Auto-Update: 2023-10-11T16:00:24.797103+00:00

This commit is contained in:
cad-safe-bot 2023-10-11 16:00:28 +00:00
parent 5063775eff
commit ce063f05d9
44 changed files with 1088 additions and 283 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-1999-1170",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-01-02T05:00:00.000",
"lastModified": "2019-08-13T14:39:21.853",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -63,13 +63,13 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF69630-9F18-4DDE-81B3-7F37DB8F4498"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BE1954-74C5-4A91-9C9A-C0647F281017"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
"matchCriteriaId": "097FBE5A-56F2-4D49-9188-9AC0AAF43FA3"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
"matchCriteriaId": "3DE6789D-5DA5-489F-A900-F4788286ACE5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-1999-1171",
"sourceIdentifier": "cve@mitre.org",
"published": "1999-02-02T05:00:00.000",
"lastModified": "2019-08-13T14:39:21.853",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -63,13 +63,13 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF69630-9F18-4DDE-81B3-7F37DB8F4498"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BE1954-74C5-4A91-9C9A-C0647F281017"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
"matchCriteriaId": "097FBE5A-56F2-4D49-9188-9AC0AAF43FA3"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
"matchCriteriaId": "3DE6789D-5DA5-489F-A900-F4788286ACE5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2001-1021",
"sourceIdentifier": "cve@mitre.org",
"published": "2001-07-26T04:00:00.000",
"lastModified": "2019-08-13T14:39:34.857",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -58,8 +58,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2002-0826",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-08-12T04:00:00.000",
"lastModified": "2019-08-13T14:39:45.153",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -58,8 +58,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2003-0772",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-09-22T04:00:00.000",
"lastModified": "2019-08-13T14:39:50.873",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -67,8 +67,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058"
}
]
}
@ -80,6 +80,10 @@
"url": "http://marc.info/?l=bugtraq&m=106288825902868&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/9671",
"source": "cve@mitre.org"
},
{
"url": "http://www.kb.cert.org/vuls/id/219140",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2004-1643",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-08-29T04:00:00.000",
"lastModified": "2019-08-13T14:39:57.590",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -58,8 +58,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2603E3E5-FF48-4C37-B4F4-5152561C5D59"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ED4F7DAA-DB7C-4CCC-9521-131FEFC776FD"
}
]
}
@ -71,6 +71,14 @@
"url": "http://marc.info/?l=bugtraq&m=109389890712888&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/12406",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/11065",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2004-1848",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-12-31T05:00:00.000",
"lastModified": "2019-08-13T14:39:55.530",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -68,93 +68,93 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6286D79-17FC-4520-AE4E-CF2FEFB75DC4"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A886D80F-D72C-4BDF-A65F-27CA82348C48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BB026283-A9A2-4034-B843-C10E025637EB"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D7240-62C8-4003-A840-98E818709D9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2CD59D-63E0-4C15-A304-3444B55C8330"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BA99A58B-F751-4C04-B41B-CBE94998AA42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B13F54CE-66AB-491D-A5DB-4AD5F257CB74"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "51D8225C-A74A-451E-9589-F1E00E4728D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "82E9F743-E294-4F82-9A0E-BC9943278A60"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3C3438AF-FCF1-4D77-83D5-27B9989F0683"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "069B9D3F-936D-497B-8162-1093874D5AC5"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "843B6647-BF92-46D1-ADEE-92088D9AD1C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAEC6109-1152-4DD0-AC37-C571500887E2"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B80A25-3860-4CF