Auto-Update: 2023-12-29T17:00:24.443655+00:00

This commit is contained in:
cad-safe-bot 2023-12-29 17:00:28 +00:00
parent 31be625343
commit d277e40e0d
54 changed files with 3139 additions and 331 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-3182",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2014-09-28T10:55:10.127",
"lastModified": "2023-11-07T02:19:56.430",
"vulnStatus": "Modified",
"lastModified": "2023-12-29T15:41:33.040",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,13 +63,43 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.16.1",
"matchCriteriaId": "8452407A-5074-4385-B9A1-9E49042CCAEB"
"versionEndExcluding": "3.2.63",
"matchCriteriaId": "08F5EF97-E1B9-46F0-979B-E77F62DD8DB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3CFFCDFC-AE4F-47EE-B1DA-05A6865D1745"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.3",
"versionEndExcluding": "3.4.104",
"matchCriteriaId": "95E0847B-5988-4925-98FF-29EEE803ECC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.5",
"versionEndExcluding": "3.10.54",
"matchCriteriaId": "F9ACBC23-0CDB-475C-A567-6A4D9F322B31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.11",
"versionEndExcluding": "3.12.28",
"matchCriteriaId": "EDEAB94F-EC88-4575-BB26-4B55F09B4298"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.13",
"versionEndExcluding": "3.14.18",
"matchCriteriaId": "8E47EF9D-62CE-4AF1-A8C9-14E0D9AB3A76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.15",
"versionEndExcluding": "3.16.2",
"matchCriteriaId": "4DAD07BE-4260-45D8-A744-53DE4E3DC346"
}
]
}
@ -79,35 +109,62 @@
"references": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ad3e14d7c5268c2e24477c6ef54bbdf88add5d36",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2014-1318.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"VDB Entry"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2014/09/11/21",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.securityfocus.com/bid/69770",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141210",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://code.google.com/p/google-security-research/issues/detail?id=89",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/torvalds/linux/commit/ad3e14d7c5268c2e24477c6ef54bbdf88add5d36",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-3183",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2014-09-28T10:55:10.173",
"lastModified": "2023-11-07T02:19:56.817",
"vulnStatus": "Modified",
"lastModified": "2023-12-29T15:42:53.263",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,13 +63,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.16.1",
"matchCriteriaId": "8452407A-5074-4385-B9A1-9E49042CCAEB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3CFFCDFC-AE4F-47EE-B1DA-05A6865D1745"
"versionStartIncluding": "3.15",
"versionEndExcluding": "3.16.2",
"matchCriteriaId": "4DAD07BE-4260-45D8-A744-53DE4E3DC346"
}
]
}
@ -79,27 +75,46 @@
"references": [
{
"url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=51217e69697fba92a06e07e16f55c9a52d8e8945",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.2",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2014/09/11/21",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141344",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://code.google.com/p/google-security-research/issues/detail?id=90",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/torvalds/linux/commit/51217e69697fba92a06e07e16f55c9a52d8e8945",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-18359",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-10-23T20:15:14.007",
"lastModified": "2020-08-24T17:37:01.140",
"lastModified": "2023-12-29T15:26:55.280",
"vulnStatus": "Modified",
"descriptions": [
{
@ -84,8 +84,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mp3gain_project:mp3gain:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A8628AED-B7BA-4A95-9909-B02549721D50"
"criteria": "cpe:2.3:a:glensawyer:mp3gain:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "12EBD678-5B0A-46EE-8A0C-D7CE9FEA6F77"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-34085",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-11T18:15:22.847",
"lastModified": "2022-05-20T15:08:03.133",
"lastModified": "2023-12-29T15:26:55.280",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,24 +84,24 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mp3gain_project:mp3gain:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:glensawyer:mp3gain:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.5.2",
"matchCriteriaId": "6FAFC7C7-569A-4510-93AC-572BBA90929F"
"matchCriteriaId": "B433827A-E911-4E39-B44F-03106A5ED65E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mp3gain_project:mp3gain:1.5.2:-:*:*:*:*:*:*",
"matchCriteriaId": "C0EC4F15-BF69-4A16-8957-800DFC0078A9"
"criteria": "cpe:2.3:a:glensawyer:mp3gain:1.5.2:-:*:*:*:*:*:*",
"matchCriteriaId": "F0C36E54-46B1-4AA5-B432-62F1A275C99E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mp3gain_project:mp3gain:1.5.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "828E3A70-3B0D-4E37-B326-AF2DB7A4C7F2"
"criteria": "cpe:2.3:a:glensawyer:mp3gain:1.5.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "A57F1293-A9A7-4781-AECF-DC895EE0240C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mp3gain_project:mp3gain:1.5.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "93A8C7FC-D255-4D5E-A183-ABF36331B70C"
"criteria": "cpe:2.3:a:glensawyer:mp3gain:1.5.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "1FE800CB-62FB-4B19-ACCE-ACBF52B6DFD3"
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-28025",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-12-21T01:15:32.450",
"lastModified": "2023-12-21T02:24:16.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:51:19.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Due to this vulnerability, the Master operator could potentially incorporate an SVG tag into HTML, leading to an alert pop-up displaying a cookie. To mitigate stored XSS vulnerabilities, a preventive measure involves thoroughly sanitizing and validating all user inputs before they are processed and stored in the server storage. \n"
},
{
"lang": "es",
"value": "Debido a esta vulnerabilidad, el operador maestro podr\u00eda potencialmente incorporar una etiqueta SVG en HTML, lo que generar\u00eda una ventana emergente de alerta que muestra una cookie. Para mitigar las vulnerabilidades XSS almacenadas, una medida preventiva implica sanitizar y validar minuciosamente todas las entradas del usuario antes de procesarlas y almacenarlas en el almacenamiento del servidor."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "psirt@hcl.com",
"type": "Secondary",
@ -34,10 +58,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:bigfix_modern_client_management:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2",
"matchCriteriaId": "4B8155E0-3400-438C-96E1-24048DE9F2D9"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109318",
"source": "psirt@hcl.com"
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-35001",
"sourceIdentifier": "security@ubuntu.com",
"published": "2023-07-05T19:15:10.147",
"lastModified": "2023-09-11T19:15:42.447",
"vulnStatus": "Modified",
"lastModified": "2023-12-29T16:03:16.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace"
},
{
"lang": "es",
"value": "Vulnerabilidad de Lectura/Escritura en nftables Fuera de los L\u00edmites del kernel de Linux; nft_byteorder administra incorrectamente los contenidos de registro de VM cuando CAP_NET_ADMIN est\u00e1 en cualquier espacio de nombres de usuario o red\n"
}
],
"metrics": {
@ -85,8 +89,52 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E0ED04A8-156B-43FA-ACB9-F09E177D1B0A"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.13",
"versionEndExcluding": "4.14.322",
"matchCriteriaId": "A49C561B-EC1D-4E98-9738-E2144CA65D7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndIncluding": "4.19.291",
"matchCriteriaId": "C8CFC9CE-1167-4610-8B2D-75D94422A238"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.251",
"matchCriteriaId": "7FA663C4-CA72-4B5A-8592-7354D978F58E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.188",
"matchCriteriaId": "43CAE50A-4A6C-488E-813C-F8DB77C13C8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.121",
"matchCriteriaId": "EC77775B-EC31-4966-966C-1286C02B2A85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.39",
"matchCriteriaId": "9BD1D4A1-304D-4187-8178-6D7C0050B1AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.4.4",
"matchCriteriaId": "A91BC267-63EE-413E-A6EF-6B96C2A278D1"
