT410-203dpi ZPL printer. This vulnerability allows an attacker that is in the same network as the printer, to change the username and password for the Web Page by sending a specially crafted POST request to the setvarsResults.cgi file. For this vulnerability to be exploitable, the printers protected mode must be disabled."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"attackVector": "ADJACENT_NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve-coordination@incibe.es",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-288"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/authentication-bypass-zebra-ztc",
|
||||||
|
"source": "cve-coordination@incibe.es"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,19 +2,43 @@
|
|||||||
"id": "CVE-2023-5233",
|
"id": "CVE-2023-5233",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2023-09-28T05:15:46.513",
|
"published": "2023-09-28T05:15:46.513",
|
||||||
"lastModified": "2023-09-28T12:44:04.973",
|
"lastModified": "2023-10-11T14:10:16.687",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "The Font Awesome Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'fawesome' shortcode in versions up to, and including, 5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
"value": "The Font Awesome Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'fawesome' shortcode in versions up to, and including, 5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El complemento Font Awesome Integration para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de un c\u00f3digo abreviado 'fawesome' en versiones hasta la 5.0 incluida, debido a una insuficiente sanitizaci\u00f3n de entrada y escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada.\n"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "security@wordfence.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||||
@ -46,14 +70,38 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"configurations": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/font-awesome-integration/tags/5.0/font-awesome-integration.php#L48",
|
"nodes": [
|
||||||
"source": "security@wordfence.com"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2791f48-895f-4099-87ec-41aaac2494a2?source=cve",
|
"operator": "OR",
|
||||||
"source": "security@wordfence.com"
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:fontawesome:font_awesome_integration:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndIncluding": "5.0",
|
||||||
|
"matchCriteriaId": "772F3254-6115-46FD-9429-9BDAD69EA8D7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/font-awesome-integration/tags/5.0/font-awesome-integration.php#L48",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2791f48-895f-4099-87ec-41aaac2494a2?source=cve",
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
87
README.md
87
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-10-11T14:00:25.388339+00:00
|
2023-10-11T16:00:24.797103+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-10-11T14:00:08.897000+00:00
|
2023-10-11T15:28:21.907000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -29,69 +29,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
227562
|
227564
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `25`
|
Recently added CVEs: `2`
|
||||||
|
|
||||||
* [CVE-2023-26370](CVE-2023/CVE-2023-263xx/CVE-2023-26370.json) (`2023-10-11T12:15:10.580`)
|
* [CVE-2023-45396](CVE-2023/CVE-2023-453xx/CVE-2023-45396.json) (`2023-10-11T14:15:09.993`)
|
||||||
* [CVE-2023-38216](CVE-2023/CVE-2023-382xx/CVE-2023-38216.json) (`2023-10-11T12:15:10.797`)
|
* [CVE-2023-4957](CVE-2023/CVE-2023-49xx/CVE-2023-4957.json) (`2023-10-11T14:15:10.047`)
|
||||||