5-B8ED-5370EBB42455"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6CF61E52-FF34-4557-9D4A-63030445743F"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50BE9ECB-4799-48BD-B3BE-7EE27FE3AA40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79A8A663-F60A-4425-BFB1-40C132B9E899"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBC59D2-405D-4374-812A-A3AEE0D6D594"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "47A96076-3BBA-45DC-9AF4-0F4A8DD3629F"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "755C3FB5-5D5B-4732-86F9-68A6612BC819"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD94DE9-9ECB-48C5-877B-9B3CBA327A6D"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "968C0544-A2F5-4FA6-A4B8-89113EE95B0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "31B7C4D4-E347-40C0-8D09-CFB42AEA136D"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9D662A9-5D1B-465E-A4B1-A4C86BA207C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3F7672-4435-4968-A186-7541B742A00C"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA7690C-8ADA-462E-B671-4D4CB243A483"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5180850E-BA34-470D-807B-6D91DB04B25D"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A71B59A7-9467-4729-9A24-D5291C059E66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21"
}
]
}
@ -166,6 +166,14 @@
"url": "http://marc.info/?l=bugtraq&m=108006717731989&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/11206",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://securitytracker.com/id?1009529",
"source": "cve@mitre.org",
@ -173,6 +181,10 @@
"Exploit"
]
},
{
"url": "http://www.osvdb.org/4542",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/9953",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2004-1883",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-12-31T05:00:00.000",
"lastModified": "2019-08-13T14:39:55.530",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -58,8 +58,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21"
}
]
}
@ -71,6 +71,13 @@
"url": "http://marc.info/?l=bugtraq&m=108006553222397&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/11206",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/archive/1/358361",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2004-1884",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-03-23T05:00:00.000",
"lastModified": "2019-08-13T14:39:55.530",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -88,93 +88,93 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6286D79-17FC-4520-AE4E-CF2FEFB75DC4"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A886D80F-D72C-4BDF-A65F-27CA82348C48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BB026283-A9A2-4034-B843-C10E025637EB"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D7240-62C8-4003-A840-98E818709D9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2CD59D-63E0-4C15-A304-3444B55C8330"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BA99A58B-F751-4C04-B41B-CBE94998AA42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B13F54CE-66AB-491D-A5DB-4AD5F257CB74"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "51D8225C-A74A-451E-9589-F1E00E4728D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "82E9F743-E294-4F82-9A0E-BC9943278A60"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3C3438AF-FCF1-4D77-83D5-27B9989F0683"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "069B9D3F-936D-497B-8162-1093874D5AC5"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "843B6647-BF92-46D1-ADEE-92088D9AD1C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAEC6109-1152-4DD0-AC37-C571500887E2"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B80A25-3860-4CF5-B8ED-5370EBB42455"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6CF61E52-FF34-4557-9D4A-63030445743F"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50BE9ECB-4799-48BD-B3BE-7EE27FE3AA40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79A8A663-F60A-4425-BFB1-40C132B9E899"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBC59D2-405D-4374-812A-A3AEE0D6D594"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "47A96076-3BBA-45DC-9AF4-0F4A8DD3629F"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "755C3FB5-5D5B-4732-86F9-68A6612BC819"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD94DE9-9ECB-48C5-877B-9B3CBA327A6D"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "968C0544-A2F5-4FA6-A4B8-89113EE95B0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "31B7C4D4-E347-40C0-8D09-CFB42AEA136D"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9D662A9-5D1B-465E-A4B1-A4C86BA207C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3F7672-4435-4968-A186-7541B742A00C"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA7690C-8ADA-462E-B671-4D4CB243A483"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5180850E-BA34-470D-807B-6D91DB04B25D"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A71B59A7-9467-4729-9A24-D5291C059E66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21"