}
]
}
@ -126,6 +174,41 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
}
]
}
]
}
],
"references": [
@ -133,12 +216,17 @@
"url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html",
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/07/05/3",
@ -150,7 +238,11 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/",
@ -176,7 +268,11 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230824-0007/",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5453",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3610",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-07-21T21:15:11.820",
"lastModified": "2023-08-18T14:15:33.450",
"vulnStatus": "Modified",
"lastModified": "2023-12-29T16:05:32.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -87,43 +87,29 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.9",
"versionEndExcluding": "6.4",
"matchCriteriaId": "DEC7A3D5-B782-43D1-9EC8-3D58EEA1AE60"
"versionEndExcluding": "5.10.188",
"matchCriteriaId": "D00465E7-4C90-4F70-BFB1-A877E520AD2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "38BC6744-7D25-4C02-9966-B224CD071D30"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.119",
"matchCriteriaId": "A0A78078-C3A0-49BA-AD25-0FABF6B92555"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "76061B41-CAE9-4467-BEDE-0FFC7956F2A1"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.36",
"matchCriteriaId": "989E8FC0-FE5E-4486-9391-FE0521B2326E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A717BA5B-D535-46A0-A329-A25FE5CEC588"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:*",
"matchCriteriaId": "89CC80C6-F1EE-4AC7-BD21-DB3217BADE87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:*",
"matchCriteriaId": "41EACEA1-FB69-4AF2-BC52-D39489858D42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:*",
"matchCriteriaId": "9E1C36BE-F9D8-40B6-8281-5B8F9B42322D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:*",
"matchCriteriaId": "1D6CAA59-F0EF-4E0B-8C23-EC9535008572"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.3.10",
"matchCriteriaId": "9E91549C-3A35-4895-992D-EAD48CAD6C38"
}
]
}
@ -135,6 +121,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
@ -165,11 +156,19 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html",
"source": "cve-coordination@google.com"
"source": "cve-coordination@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230818-0005/",
"source": "cve-coordination@google.com"
"source": "cve-coordination@google.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5461",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3812",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-24T16:15:13.337",
"lastModified": "2023-11-29T00:15:06.933",
"vulnStatus": "Modified",
"lastModified": "2023-12-29T16:07:05.697",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -59,6 +59,10 @@
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
},
{
"lang": "en",
"value": "CWE-787"
@ -86,23 +90,37 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.0.19",
"matchCriteriaId": "D6F6A68F-EDF4-4E31-953F-740FCFBE5234"
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.265",
"matchCriteriaId": "ABED5D97-9B16-4CF6-86E3-D5F5C4358E35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.224",
"matchCriteriaId": "1D67A077-EB45-4ADE-94CD-F9A76F6C319C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.154",
"matchCriteriaId": "475D097C-AB5A-4CF5-899F-413077854ABD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.78",
"matchCriteriaId": "AB8B27B9-B41B-42D5-AE67-0A89A8A8EEB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.0.8",
"matchCriteriaId": "EC9A754E-625D-42F3-87A7-960D643E2867"
}
]
}
@ -132,47 +150,91 @@
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6799",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:6813",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7370",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7379",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7382",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7389",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7411",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7418",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7548",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7549",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7554",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-3812",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4004",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-31T17:15:10.203",
"lastModified": "2023-11-29T15:15:09.530",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-12-29T15:41:37.193",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -90,28 +90,30 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5",
"matchCriteriaId": "98C491C7-598A-4D36-BA4F-3505A5727ED1"
"versionStartIncluding": "5.6",
"versionEndExcluding": "5.10.188",
"matchCriteriaId": "6F54A74D-8B6A-483C-8989-0681E4E2B213"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0B3E6E4D-E24E-4630-B00C-8C9901C597B0"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.123",
"matchCriteriaId": "372C0BAA-44F5-4829-A7B0-E4924B682DA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E4A01A71-0F09-4DB2-A02F-7EFFBE27C98D"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.42",
"matchCriteriaId": "6E769E6A-7EEF-4FA8-BF41-6CA1CE537361"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F5608371-157A-4318-8A2E-4104C3467EA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2226A776-DF8C-49E0-A030-0A7853BB018A"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.4.7",
"matchCriteriaId": "60A1A1ED-EA6C-42F6-80D3-3316DC7608C7"
}
]
}
@ -151,84 +153,203 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:4961",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:4962",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:4967",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5069",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5091",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5093",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5221",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5244",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5255",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5548",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:5627",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7382",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7389",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7411",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7417",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7431",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2023:7434",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4004",
@ -247,7 +368,10 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230719190824.21196-1-fw@strlen.de/",
@ -260,15 +384,24 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231027-0001/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,108 @@
"id": "CVE-2023-41166",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-21T00:15:25.537",
"lastModified": "2023-12-21T02:24:16.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:54:30.753",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.39, 3.11.0 through 3.11.27, 4.3.0 through 4.3.22, 4.6.0 through 4.6.9, and 4.7.0 through 4.7.1. It's possible to know if a specific user account exists on the SNS firewall by using remote access commands."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Stormshield Network Security (SNS) 3.7.0 a 3.7.39, 3.11.0 a 3.11.27, 4.3.0 a 4.3.22, 4.6.0 a 4.6.9 y 4.7.0 a 4.7. 1. Es posible saber si existe una cuenta de usuario espec\u00edfica en el firewall SNS mediante comandos de acceso remoto."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.7.0",
"versionEndIncluding": "3.7.39",
"matchCriteriaId": "CB422D52-AE0B-40A5-915F-48151CBDCE1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.11.0",
"versionEndIncluding": "3.11.27",
"matchCriteriaId": "9B3D0710-791E-4F52-829B-344E75D31BF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.3.0",
"versionEndExcluding": "4.3.23",
"matchCriteriaId": "C62D71E6-BBA8-40F9-BE99-E18A512E0936"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.6.0",
"versionEndExcluding": "4.6.10",
"matchCriteriaId": "7BA3CFA3-AA12-4347-AE99-91D28021E6F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.7.0",
"versionEndExcluding": "4.7.2",
"matchCriteriaId": "459D63A0-291E-4B60-94A7-4FDB3A381C61"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://advisories.stormshield.eu/2023-027",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44482",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-12-21T19:15:09.157",