* [CVE-2023-38217](CVE-2023/CVE-2023-382xx/CVE-2023-38217.json) (`2023-10-11T12:15:10.907`)
|
|
||||||
* [CVE-2023-41304](CVE-2023/CVE-2023-413xx/CVE-2023-41304.json) (`2023-10-11T12:15:10.993`)
|
|
||||||
* [CVE-2023-44095](CVE-2023/CVE-2023-440xx/CVE-2023-44095.json) (`2023-10-11T12:15:11.070`)
|
|
||||||
* [CVE-2023-44097](CVE-2023/CVE-2023-440xx/CVE-2023-44097.json) (`2023-10-11T12:15:11.130`)
|
|
||||||
* [CVE-2023-44100](CVE-2023/CVE-2023-441xx/CVE-2023-44100.json) (`2023-10-11T12:15:11.193`)
|
|
||||||
* [CVE-2023-44101](CVE-2023/CVE-2023-441xx/CVE-2023-44101.json) (`2023-10-11T12:15:11.250`)
|
|
||||||
* [CVE-2023-44102](CVE-2023/CVE-2023-441xx/CVE-2023-44102.json) (`2023-10-11T12:15:11.313`)
|
|
||||||
* [CVE-2023-44103](CVE-2023/CVE-2023-441xx/CVE-2023-44103.json) (`2023-10-11T12:15:11.357`)
|
|
||||||
* [CVE-2023-44104](CVE-2023/CVE-2023-441xx/CVE-2023-44104.json) (`2023-10-11T12:15:11.520`)
|
|
||||||
* [CVE-2023-44106](CVE-2023/CVE-2023-441xx/CVE-2023-44106.json) (`2023-10-11T12:15:11.570`)
|
|
||||||
* [CVE-2023-44110](CVE-2023/CVE-2023-441xx/CVE-2023-44110.json) (`2023-10-11T12:15:11.623`)
|
|
||||||
* [CVE-2023-44111](CVE-2023/CVE-2023-441xx/CVE-2023-44111.json) (`2023-10-11T12:15:11.713`)
|
|
||||||
* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2023-10-11T12:15:11.760`)
|
|
||||||
* [CVE-2023-5520](CVE-2023/CVE-2023-55xx/CVE-2023-5520.json) (`2023-10-11T12:15:11.857`)
|
|
||||||
* [CVE-2023-5521](CVE-2023/CVE-2023-55xx/CVE-2023-5521.json) (`2023-10-11T12:15:11.937`)
|
|
||||||
* [CVE-2023-37538](CVE-2023/CVE-2023-375xx/CVE-2023-37538.json) (`2023-10-11T13:15:09.557`)
|
|
||||||
* [CVE-2023-44105](CVE-2023/CVE-2023-441xx/CVE-2023-44105.json) (`2023-10-11T13:15:09.820`)
|
|
||||||
* [CVE-2023-44107](CVE-2023/CVE-2023-441xx/CVE-2023-44107.json) (`2023-10-11T13:15:09.977`)
|
|
||||||
* [CVE-2023-44108](CVE-2023/CVE-2023-441xx/CVE-2023-44108.json) (`2023-10-11T13:15:10.030`)
|
|
||||||
* [CVE-2023-44114](CVE-2023/CVE-2023-441xx/CVE-2023-44114.json) (`2023-10-11T13:15:10.097`)
|
|
||||||
* [CVE-2023-44116](CVE-2023/CVE-2023-441xx/CVE-2023-44116.json) (`2023-10-11T13:15:10.160`)
|
|
||||||
* [CVE-2023-44118](CVE-2023/CVE-2023-441xx/CVE-2023-44118.json) (`2023-10-11T13:15:10.223`)
|
|
||||||
* [CVE-2023-44119](CVE-2023/CVE-2023-441xx/CVE-2023-44119.json) (`2023-10-11T13:15:10.277`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `28`
|
Recently modified CVEs: `41`
|
||||||
|
|
||||||
* [CVE-2021-31806](CVE-2021/CVE-2021-318xx/CVE-2021-31806.json) (`2023-10-11T12:15:10.147`)
|
* [CVE-2022-27665](CVE-2022/CVE-2022-276xx/CVE-2022-27665.json) (`2023-10-11T14:45:44.747`)
|
||||||
* [CVE-2021-31807](CVE-2021/CVE-2021-318xx/CVE-2021-31807.json) (`2023-10-11T12:15:10.237`)
|
* [CVE-2022-4864](CVE-2022/CVE-2022-48xx/CVE-2022-4864.json) (`2023-10-11T15:24:48.003`)
|
||||||
* [CVE-2021-31808](CVE-2021/CVE-2021-318xx/CVE-2021-31808.json) (`2023-10-11T12:15:10.333`)
|
* [CVE-2022-25852](CVE-2022/CVE-2022-258xx/CVE-2022-25852.json) (`2023-10-11T15:27:34.157`)
|
||||||
* [CVE-2021-33620](CVE-2021/CVE-2021-336xx/CVE-2021-33620.json) (`2023-10-11T12:15:10.413`)
|
* [CVE-2023-34986](CVE-2023/CVE-2023-349xx/CVE-2023-34986.json) (`2023-10-11T14:01:04.407`)
|
||||||
* [CVE-2022-42451](CVE-2022/CVE-2022-424xx/CVE-2022-42451.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-5233](CVE-2023/CVE-2023-52xx/CVE-2023-5233.json) (`2023-10-11T14:10:16.687`)
|
||||||
* [CVE-2022-44757](CVE-2022/CVE-2022-447xx/CVE-2022-44757.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-37538](CVE-2023/CVE-2023-375xx/CVE-2023-37538.json) (`2023-10-11T14:23:06.207`)
|
||||||
* [CVE-2022-44758](CVE-2022/CVE-2022-447xx/CVE-2022-44758.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-44105](CVE-2023/CVE-2023-441xx/CVE-2023-44105.json) (`2023-10-11T14:23:06.207`)