}
]
}
@ -186,6 +186,15 @@
"url": "http://marc.info/?l=bugtraq&m=108006581418116&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/11206",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/9953",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2004-1885",
"sourceIdentifier": "cve@mitre.org",
"published": "2004-12-31T05:00:00.000",
"lastModified": "2019-08-13T14:39:55.530",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -58,8 +58,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21"
}
]
}
@ -71,6 +71,14 @@
"url": "http://marc.info/?l=bugtraq&m=108006581418116&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/11206",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/9953",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2006-4847",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-19T01:07:00.000",
"lastModified": "2019-08-13T14:40:00.340",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"evaluatorSolution": "This vulnerability is addressed in the following product update:\r\nIpswitch, WS_FTP Server, 5.05 Hotfix 1",
"descriptions": [
@ -93,109 +93,109 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.05",
"matchCriteriaId": "4F2E45F2-D14B-4C30-88E8-AE443358C8E5"
"matchCriteriaId": "50BFB437-2855-401A-AD99-D20A51F2DA82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6286D79-17FC-4520-AE4E-CF2FEFB75DC4"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A886D80F-D72C-4BDF-A65F-27CA82348C48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF69630-9F18-4DDE-81B3-7F37DB8F4498"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BE1954-74C5-4A91-9C9A-C0647F281017"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BB026283-A9A2-4034-B843-C10E025637EB"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0D7240-62C8-4003-A840-98E818709D9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
"matchCriteriaId": "097FBE5A-56F2-4D49-9188-9AC0AAF43FA3"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*",
"matchCriteriaId": "3DE6789D-5DA5-489F-A900-F4788286ACE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FB2CD59D-63E0-4C15-A304-3444B55C8330"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BA99A58B-F751-4C04-B41B-CBE94998AA42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B13F54CE-66AB-491D-A5DB-4AD5F257CB74"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "51D8225C-A74A-451E-9589-F1E00E4728D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "82E9F743-E294-4F82-9A0E-BC9943278A60"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3C3438AF-FCF1-4D77-83D5-27B9989F0683"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "069B9D3F-936D-497B-8162-1093874D5AC5"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "843B6647-BF92-46D1-ADEE-92088D9AD1C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAEC6109-1152-4DD0-AC37-C571500887E2"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B80A25-3860-4CF5-B8ED-5370EBB42455"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0F5DCEA-664A-46DA-8799-D50DA41ABF2A"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B58011-9D3B-432C-93B1-47938F7E2D43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6CF61E52-FF34-4557-9D4A-63030445743F"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50BE9ECB-4799-48BD-B3BE-7EE27FE3AA40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79A8A663-F60A-4425-BFB1-40C132B9E899"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBC59D2-405D-4374-812A-A3AEE0D6D594"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "47A96076-3BBA-45DC-9AF4-0F4A8DD3629F"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "755C3FB5-5D5B-4732-86F9-68A6612BC819"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD94DE9-9ECB-48C5-877B-9B3CBA327A6D"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "968C0544-A2F5-4FA6-A4B8-89113EE95B0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "896E5E9E-EE09-44CB-AD87-5CA56C0973F8"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E33B458B-F945-4D1A-81B7-F07CCC183C14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "31B7C4D4-E347-40C0-8D09-CFB42AEA136D"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D9D662A9-5D1B-465E-A4B1-A4C86BA207C