"lastModified": "2023-12-22T12:18:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:59:24.403",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,14 +50,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:leave_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F9F4AD9B-F507-4F38-B88D-727D68F38F88"
}
]
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/martin/",
"source": "help@fluidattacks.com"
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://projectworlds.in/",
"source": "help@fluidattacks.com"
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-4541",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-12-29T15:15:09.267",
"lastModified": "2023-12-29T15:15:09.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ween Software Admin Panel allows SQL Injection.This issue affects Admin Panel: through 20231229.\u00a0\n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0740",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46645",
"sourceIdentifier": "product-cna@github.com",
"published": "2023-12-21T21:15:08.347",
"lastModified": "2023-12-22T12:18:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:27:51.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -50,26 +80,81 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.7.0",
"versionEndExcluding": "3.7.19",
"matchCriteriaId": "9C219467-E463-4C59-AAD7-8BECDA8AA1AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.8.0",
"versionEndExcluding": "3.8.12",
"matchCriteriaId": "B3D983FF-FDDE-484C-AA34-31EB52E25EC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9.0",
"versionEndExcluding": "3.9.7",
"matchCriteriaId": "B118EB53-4459-4817-8F74-002DBA4860DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.10.0",
"versionEndExcluding": "3.10.4",
"matchCriteriaId": "F65FB74F-11AB-439B-9CF0-9F08E03E4083"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.19",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46646",
"sourceIdentifier": "product-cna@github.com",
"published": "2023-12-21T21:15:08.620",
"lastModified": "2023-12-22T12:18:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T15:52:25.340",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -50,22 +80,74 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.7.0",
"versionEndExcluding": "3.17.19",
"matchCriteriaId": "572EEE88-8375-4D67-8C20-811438C3A34A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.8.0",
"versionEndExcluding": "3.8.12",
"matchCriteriaId": "B3D983FF-FDDE-484C-AA34-31EB52E25EC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9.0",
"versionEndExcluding": "3.9.7",
"matchCriteriaId": "B118EB53-4459-4817-8F74-002DBA4860DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.10.0",
"versionEndExcluding": "3.10.4",
"matchCriteriaId": "F65FB74F-11AB-439B-9CF0-9F08E03E4083"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.19",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46647",
"sourceIdentifier": "product-cna@github.com",
"published": "2023-12-21T21:15:08.930",
"lastModified": "2023-12-22T12:18:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T15:52:07.093",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -50,22 +80,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.8.0",
"versionEndExcluding": "3.8.12",
"matchCriteriaId": "B3D983FF-FDDE-484C-AA34-31EB52E25EC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9.0",
"versionEndExcluding": "3.9.6",
"matchCriteriaId": "293B7C5B-C544-4426-A68E-F3FFB293CFBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.10.0",
"versionEndExcluding": "3.10.3",
"matchCriteriaId": "226320D4-C315-4868-A1DB-1E5E53B7798F"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.3",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.0",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.6",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46648",
"sourceIdentifier": "product-cna@github.com",
"published": "2023-12-21T21:15:09.257",
"lastModified": "2023-12-22T12:18:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T15:40:50.423",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-331"
}
]
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -50,22 +80,72 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.8.0",
"versionEndExcluding": "3.8.12",
"matchCriteriaId": "B3D983FF-FDDE-484C-AA34-31EB52E25EC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9.0",
"versionEndExcluding": "3.9.7",
"matchCriteriaId": "B118EB53-4459-4817-8F74-002DBA4860DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.10.0",
"versionEndExcluding": "3.10.4",
"matchCriteriaId": "F65FB74F-11AB-439B-9CF0-9F08E03E4083"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:3.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AC723276-C3EE-4F79-857A-3A5C078C33E2"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46649",
"sourceIdentifier": "product-cna@github.com",
"published": "2023-12-21T21:15:09.573",
"lastModified": "2023-12-22T12:18:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T15:34:14.727",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -50,26 +80,86 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.7.0",
"versionEndExcluding": "3.7.19",
"matchCriteriaId": "9C219467-E463-4C59-AAD7-8BECDA8AA1AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.8.0",
"versionEndExcluding": "3.8.12",
"matchCriteriaId": "B3D983FF-FDDE-484C-AA34-31EB52E25EC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9.0",
"versionEndExcluding": "3.9.7",
"matchCriteriaId": "B118EB53-4459-4817-8F74-002DBA4860DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.10.0",
"versionEndExcluding": "3.10.4",
"matchCriteriaId": "F65FB74F-11AB-439B-9CF0-9F08E03E4083"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:3.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AC723276-C3EE-4F79-857A-3A5C078C33E2"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.19",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-4674",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-12-29T15:15:09.497",
"lastModified": "2023-12-29T15:15:09.497",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yaztek Software Technologies and Computer Systems E-Commerce Software allows SQL Injection.This issue affects E-Commerce Software: through 20231229.\u00a0\n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0741",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-4675",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-12-29T15:15:09.717",
"lastModified": "2023-12-29T15:15:09.717",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GM Information Technologies MDO allows SQL Injection.This issue affects MDO: through 20231229.\u00a0\n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0742",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,19 +2,92 @@
"id": "CVE-2023-47093",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-21T00:15:26.067",
"lastModified": "2023-12-21T02:24:16.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:53:29.980",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Stormshield Network Security (SNS) 4.0.0 through 4.3.21, 4.4.0 through 4.6.8, and 4.7.0. Sending a crafted ICMP packet may lead to a crash of the ASQ engine."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Stormshield Network Security (SNS) 4.0.0 a 4.3.21, 4.4.0 a 4.6.8 y 4.7.0. El env\u00edo de un paquete ICMP manipulado puede provocar un fallo del motor ASQ."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.3.22",
"matchCriteriaId": "08FE8DAD-7467-42A3-9519-AE2D9A523497"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.6.9",
"matchCriteriaId": "134FC4FC-E0A0-4AD2-85D8-ED8536FD9F13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:4.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "41064506-1A8B-462B-B0CC-935467EB80CA"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://advisories.stormshield.eu/2023-031/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2023-47804",
"sourceIdentifier": "security@apache.org",
"published": "2023-12-29T15:15:09.157",
"lastModified": "2023-12-29T15:15:09.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose.\n\nLinks can be activated by clicks, or by automatic document events.\n\nThe execution of such links must be subject to user approval.\n\nIn the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution.\n\nThis is a corner case of CVE-2022-47502.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-88"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/ygp59swfcy6g46jf8v9s6qpwmxn8fsvb",