|
||||||
* [CVE-2023-44094](CVE-2023/CVE-2023-440xx/CVE-2023-44094.json) (`2023-10-11T12:54:05.787`)
|
* [CVE-2023-44107](CVE-2023/CVE-2023-441xx/CVE-2023-44107.json) (`2023-10-11T14:23:06.207`)
|
||||||
* [CVE-2023-44096](CVE-2023/CVE-2023-440xx/CVE-2023-44096.json) (`2023-10-11T12:54:05.787`)
|
* [CVE-2023-44108](CVE-2023/CVE-2023-441xx/CVE-2023-44108.json) (`2023-10-11T14:23:06.207`)
|
||||||
* [CVE-2023-44109](CVE-2023/CVE-2023-441xx/CVE-2023-44109.json) (`2023-10-11T12:54:05.787`)
|
* [CVE-2023-44114](CVE-2023/CVE-2023-441xx/CVE-2023-44114.json) (`2023-10-11T14:23:06.207`)
|
||||||
* [CVE-2023-44689](CVE-2023/CVE-2023-446xx/CVE-2023-44689.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-44116](CVE-2023/CVE-2023-441xx/CVE-2023-44116.json) (`2023-10-11T14:23:06.207`)
|
||||||
* [CVE-2023-45194](CVE-2023/CVE-2023-451xx/CVE-2023-45194.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-44118](CVE-2023/CVE-2023-441xx/CVE-2023-44118.json) (`2023-10-11T14:23:06.207`)
|
||||||
* [CVE-2023-5511](CVE-2023/CVE-2023-55xx/CVE-2023-5511.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-44119](CVE-2023/CVE-2023-441xx/CVE-2023-44119.json) (`2023-10-11T14:23:06.207`)
|
||||||
* [CVE-2023-26318](CVE-2023/CVE-2023-263xx/CVE-2023-26318.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-34985](CVE-2023/CVE-2023-349xx/CVE-2023-34985.json) (`2023-10-11T14:28:07.943`)
|
||||||
* [CVE-2023-26319](CVE-2023/CVE-2023-263xx/CVE-2023-26319.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-34987](CVE-2023/CVE-2023-349xx/CVE-2023-34987.json) (`2023-10-11T14:28:16.647`)
|
||||||
* [CVE-2023-26320](CVE-2023/CVE-2023-263xx/CVE-2023-26320.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-34988](CVE-2023/CVE-2023-349xx/CVE-2023-34988.json) (`2023-10-11T14:28:24.797`)
|
||||||
* [CVE-2023-37536](CVE-2023/CVE-2023-375xx/CVE-2023-37536.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-34989](CVE-2023/CVE-2023-349xx/CVE-2023-34989.json) (`2023-10-11T14:28:40.233`)
|
||||||
* [CVE-2023-44997](CVE-2023/CVE-2023-449xx/CVE-2023-44997.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-34993](CVE-2023/CVE-2023-349xx/CVE-2023-34993.json) (`2023-10-11T14:29:10.010`)
|
||||||
* [CVE-2023-4990](CVE-2023/CVE-2023-49xx/CVE-2023-4990.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-36547](CVE-2023/CVE-2023-365xx/CVE-2023-36547.json) (`2023-10-11T14:29:22.937`)
|
||||||
* [CVE-2023-42138](CVE-2023/CVE-2023-421xx/CVE-2023-42138.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-36548](CVE-2023/CVE-2023-365xx/CVE-2023-36548.json) (`2023-10-11T14:29:33.770`)
|
||||||
* [CVE-2023-44093](CVE-2023/CVE-2023-440xx/CVE-2023-44093.json) (`2023-10-11T12:54:12.883`)
|
* [CVE-2023-36549](CVE-2023/CVE-2023-365xx/CVE-2023-36549.json) (`2023-10-11T14:30:18.603`)
|
||||||
* [CVE-2023-26239](CVE-2023/CVE-2023-262xx/CVE-2023-26239.json) (`2023-10-11T13:59:48.340`)
|
* [CVE-2023-36550](CVE-2023/CVE-2023-365xx/CVE-2023-36550.json) (`2023-10-11T14:30:45.603`)
|
||||||
* [CVE-2023-26236](CVE-2023/CVE-2023-262xx/CVE-2023-26236.json) (`2023-10-11T14:00:04.993`)
|
* [CVE-2023-1437](CVE-2023/CVE-2023-14xx/CVE-2023-1437.json) (`2023-10-11T15:15:09.400`)
|
||||||
* [CVE-2023-26237](CVE-2023/CVE-2023-262xx/CVE-2023-26237.json) (`2023-10-11T14:00:07.037`)
|
* [CVE-2023-28321](CVE-2023/CVE-2023-283xx/CVE-2023-28321.json) (`2023-10-11T15:15:09.543`)
|
||||||
* [CVE-2023-26238](CVE-2023/CVE-2023-262xx/CVE-2023-26238.json) (`2023-10-11T14:00:08.897`)
|
* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2023-10-11T15:15:09.733`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
Loading…
x
Reference in New Issue
Block a user