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3F7672-4435-4968-A186-7541B742A00C"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA7690C-8ADA-462E-B671-4D4CB243A483"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C3A8C8C4-8C03-4020-9F63-402C313BD7CA"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "29B11EAC-796C-43E4-A150-F3FE3F19A058"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5180850E-BA34-470D-807B-6D91DB04B25D"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A71B59A7-9467-4729-9A24-D5291C059E66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1D40FCC0-A681-4FC3-A3F6-4C6B084F470A"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1D0E89-C64F-4027-BF44-8F7159A5AE21"
}
]
}
@ -210,6 +210,18 @@
"Patch"
]
},
{
"url": "http://secunia.com/advisories/21932",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.osvdb.org/28939",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/20076",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2006-5000",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-26T20:07:00.000",
"lastModified": "2019-08-13T14:39:57.590",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -77,8 +77,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2603E3E5-FF48-4C37-B4F4-5152561C5D59"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ED4F7DAA-DB7C-4CCC-9521-131FEFC776FD"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2006-5001",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-26T20:07:00.000",
"lastModified": "2019-08-13T14:40:00.340",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -72,14 +72,14 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.05",
"matchCriteriaId": "4F2E45F2-D14B-4C30-88E8-AE443358C8E5"
"matchCriteriaId": "50BFB437-2855-401A-AD99-D20A51F2DA82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2603E3E5-FF48-4C37-B4F4-5152561C5D59"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ED4F7DAA-DB7C-4CCC-9521-131FEFC776FD"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2008-0590",
"sourceIdentifier": "cve@mitre.org",
"published": "2008-02-05T12:00:00.000",
"lastModified": "2019-08-13T14:40:02.327",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -62,8 +62,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:6.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9415DF7B-ACD0-4CF9-8560-B04D50A9CCCB"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:6.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1886ECC8-BF8B-4CD6-93BA-39409DD05AE9"
}
]
}
@ -71,6 +71,13 @@
}
],
"references": [
{
"url": "http://secunia.com/advisories/28753",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://securityreason.com/securityalert/3609",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-12143",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-06-11T21:29:01.053",
"lastModified": "2019-08-14T11:30:29.080",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "924A9F75-DB9A-4A68-8EAA-8FB3DC151234"
"matchCriteriaId": "3E2A0713-785A-47ED-9B41-5679E3707E3F"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-24002",
"sourceIdentifier": "security@mozilla.org",
"published": "2021-06-24T14:15:09.577",
"lastModified": "2021-07-02T17:01:11.053",
"lastModified": "2023-10-11T15:28:21.907",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-88"
"value": "CWE-74"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-25852",
"sourceIdentifier": "report@snyk.io",
"published": "2022-06-17T20:15:10.547",
"lastModified": "2022-06-28T14:53:11.197",
"lastModified": "2023-10-11T15:27:34.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-88"
"value": "CWE-704"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27665",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-03T14:15:07.327",
"lastModified": "2023-09-28T20:15:10.110",
"lastModified": "2023-10-11T14:45:44.747",
"vulnStatus": "Modified",
"descriptions": [
{
@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:ipswitch_ws_ftp_server:8.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99005653-02C0-4C69-A44A-30E2DACB3092"
"criteria": "cpe:2.3:a:progress:ws_ftp_server:8.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C49D4BC9-F739-4BA0-A6D2-E2A0DF15549A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4864",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-12-30T23:15:11.910",
"lastModified": "2023-01-06T19:33:02.667",
"lastModified": "2023-10-11T15:24:48.003",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -63,7 +63,7 @@
"description": [
{
"lang": "en",
"value": "CWE-88"
"value": "CWE-74"
}
]
},