"source": "security@apache.org"
},
{
"url": "https://www.openoffice.org/security/cves/CVE-2023-47804.html",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48718",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-12-21T21:15:12.297",
"lastModified": "2023-12-22T12:18:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T15:30:51.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,14 +50,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:student_result_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD4B746-334F-47DF-B70F-2DC6E80F23D4"
}
]
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/gilels/",
"source": "help@fluidattacks.com"
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://projectworlds.in/",
"source": "help@fluidattacks.com"
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48720",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-12-21T21:15:12.870",
"lastModified": "2023-12-22T12:18:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T15:30:41.743",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,14 +50,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:student_result_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD4B746-334F-47DF-B70F-2DC6E80F23D4"
}
]
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/gilels/",
"source": "help@fluidattacks.com"
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://projectworlds.in/",
"source": "help@fluidattacks.com"
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48722",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-12-21T21:15:13.160",
"lastModified": "2023-12-22T12:18:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T15:30:32.720",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -50,14 +50,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:student_result_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD4B746-334F-47DF-B70F-2DC6E80F23D4"
}
]
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/gilels/",
"source": "help@fluidattacks.com"
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://projectworlds.in/",
"source": "help@fluidattacks.com"
"source": "help@fluidattacks.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-49776",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-20T16:15:09.550",
"lastModified": "2023-12-20T16:47:19.580",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:55:58.180",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hakan Demiray Sayfa Sayac.This issue affects Sayfa Sayac: from n/a through 2.6.\n\n"
},
{
"lang": "es",
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Hakan Demiray Sayfa Sayac. Este problema afecta a Sayfa Sayac: desde n/a hasta 2.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dmry:sayfa_sayac:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.6",
"matchCriteriaId": "8A210805-2BE4-4FFC-A0FC-E2F291D2398D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sayfa-sayac/wordpress-sayfa-sayac-plugin-2-6-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50475",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-21T11:15:08.673",
"lastModified": "2023-12-21T13:22:15.910",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:50:00.283",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,73 @@
"value": "Se descubri\u00f3 un problema en bcoin-org bcoin versi\u00f3n 2.2.0, que permite a atacantes remotos obtener informaci\u00f3n confidencial a trav\u00e9s de algoritmos hash d\u00e9biles en el componente \\vendor\\faye-websocket.js."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bcoin:bcoin:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB396AC4-3FE6-4757-B077-56CD055BB817"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/bcoin-org/bcoin/issues/1174",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/tianjk99/Cryptographic-Misuses/blob/main/CVE-2023-50475.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50477",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-21T11:15:08.733",
"lastModified": "2023-12-21T13:22:15.910",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:46:54.310",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,73 @@
"value": "Se descubri\u00f3 un problema en la versi\u00f3n 0.6.6 del cliente nos, que permite a atacantes remotos escalar privilegios a trav\u00e9s de getRPCEndpoint.js."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nos:nos_client:0.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "089CBE7F-5F58-4510-9192-B7756CAB572C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nos/client/issues/1485",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/tianjk99/Cryptographic-Misuses/blob/main/CVE-2023-50477.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50481",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-21T11:15:08.790",
"lastModified": "2023-12-21T13:22:15.910",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:48:05.673",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,73 @@
"value": "Se descubri\u00f3 un problema en la versi\u00f3n 3.3.8 de Blinksocks, que permite a atacantes remotos obtener informaci\u00f3n confidencial a trav\u00e9s de algoritmos de cifrado d\u00e9biles en el componente /presets/ssr-auth-chain.js."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blinksocks:blinksocks:3.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7FCA3BC9-233F-4F3A-8069-2A56BF277495"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/blinksocks/blinksocks/issues/108",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/tianjk99/Cryptographic-Misuses/blob/main/CVE-2023-50481.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-50570",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-29T15:15:09.927",
"lastModified": "2023-12-29T15:15:09.927",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in the component IPAddressBitsDivision of IPAddress v5.1.0 leads to an infinite loop."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/seancfoley/IPAddress/issues/118",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-50571",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-29T15:15:09.983",
"lastModified": "2023-12-29T15:15:09.983",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "easy-rules-mvel v4.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component MVELRule."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/j-easy/easy-rules/issues/419",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-50572",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-29T15:15:10.030",
"lastModified": "2023-12-29T15:15:10.030",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in the component GroovyEngine.execute of jline-groovy v3.24.1 allows attackers to cause an OOM (OutofMemory) error."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jline/jline3/issues/909",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50703",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-12-20T00:15:08.877",
"lastModified": "2023-12-20T13:50:26.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:32:32.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -50,10 +80,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:efacec:uc_500e_firmware:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF70D3D-3373-461B-BF6F-BEF45FDE3CA2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:efacec:uc_500e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69426677-21FE-4260-A8AA-1A30707FED0E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50704",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-12-20T00:15:09.070",
"lastModified": "2023-12-20T13:50:26.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:31:20.133",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -50,10 +80,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:efacec:uc_500e_firmware:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF70D3D-3373-461B-BF6F-BEF45FDE3CA2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:efacec:uc_500e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69426677-21FE-4260-A8AA-1A30707FED0E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50705",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-12-20T00:15:09.257",
"lastModified": "2023-12-20T13:50:26.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:28:38.393",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -50,10 +80,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:efacec:uc_500e_firmware:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF70D3D-3373-461B-BF6F-BEF45FDE3CA2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:efacec:uc_500e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69426677-21FE-4260-A8AA-1A30707FED0E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50706",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-12-20T00:15:09.437",