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-1437",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-08-02T23:15:10.153",
"lastModified": "2023-08-08T13:50:58.210",
"vulnStatus": "Analyzed",
"lastModified": "2023-10-11T15:15:09.400",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent client could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files."
"value": "All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.\n\n"
}
],
"metrics": {
@ -31,27 +31,47 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-822"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-822"
"value": "CWE-119"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28321",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-05-26T21:15:16.020",
"lastModified": "2023-10-11T11:15:12.713",
"lastModified": "2023-10-11T15:15:09.543",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
@ -284,6 +284,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html",
"source": "support@hackerone.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/",
"source": "support@hackerone.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34985",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:11.283",
"lastModified": "2023-10-10T17:52:17.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:28:07.943",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
"source": "psirt@fortinet.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndIncluding": "8.5.4",
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.5",
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34986",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:11.343",
"lastModified": "2023-10-10T17:52:17.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:01:04.407",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
"source": "psirt@fortinet.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndIncluding": "8.5.4",
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.5",
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34987",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:11.403",
"lastModified": "2023-10-10T17:52:17.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:28:16.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
"source": "psirt@fortinet.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndIncluding": "8.5.4",
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.5",
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34988",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:11.463",
"lastModified": "2023-10-10T17:52:17.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:28:24.797",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
"source": "psirt@fortinet.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndIncluding": "8.5.4",
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.5",
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34989",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:11.520",
"lastModified": "2023-10-10T17:52:17.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:28:40.233",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
"source": "psirt@fortinet.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndIncluding": "8.5.4",
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.5",
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-141",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34993",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:11.670",
"lastModified": "2023-10-10T17:52:17.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:29:10.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
"source": "psirt@fortinet.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndIncluding": "8.5.4",
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.5",
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36547",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:11.827",
"lastModified": "2023-10-10T17:52:17.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:29:22.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
"source": "psirt@fortinet.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndIncluding": "8.5.4",
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.5",
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36548",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:11.890",
"lastModified": "2023-10-10T17:52:09.820",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:29:33.770",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
"source": "psirt@fortinet.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndIncluding": "8.5.4",
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.5",