"lastModified": "2023-12-20T13:50:26.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:25:56.740",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -50,10 +80,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:efacec:uc_500e_firmware:10.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF70D3D-3373-461B-BF6F-BEF45FDE3CA2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:efacec:uc_500e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69426677-21FE-4260-A8AA-1A30707FED0E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50707",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-12-20T00:15:09.643",
"lastModified": "2023-12-20T13:50:26.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:19:20.037",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -50,10 +80,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:efacec:bcu_500_firmware:4.07:*:*:*:*:*:*:*",
"matchCriteriaId": "62E65B01-DC85-484D-8133-D2CEF60C1D67"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:efacec:bcu_500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B98DBC89-789C-4C56-B8B3-72675FDA9CE1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-02",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,19 +2,144 @@
"id": "CVE-2023-50993",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-20T22:15:35.550",
"lastModified": "2023-12-21T02:24:16.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:55:09.883",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Ruijie WS6008 v1.x v2.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 and WS6108 v1.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 was discovered to contain a command injection vulnerability via the function downFiles."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Ruijie WS6008 v1.x v2.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 y WS6108 v1.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 conten\u00edan una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n downFiles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ruijie:rg-ws6008_firmware:11.9\\(6\\)w3b2_g2c6-01_10221911:*:*:*:*:*:*:*",
"matchCriteriaId": "02DB06A8-2913-4D79-9F46-2C1405B459A8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ruijie:rg-ws6008:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1B67AFD0-C8CC-43EF-8DB2-FF36A5CFAEBD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ruijie:rg-ws6008_firmware:11.9\\(6\\)w3b2_g2c6-01_10221911:*:*:*:*:*:*:*",
"matchCriteriaId": "02DB06A8-2913-4D79-9F46-2C1405B459A8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ruijie:rg-ws6008:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C234E9-257A-43E1-88F6-A6EAB25BB9D8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ruijie:rg-ws6108_firmware:11.9\\(6\\)w3b2_g2c6-01_10221911:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEA3D2C-E738-458F-9D9A-A55B2B114215"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ruijie:rg-ws6108:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED42D29-EDB8-4F10-8E90-26CD221C258A"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ef4tless/vuln/blob/master/iot/WS6008-WS6108/1.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51379",
"sourceIdentifier": "product-cna@github.com",
"published": "2023-12-21T21:15:13.480",
"lastModified": "2023-12-22T12:18:32.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T15:30:21.787",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -50,26 +80,86 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.7.0",
"versionEndExcluding": "3.17.19",
"matchCriteriaId": "572EEE88-8375-4D67-8C20-811438C3A34A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.8.0",
"versionEndExcluding": "3.8.12",
"matchCriteriaId": "B3D983FF-FDDE-484C-AA34-31EB52E25EC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9.0",
"versionEndExcluding": "3.9.7",
"matchCriteriaId": "B118EB53-4459-4817-8F74-002DBA4860DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.10.0",
"versionEndExcluding": "3.10.4",
"matchCriteriaId": "F65FB74F-11AB-439B-9CF0-9F08E03E4083"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:3.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AC723276-C3EE-4F79-857A-3A5C078C33E2"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.4",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.1",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.7/admin/release-notes#3.7.19",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.8/admin/release-notes#3.8.12",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.9/admin/release-notes#3.9.7",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51517",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-29T15:15:10.080",
"lastModified": "2023-12-29T15:15:10.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CodePeople Calculated Fields Form.This issue affects Calculated Fields Form: from n/a through 1.2.28.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/calculated-fields-form/wordpress-calculated-fields-form-plugin-1-2-28-open-redirection-via-shortcode-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51527",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-29T15:15:10.303",
"lastModified": "2023-12-29T15:15:10.303",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Senol Sahin AI Power: Complete AI Pack \u2013 Powered by GPT-4.This issue affects AI Power: Complete AI Pack \u2013 Powered by GPT-4: from n/a through 1.8.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gpt3-ai-content-generator/wordpress-ai-power-complete-ai-pack-powered-by-gpt-4-plugin-1-8-2-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51655",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2023-12-21T10:15:36.850",
"lastModified": "2023-12-21T13:22:15.910",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:50:16.837",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
},
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@ -50,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.3.2",
"matchCriteriaId": "C1590A9E-F52A-4A49-9F26-0140582277AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
"source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51687",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-29T15:15:10.557",
"lastModified": "2023-12-29T15:15:10.557",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in impleCode Product Catalog Simple.This issue affects Product Catalog Simple: from n/a through 1.7.6.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/post-type-x/wordpress-product-catalog-simple-plugin-1-7-6-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51688",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-29T15:15:10.787",
"lastModified": "2023-12-29T15:15:10.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in impleCode eCommerce Product Catalog Plugin for WordPress.This issue affects eCommerce Product Catalog Plugin for WordPress: from n/a through 3.3.26.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ecommerce-product-catalog/wordpress-ecommerce-product-catalog-plugin-for-wordpress-plugin-3-3-26-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51766",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-24T06:15:07.673",
"lastModified": "2023-12-26T21:15:07.893",
"lastModified": "2023-12-29T15:15:11.040",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -24,6 +24,10 @@
"url": "http://www.openwall.com/lists/oss-security/2023/12/25/1",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/12/29/2",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.exim.org/show_bug.cgi?id=3063",
"source": "cve@mitre.org"

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6122",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-12-21T14:15:09.063",
"lastModified": "2023-12-21T18:15:45.660",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:49:05.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ?stanbul Soft Informatics and Consultancy Limited Company Softomi Geli?mi? C2C Pazaryeri Yaz?l?m? allows Reflected XSS.This issue affects Softomi Geli?mi? C2C Pazaryeri Yaz?l?m?: before 12122023.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Estambul Soft Informatics and Consultancy Limited Company Softomi Geli?mi? C2C Pazaryeri Yaz?l?m? permite XSS reflejado. Este problema afecta a Softomi Geli?mi? C2C Pazaryeri Yaz?l?m?: antes de 12122023."