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36549",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:11.953",
"lastModified": "2023-10-10T17:52:09.820",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:30:18.603",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
"source": "psirt@fortinet.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndIncluding": "8.5.4",
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.5",
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36550",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-10-10T17:15:12.017",
"lastModified": "2023-10-10T17:52:09.820",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:30:45.603",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,51 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
"source": "psirt@fortinet.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndIncluding": "8.5.4",
"matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0",
"versionEndIncluding": "8.6.5",
"matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-140",
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37538",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-10-11T13:15:09.557",
"lastModified": "2023-10-11T13:15:09.557",
"vulnStatus": "Received",
"lastModified": "2023-10-11T14:23:06.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44105",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T13:15:09.820",
"lastModified": "2023-10-11T13:15:09.820",
"vulnStatus": "Received",
"lastModified": "2023-10-11T14:23:06.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44107",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T13:15:09.977",
"lastModified": "2023-10-11T13:15:09.977",
"vulnStatus": "Received",
"lastModified": "2023-10-11T14:23:06.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44108",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T13:15:10.030",
"lastModified": "2023-10-11T13:15:10.030",
"vulnStatus": "Received",
"lastModified": "2023-10-11T14:23:06.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44114",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T13:15:10.097",
"lastModified": "2023-10-11T13:15:10.097",
"vulnStatus": "Received",
"lastModified": "2023-10-11T14:23:06.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44116",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T13:15:10.160",
"lastModified": "2023-10-11T13:15:10.160",
"vulnStatus": "Received",
"lastModified": "2023-10-11T14:23:06.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44118",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T13:15:10.223",
"lastModified": "2023-10-11T13:15:10.223",
"vulnStatus": "Received",
"lastModified": "2023-10-11T14:23:06.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44119",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-10-11T13:15:10.277",
"lastModified": "2023-10-11T13:15:10.277",
"vulnStatus": "Received",
"lastModified": "2023-10-11T14:23:06.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-44981",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-11T12:15:11.760",
"lastModified": "2023-10-11T12:54:05.787",
"lastModified": "2023-10-11T15:15:09.733",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -24,6 +24,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/11/4",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b",
"source": "security@apache.org"

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-45396",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-11T14:15:09.993",
"lastModified": "2023-10-11T14:23:06.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An Insecure Direct Object Reference (IDOR) vulnerability leads to events profiles access in Elenos ETG150 FM transmitter running on version 3.12."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/strik3r0x1/Vulns/blob/main/(IDOR)%20leads%20to%20events%20profiles%20access%20-%20Elenos.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-4957",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-10-11T14:15:10.047",
"lastModified": "2023-10-11T14:23:06.207",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": " A vulnerability of authentication bypass has been found on a Zebra Technologies ZTC ZT410-203dpi ZPL printer. This vulnerability allows an attacker that is in the same network as the printer, to change the username and password for the Web Page by sending a specially crafted POST request to the setvarsResults.cgi file. For this vulnerability to be exploitable, the printers protected mode must be disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso-sci/authentication-bypass-zebra-ztc",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -2,19 +2,43 @@