}
],
"metrics": {
@ -46,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softomi:advanced_c2c_marketplace_software:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12122023",
"matchCriteriaId": "EA3F76C0-04DF-41F2-AFAA-9C5C9134BF76"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0724",
"source": "iletisim@usom.gov.tr"
"source": "iletisim@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6145",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-12-21T14:15:09.430",
"lastModified": "2023-12-21T18:15:45.660",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:38:48.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ?stanbul Soft Informatics and Consultancy Limited Company Softomi Advanced C2C Marketplace Software allows SQL Injection.This issue affects Softomi Advanced C2C Marketplace Software: before 12122023.\n\n"
},
{
"lang": "es",
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL (\"Inyecci\u00f3n SQL\") en Estambul Soft Informatics and Consultancy Limited Company Softomi Advanced C2C Marketplace Software permite la inyecci\u00f3n SQL. Este problema afecta a Softomi Advanced C2C Marketplace Software: antes de 12122023."
}
],
"metrics": {
@ -46,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softomi:advanced_c2c_marketplace_software:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12122023",
"matchCriteriaId": "EA3F76C0-04DF-41F2-AFAA-9C5C9134BF76"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0724",
"source": "iletisim@usom.gov.tr"
"source": "iletisim@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6928",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-12-19T23:15:08.020",
"lastModified": "2023-12-20T13:50:26.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:36:03.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -50,10 +80,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:eurotel:etl3100_firmware:01c01:*:*:*:*:*:*:*",
"matchCriteriaId": "E14B60DA-34A0-479A-B2FA-7055A70130C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:eurotel:etl3100_firmware:01x37:*:*:*:*:*:*:*",
"matchCriteriaId": "B0489194-32E5-485A-A8A5-BE1ECEEB004C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:eurotel:etl3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6661C9-6751-4E03-9FB8-0406FFE752BA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6929",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-12-19T23:15:08.220",
"lastModified": "2023-12-20T13:50:26.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:34:56.257",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -50,10 +80,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:eurotel:etl3100_firmware:01c01:*:*:*:*:*:*:*",
"matchCriteriaId": "E14B60DA-34A0-479A-B2FA-7055A70130C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:eurotel:etl3100_firmware:01x37:*:*:*:*:*:*:*",
"matchCriteriaId": "B0489194-32E5-485A-A8A5-BE1ECEEB004C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:eurotel:etl3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6661C9-6751-4E03-9FB8-0406FFE752BA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6930",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-12-19T23:15:08.410",
"lastModified": "2023-12-20T13:50:26.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:33:50.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -50,10 +80,48 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:eurotel:etl3100_firmware:01c01:*:*:*:*:*:*:*",
"matchCriteriaId": "E14B60DA-34A0-479A-B2FA-7055A70130C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:eurotel:etl3100_firmware:01x37:*:*:*:*:*:*:*",
"matchCriteriaId": "B0489194-32E5-485A-A8A5-BE1ECEEB004C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:eurotel:etl3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6661C9-6751-4E03-9FB8-0406FFE752BA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6940",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-12-19T02:15:45.050",
"lastModified": "2023-12-19T13:42:12.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:58:04.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -50,14 +72,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.9.2",
"matchCriteriaId": "6B5585E2-CC70-4BED-AA89-B791F081ACFC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mlflow/mlflow/commit/5139b1087d686fa52e2b087e09da66aff86297b1",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/c6f59480-ce47-4f78-a3dc-4bd8ca15029c",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6975",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-12-20T06:15:45.553",
"lastModified": "2023-12-20T13:50:15.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:39:54.763",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -50,14 +72,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.9.2",