"id": "CVE-2023-5233",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-09-28T05:15:46.513",
"lastModified": "2023-09-28T12:44:04.973",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-10-11T14:10:16.687",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Font Awesome Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'fawesome' shortcode in versions up to, and including, 5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Font Awesome Integration para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de un c\u00f3digo abreviado 'fawesome' en versiones hasta la 5.0 incluida, debido a una insuficiente sanitizaci\u00f3n de entrada y escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -46,14 +70,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://plugins.trac.wordpress.org/browser/font-awesome-integration/tags/5.0/font-awesome-integration.php#L48",
"source": "security@wordfence.com"
},
"nodes": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2791f48-895f-4099-87ec-41aaac2494a2?source=cve",
"source": "security@wordfence.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fontawesome:font_awesome_integration:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "5.0",
"matchCriteriaId": "772F3254-6115-46FD-9429-9BDAD69EA8D7"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/font-awesome-integration/tags/5.0/font-awesome-integration.php#L48",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2791f48-895f-4099-87ec-41aaac2494a2?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-11T14:00:25.388339+00:00
2023-10-11T16:00:24.797103+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-11T14:00:08.897000+00:00
2023-10-11T15:28:21.907000+00:00
```
### Last Data Feed Release
@ -29,69 +29,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
227562
227564
```
### CVEs added in the last Commit
Recently added CVEs: `25`
Recently added CVEs: `2`
* [CVE-2023-26370](CVE-2023/CVE-2023-263xx/CVE-2023-26370.json) (`2023-10-11T12:15:10.580`)
* [CVE-2023-38216](CVE-2023/CVE-2023-382xx/CVE-2023-38216.json) (`2023-10-11T12:15:10.797`)
* [CVE-2023-38217](CVE-2023/CVE-2023-382xx/CVE-2023-38217.json) (`2023-10-11T12:15:10.907`)
* [CVE-2023-41304](CVE-2023/CVE-2023-413xx/CVE-2023-41304.json) (`2023-10-11T12:15:10.993`)
* [CVE-2023-44095](CVE-2023/CVE-2023-440xx/CVE-2023-44095.json) (`2023-10-11T12:15:11.070`)
* [CVE-2023-44097](CVE-2023/CVE-2023-440xx/CVE-2023-44097.json) (`2023-10-11T12:15:11.130`)
* [CVE-2023-44100](CVE-2023/CVE-2023-441xx/CVE-2023-44100.json) (`2023-10-11T12:15:11.193`)
* [CVE-2023-44101](CVE-2023/CVE-2023-441xx/CVE-2023-44101.json) (`2023-10-11T12:15:11.250`)
* [CVE-2023-44102](CVE-2023/CVE-2023-441xx/CVE-2023-44102.json) (`2023-10-11T12:15:11.313`)
* [CVE-2023-44103](CVE-2023/CVE-2023-441xx/CVE-2023-44103.json) (`2023-10-11T12:15:11.357`)
* [CVE-2023-44104](CVE-2023/CVE-2023-441xx/CVE-2023-44104.json) (`2023-10-11T12:15:11.520`)
* [CVE-2023-44106](CVE-2023/CVE-2023-441xx/CVE-2023-44106.json) (`2023-10-11T12:15:11.570`)
* [CVE-2023-44110](CVE-2023/CVE-2023-441xx/CVE-2023-44110.json) (`2023-10-11T12:15:11.623`)
* [CVE-2023-44111](CVE-2023/CVE-2023-441xx/CVE-2023-44111.json) (`2023-10-11T12:15:11.713`)
* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2023-10-11T12:15:11.760`)
* [CVE-2023-5520](CVE-2023/CVE-2023-55xx/CVE-2023-5520.json) (`2023-10-11T12:15:11.857`)
* [CVE-2023-5521](CVE-2023/CVE-2023-55xx/CVE-2023-5521.json) (`2023-10-11T12:15:11.937`)
* [CVE-2023-37538](CVE-2023/CVE-2023-375xx/CVE-2023-37538.json) (`2023-10-11T13:15:09.557`)
* [CVE-2023-44105](CVE-2023/CVE-2023-441xx/CVE-2023-44105.json) (`2023-10-11T13:15:09.820`)
* [CVE-2023-44107](CVE-2023/CVE-2023-441xx/CVE-2023-44107.json) (`2023-10-11T13:15:09.977`)
* [CVE-2023-44108](CVE-2023/CVE-2023-441xx/CVE-2023-44108.json) (`2023-10-11T13:15:10.030`)
* [CVE-2023-44114](CVE-2023/CVE-2023-441xx/CVE-2023-44114.json) (`2023-10-11T13:15:10.097`)
* [CVE-2023-44116](CVE-2023/CVE-2023-441xx/CVE-2023-44116.json) (`2023-10-11T13:15:10.160`)
* [CVE-2023-44118](CVE-2023/CVE-2023-441xx/CVE-2023-44118.json) (`2023-10-11T13:15:10.223`)
* [CVE-2023-44119](CVE-2023/CVE-2023-441xx/CVE-2023-44119.json) (`2023-10-11T13:15:10.277`)
* [CVE-2023-45396](CVE-2023/CVE-2023-453xx/CVE-2023-45396.json) (`2023-10-11T14:15:09.993`)
* [CVE-2023-4957](CVE-2023/CVE-2023-49xx/CVE-2023-4957.json) (`2023-10-11T14:15:10.047`)
### CVEs modified in the last Commit
Recently modified CVEs: `28`
Recently modified CVEs: `41`
* [CVE-2021-31806](CVE-2021/CVE-2021-318xx/CVE-2021-31806.json) (`2023-10-11T12:15:10.147`)
* [CVE-2021-31807](CVE-2021/CVE-2021-318xx/CVE-2021-31807.json) (`2023-10-11T12:15:10.237`)
* [CVE-2021-31808](CVE-2021/CVE-2021-318xx/CVE-2021-31808.json) (`2023-10-11T12:15:10.333`)
* [CVE-2021-33620](CVE-2021/CVE-2021-336xx/CVE-2021-33620.json) (`2023-10-11T12:15:10.413`)
* [CVE-2022-42451](CVE-2022/CVE-2022-424xx/CVE-2022-42451.json) (`2023-10-11T12:54:12.883`)
* [CVE-2022-44757](CVE-2022/CVE-2022-447xx/CVE-2022-44757.json) (`2023-10-11T12:54:12.883`)
* [CVE-2022-44758](CVE-2022/CVE-2022-447xx/CVE-2022-44758.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-44094](CVE-2023/CVE-2023-440xx/CVE-2023-44094.json) (`2023-10-11T12:54:05.787`)
* [CVE-2023-44096](CVE-2023/CVE-2023-440xx/CVE-2023-44096.json) (`2023-10-11T12:54:05.787`)
* [CVE-2023-44109](CVE-2023/CVE-2023-441xx/CVE-2023-44109.json) (`2023-10-11T12:54:05.787`)
* [CVE-2023-44689](CVE-2023/CVE-2023-446xx/CVE-2023-44689.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-45194](CVE-2023/CVE-2023-451xx/CVE-2023-45194.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-5511](CVE-2023/CVE-2023-55xx/CVE-2023-5511.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-26318](CVE-2023/CVE-2023-263xx/CVE-2023-26318.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-26319](CVE-2023/CVE-2023-263xx/CVE-2023-26319.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-26320](CVE-2023/CVE-2023-263xx/CVE-2023-26320.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-37536](CVE-2023/CVE-2023-375xx/CVE-2023-37536.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-44997](CVE-2023/CVE-2023-449xx/CVE-2023-44997.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-4990](CVE-2023/CVE-2023-49xx/CVE-2023-4990.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-42138](CVE-2023/CVE-2023-421xx/CVE-2023-42138.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-44093](CVE-2023/CVE-2023-440xx/CVE-2023-44093.json) (`2023-10-11T12:54:12.883`)
* [CVE-2023-26239](CVE-2023/CVE-2023-262xx/CVE-2023-26239.json) (`2023-10-11T13:59:48.340`)
* [CVE-2023-26236](CVE-2023/CVE-2023-262xx/CVE-2023-26236.json) (`2023-10-11T14:00:04.993`)
* [CVE-2023-26237](CVE-2023/CVE-2023-262xx/CVE-2023-26237.json) (`2023-10-11T14:00:07.037`)
* [CVE-2023-26238](CVE-2023/CVE-2023-262xx/CVE-2023-26238.json) (`2023-10-11T14:00:08.897`)
* [CVE-2022-27665](CVE-2022/CVE-2022-276xx/CVE-2022-27665.json) (`2023-10-11T14:45:44.747`)
* [CVE-2022-4864](CVE-2022/CVE-2022-48xx/CVE-2022-4864.json) (`2023-10-11T15:24:48.003`)
* [CVE-2022-25852](CVE-2022/CVE-2022-258xx/CVE-2022-25852.json) (`2023-10-11T15:27:34.157`)
* [CVE-2023-34986](CVE-2023/CVE-2023-349xx/CVE-2023-34986.json) (`2023-10-11T14:01:04.407`)
* [CVE-2023-5233](CVE-2023/CVE-2023-52xx/CVE-2023-5233.json) (`2023-10-11T14:10:16.687`)
* [CVE-2023-37538](CVE-2023/CVE-2023-375xx/CVE-2023-37538.json) (`2023-10-11T14:23:06.207`)
* [CVE-2023-44105](CVE-2023/CVE-2023-441xx/CVE-2023-44105.json) (`2023-10-11T14:23:06.207`)
* [CVE-2023-44107](CVE-2023/CVE-2023-441xx/CVE-2023-44107.json) (`2023-10-11T14:23:06.207`)
* [CVE-2023-44108](CVE-2023/CVE-2023-441xx/CVE-2023-44108.json) (`2023-10-11T14:23:06.207`)
* [CVE-2023-44114](CVE-2023/CVE-2023-441xx/CVE-2023-44114.json) (`2023-10-11T14:23:06.207`)
* [CVE-2023-44116](CVE-2023/CVE-2023-441xx/CVE-2023-44116.json) (`2023-10-11T14:23:06.207`)
* [CVE-2023-44118](CVE-2023/CVE-2023-441xx/CVE-2023-44118.json) (`2023-10-11T14:23:06.207`)
* [CVE-2023-44119](CVE-2023/CVE-2023-441xx/CVE-2023-44119.json) (`2023-10-11T14:23:06.207`)
* [CVE-2023-34985](CVE-2023/CVE-2023-349xx/CVE-2023-34985.json) (`2023-10-11T14:28:07.943`)
* [CVE-2023-34987](CVE-2023/CVE-2023-349xx/CVE-2023-34987.json) (`2023-10-11T14:28:16.647`)
* [CVE-2023-34988](CVE-2023/CVE-2023-349xx/CVE-2023-34988.json) (`2023-10-11T14:28:24.797`)
* [CVE-2023-34989](CVE-2023/CVE-2023-349xx/CVE-2023-34989.json) (`2023-10-11T14:28:40.233`)
* [CVE-2023-34993](CVE-2023/CVE-2023-349xx/CVE-2023-34993.json) (`2023-10-11T14:29:10.010`)
* [CVE-2023-36547](CVE-2023/CVE-2023-365xx/CVE-2023-36547.json) (`2023-10-11T14:29:22.937`)
* [CVE-2023-36548](CVE-2023/CVE-2023-365xx/CVE-2023-36548.json) (`2023-10-11T14:29:33.770`)
* [CVE-2023-36549](CVE-2023/CVE-2023-365xx/CVE-2023-36549.json) (`2023-10-11T14:30:18.603`)
* [CVE-2023-36550](CVE-2023/CVE-2023-365xx/CVE-2023-36550.json) (`2023-10-11T14:30:45.603`)
* [CVE-2023-1437](CVE-2023/CVE-2023-14xx/CVE-2023-1437.json) (`2023-10-11T15:15:09.400`)
* [CVE-2023-28321](CVE-2023/CVE-2023-283xx/CVE-2023-28321.json) (`2023-10-11T15:15:09.543`)
* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2023-10-11T15:15:09.733`)
## Download and Usage