"matchCriteriaId": "6B5585E2-CC70-4BED-AA89-B791F081ACFC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mlflow/mlflow/commit/b9ab9ed77e1deda9697fe472fb1079fd428149ee",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/029a3824-cee3-4cf1-b260-7138aa539b85",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6976",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-12-20T06:15:45.730",
"lastModified": "2023-12-20T13:50:15.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:44:03.743",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -50,14 +72,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.9.2",
"matchCriteriaId": "6B5585E2-CC70-4BED-AA89-B791F081ACFC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mlflow/mlflow/commit/5044878da0c1851ccfdd5c0a867157ed9a502fbc",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/2408a52b-f05b-4cac-9765-4f74bac3f20f",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6977",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-12-20T06:15:45.907",
"lastModified": "2023-12-20T13:50:15.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-29T16:45:44.597",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -50,14 +72,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "2.9.2",
"matchCriteriaId": "64A68D74-E30A-4AA7-9564-63E4967604E1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mlflow/mlflow/commit/4bd7f27c810ba7487d53ed5ef1038fca0f8dc28c",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/fe53bf71-3687-4711-90df-c26172880aaf",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-12-29T15:00:24.757544+00:00
2023-12-29T17:00:24.443655+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-12-29T14:46:03.957000+00:00
2023-12-29T16:59:24.403000+00:00
```
### Last Data Feed Release
@ -29,67 +29,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
234517
234528
```
### CVEs added in the last Commit
Recently added CVEs: `23`
Recently added CVEs: `11`
* [CVE-2023-50878](CVE-2023/CVE-2023-508xx/CVE-2023-50878.json) (`2023-12-29T13:15:08.693`)
* [CVE-2023-50902](CVE-2023/CVE-2023-509xx/CVE-2023-50902.json) (`2023-12-29T13:15:09.230`)
* [CVE-2023-51354](CVE-2023/CVE-2023-513xx/CVE-2023-51354.json) (`2023-12-29T13:15:09.450`)
* [CVE-2023-51358](CVE-2023/CVE-2023-513xx/CVE-2023-51358.json) (`2023-12-29T13:15:09.663`)
* [CVE-2023-51378](CVE-2023/CVE-2023-513xx/CVE-2023-51378.json) (`2023-12-29T13:15:09.930`)
* [CVE-2023-51414](CVE-2023/CVE-2023-514xx/CVE-2023-51414.json) (`2023-12-29T13:15:10.180`)
* [CVE-2023-51422](CVE-2023/CVE-2023-514xx/CVE-2023-51422.json) (`2023-12-29T13:15:10.393`)
* [CVE-2023-51470](CVE-2023/CVE-2023-514xx/CVE-2023-51470.json) (`2023-12-29T13:15:10.607`)
* [CVE-2023-51505](CVE-2023/CVE-2023-515xx/CVE-2023-51505.json) (`2023-12-29T13:15:10.820`)
* [CVE-2023-51545](CVE-2023/CVE-2023-515xx/CVE-2023-51545.json) (`2023-12-29T13:15:11.037`)
* [CVE-2023-51676](CVE-2023/CVE-2023-516xx/CVE-2023-51676.json) (`2023-12-29T13:15:11.247`)
* [CVE-2023-7113](CVE-2023/CVE-2023-71xx/CVE-2023-7113.json) (`2023-12-29T13:15:11.930`)
* [CVE-2023-7114](CVE-2023/CVE-2023-71xx/CVE-2023-7114.json) (`2023-12-29T13:15:12.157`)
* [CVE-2023-51410](CVE-2023/CVE-2023-514xx/CVE-2023-51410.json) (`2023-12-29T14:15:46.190`)
* [CVE-2023-51411](CVE-2023/CVE-2023-514xx/CVE-2023-51411.json) (`2023-12-29T14:15:46.437`)
* [CVE-2023-51412](CVE-2023/CVE-2023-514xx/CVE-2023-51412.json) (`2023-12-29T14:15:46.650`)
* [CVE-2023-51417](CVE-2023/CVE-2023-514xx/CVE-2023-51417.json) (`2023-12-29T14:15:46.860`)
* [CVE-2023-51419](CVE-2023/CVE-2023-514xx/CVE-2023-51419.json) (`2023-12-29T14:15:47.063`)
* [CVE-2023-51421](CVE-2023/CVE-2023-514xx/CVE-2023-51421.json) (`2023-12-29T14:15:47.270`)
* [CVE-2023-51468](CVE-2023/CVE-2023-514xx/CVE-2023-51468.json) (`2023-12-29T14:15:47.480`)
* [CVE-2023-51473](CVE-2023/CVE-2023-514xx/CVE-2023-51473.json) (`2023-12-29T14:15:47.697`)
* [CVE-2023-51475](CVE-2023/CVE-2023-514xx/CVE-2023-51475.json) (`2023-12-29T14:15:47.913`)
* [CVE-2023-51675](CVE-2023/CVE-2023-516xx/CVE-2023-51675.json) (`2023-12-29T14:15:48.117`)
* [CVE-2023-47804](CVE-2023/CVE-2023-478xx/CVE-2023-47804.json) (`2023-12-29T15:15:09.157`)
* [CVE-2023-4541](CVE-2023/CVE-2023-45xx/CVE-2023-4541.json) (`2023-12-29T15:15:09.267`)
* [CVE-2023-4674](CVE-2023/CVE-2023-46xx/CVE-2023-4674.json) (`2023-12-29T15:15:09.497`)
* [CVE-2023-4675](CVE-2023/CVE-2023-46xx/CVE-2023-4675.json) (`2023-12-29T15:15:09.717`)
* [CVE-2023-50570](CVE-2023/CVE-2023-505xx/CVE-2023-50570.json) (`2023-12-29T15:15:09.927`)
* [CVE-2023-50571](CVE-2023/CVE-2023-505xx/CVE-2023-50571.json) (`2023-12-29T15:15:09.983`)
* [CVE-2023-50572](CVE-2023/CVE-2023-505xx/CVE-2023-50572.json) (`2023-12-29T15:15:10.030`)
* [CVE-2023-51517](CVE-2023/CVE-2023-515xx/CVE-2023-51517.json) (`2023-12-29T15:15:10.080`)
* [CVE-2023-51527](CVE-2023/CVE-2023-515xx/CVE-2023-51527.json) (`2023-12-29T15:15:10.303`)
* [CVE-2023-51687](CVE-2023/CVE-2023-516xx/CVE-2023-51687.json) (`2023-12-29T15:15:10.557`)
* [CVE-2023-51688](CVE-2023/CVE-2023-516xx/CVE-2023-51688.json) (`2023-12-29T15:15:10.787`)
### CVEs modified in the last Commit
Recently modified CVEs: `118`
Recently modified CVEs: `42`
* [CVE-2023-23424](CVE-2023/CVE-2023-234xx/CVE-2023-23424.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-23426](CVE-2023/CVE-2023-234xx/CVE-2023-23426.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-23427](CVE-2023/CVE-2023-234xx/CVE-2023-23427.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-23428](CVE-2023/CVE-2023-234xx/CVE-2023-23428.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-23429](CVE-2023/CVE-2023-234xx/CVE-2023-23429.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-23430](CVE-2023/CVE-2023-234xx/CVE-2023-23430.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-23437](CVE-2023/CVE-2023-234xx/CVE-2023-23437.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-23438](CVE-2023/CVE-2023-234xx/CVE-2023-23438.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-23439](CVE-2023/CVE-2023-234xx/CVE-2023-23439.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-23440](CVE-2023/CVE-2023-234xx/CVE-2023-23440.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-31293](CVE-2023/CVE-2023-312xx/CVE-2023-31293.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-31294](CVE-2023/CVE-2023-312xx/CVE-2023-31294.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-7147](CVE-2023/CVE-2023-71xx/CVE-2023-7147.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-7148](CVE-2023/CVE-2023-71xx/CVE-2023-7148.json) (`2023-12-29T13:56:44.347`)
* [CVE-2023-45123](CVE-2023/CVE-2023-451xx/CVE-2023-45123.json) (`2023-12-29T13:58:57.330`)
* [CVE-2023-45122](CVE-2023/CVE-2023-451xx/CVE-2023-45122.json) (`2023-12-29T13:59:19.293`)
* [CVE-2023-48717](CVE-2023/CVE-2023-487xx/CVE-2023-48717.json) (`2023-12-29T14:04:19.947`)
* [CVE-2023-48716](CVE-2023/CVE-2023-487xx/CVE-2023-48716.json) (`2023-12-29T14:05:07.757`)
* [CVE-2023-48690](CVE-2023/CVE-2023-486xx/CVE-2023-48690.json) (`2023-12-29T14:07:19.157`)
* [CVE-2023-48689](CVE-2023/CVE-2023-486xx/CVE-2023-48689.json) (`2023-12-29T14:07:40.387`)
* [CVE-2023-48688](CVE-2023/CVE-2023-486xx/CVE-2023-48688.json) (`2023-12-29T14:08:27.697`)
* [CVE-2023-48685](CVE-2023/CVE-2023-486xx/CVE-2023-48685.json) (`2023-12-29T14:09:02.460`)
* [CVE-2023-48686](CVE-2023/CVE-2023-486xx/CVE-2023-48686.json) (`2023-12-29T14:09:18.227`)
* [CVE-2023-48687](CVE-2023/CVE-2023-486xx/CVE-2023-48687.json) (`2023-12-29T14:09:32.003`)
* [CVE-2023-6974](CVE-2023/CVE-2023-69xx/CVE-2023-6974.json) (`2023-12-29T14:13:47.377`)
* [CVE-2023-50707](CVE-2023/CVE-2023-507xx/CVE-2023-50707.json) (`2023-12-29T16:19:20.037`)
* [CVE-2023-50706](CVE-2023/CVE-2023-507xx/CVE-2023-50706.json) (`2023-12-29T16:25:56.740`)
* [CVE-2023-46645](CVE-2023/CVE-2023-466xx/CVE-2023-46645.json) (`2023-12-29T16:27:51.847`)
* [CVE-2023-50705](CVE-2023/CVE-2023-507xx/CVE-2023-50705.json) (`2023-12-29T16:28:38.393`)
* [CVE-2023-50704](CVE-2023/CVE-2023-507xx/CVE-2023-50704.json) (`2023-12-29T16:31:20.133`)
* [CVE-2023-50703](CVE-2023/CVE-2023-507xx/CVE-2023-50703.json) (`2023-12-29T16:32:32.477`)
* [CVE-2023-6930](CVE-2023/CVE-2023-69xx/CVE-2023-6930.json) (`2023-12-29T16:33:50.960`)
* [CVE-2023-6929](CVE-2023/CVE-2023-69xx/CVE-2023-6929.json) (`2023-12-29T16:34:56.257`)
* [CVE-2023-6928](CVE-2023/CVE-2023-69xx/CVE-2023-6928.json) (`2023-12-29T16:36:03.497`)
* [CVE-2023-6145](CVE-2023/CVE-2023-61xx/CVE-2023-6145.json) (`2023-12-29T16:38:48.537`)
* [CVE-2023-6975](CVE-2023/CVE-2023-69xx/CVE-2023-6975.json) (`2023-12-29T16:39:54.763`)
* [CVE-2023-6976](CVE-2023/CVE-2023-69xx/CVE-2023-6976.json) (`2023-12-29T16:44:03.743`)
* [CVE-2023-6977](CVE-2023/CVE-2023-69xx/CVE-2023-6977.json) (`2023-12-29T16:45:44.597`)
* [CVE-2023-50477](CVE-2023/CVE-2023-504xx/CVE-2023-50477.json) (`2023-12-29T16:46:54.310`)
* [CVE-2023-50481](CVE-2023/CVE-2023-504xx/CVE-2023-50481.json) (`2023-12-29T16:48:05.673`)
* [CVE-2023-6122](CVE-2023/CVE-2023-61xx/CVE-2023-6122.json) (`2023-12-29T16:49:05.307`)
* [CVE-2023-50475](CVE-2023/CVE-2023-504xx/CVE-2023-50475.json) (`2023-12-29T16:50:00.283`)
* [CVE-2023-51655](CVE-2023/CVE-2023-516xx/CVE-2023-51655.json) (`2023-12-29T16:50:16.837`)
* [CVE-2023-28025](CVE-2023/CVE-2023-280xx/CVE-2023-28025.json) (`2023-12-29T16:51:19.727`)
* [CVE-2023-47093](CVE-2023/CVE-2023-470xx/CVE-2023-47093.json) (`2023-12-29T16:53:29.980`)
* [CVE-2023-41166](CVE-2023/CVE-2023-411xx/CVE-2023-41166.json) (`2023-12-29T16:54:30.753`)
* [CVE-2023-50993](CVE-2023/CVE-2023-509xx/CVE-2023-50993.json) (`2023-12-29T16:55:09.883`)
* [CVE-2023-49776](CVE-2023/CVE-2023-497xx/CVE-2023-49776.json) (`2023-12-29T16:55:58.180`)
* [CVE-2023-6940](CVE-2023/CVE-2023-69xx/CVE-2023-6940.json) (`2023-12-29T16:58:04.290`)
* [CVE-2023-44482](CVE-2023/CVE-2023-444xx/CVE-2023-44482.json) (`2023-12-29T16:59:24.403`)
## Download and Usage