Auto-Update: 2024-02-21T11:01:04.754994+00:00

This commit is contained in:
cad-safe-bot 2024-02-21 11:01:08 +00:00
parent 8508eaaf42
commit d3f6fe25be
3 changed files with 10 additions and 37 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-6398",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2024-02-20T02:15:49.110",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-02-21T10:15:42.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A post-authentication command injection vulnerability in the file upload binary in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, NWA50AX firmware versions through 6.29(ABYW.3), WAC500 firmware versions through 6.65(ABVS.1), WAX300H firmware versions through 6.60(ACHF.1), and WBE660S firmware versions through 6.65(ACGG.1) could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device via FTP."
"value": "A post-authentication command injection vulnerability in the file upload binary in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, \n\nUSG FLEX H series firmware versions from 1.10 through 1.10 Patch 1,\n\nNWA50AX firmware versions through 6.29(ABYW.3), WAC500 firmware versions through 6.65(ABVS.1), WAX300H firmware versions through 6.60(ACHF.1), and WBE660S firmware versions through 6.65(ACGG.1) could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device via FTP."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-6399",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2024-02-20T02:15:49.407",
"lastModified": "2024-02-20T19:50:53.960",
"lastModified": "2024-02-21T10:15:42.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, and USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the \u201cdeviceid\u201d daemon by sending a crafted hostname to an affected device if it has the \u201cDevice Insight\u201d feature enabled."
"value": "A format string vulnerability in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, and\u00a0USG FLEX H series firmware versions from 1.10 through 1.10 Patch 1 could allow an authenticated IPSec VPN user to cause DoS conditions against the \u201cdeviceid\u201d daemon by sending a crafted hostname to an affected device if it has the \u201cDevice Insight\u201d feature enabled."
},
{
"lang": "es",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-21T09:02:08.898797+00:00
2024-02-21T11:01:04.754994+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-21T08:15:46.277000+00:00
2024-02-21T10:15:42.900000+00:00
```
### Last Data Feed Release
@ -34,43 +34,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `40`
Recently added CVEs: `0`
* [CVE-2023-42877](CVE-2023/CVE-2023-428xx/CVE-2023-42877.json) (`2024-02-21T07:15:50.173`)
* [CVE-2023-42878](CVE-2023/CVE-2023-428xx/CVE-2023-42878.json) (`2024-02-21T07:15:50.357`)
* [CVE-2023-42889](CVE-2023/CVE-2023-428xx/CVE-2023-42889.json) (`2024-02-21T07:15:50.453`)
* [CVE-2023-42928](CVE-2023/CVE-2023-429xx/CVE-2023-42928.json) (`2024-02-21T07:15:50.603`)
* [CVE-2023-42939](CVE-2023/CVE-2023-429xx/CVE-2023-42939.json) (`2024-02-21T07:15:50.767`)
* [CVE-2023-42942](CVE-2023/CVE-2023-429xx/CVE-2023-42942.json) (`2024-02-21T07:15:50.963`)
* [CVE-2023-42945](CVE-2023/CVE-2023-429xx/CVE-2023-42945.json) (`2024-02-21T07:15:51.140`)
* [CVE-2023-42946](CVE-2023/CVE-2023-429xx/CVE-2023-42946.json) (`2024-02-21T07:15:51.307`)
* [CVE-2023-42951](CVE-2023/CVE-2023-429xx/CVE-2023-42951.json) (`2024-02-21T07:15:51.363`)
* [CVE-2023-42952](CVE-2023/CVE-2023-429xx/CVE-2023-42952.json) (`2024-02-21T07:15:51.510`)
* [CVE-2023-42953](CVE-2023/CVE-2023-429xx/CVE-2023-42953.json) (`2024-02-21T07:15:51.717`)
* [CVE-2023-52440](CVE-2023/CVE-2023-524xx/CVE-2023-52440.json) (`2024-02-21T08:15:45.203`)
* [CVE-2023-52441](CVE-2023/CVE-2023-524xx/CVE-2023-52441.json) (`2024-02-21T08:15:45.463`)
* [CVE-2023-52442](CVE-2023/CVE-2023-524xx/CVE-2023-52442.json) (`2024-02-21T08:15:45.547`)
* [CVE-2024-0593](CVE-2024/CVE-2024-05xx/CVE-2024-0593.json) (`2024-02-21T07:15:52.520`)
* [CVE-2024-1081](CVE-2024/CVE-2024-10xx/CVE-2024-1081.json) (`2024-02-21T07:15:53.183`)
* [CVE-2024-24843](CVE-2024/CVE-2024-248xx/CVE-2024-24843.json) (`2024-02-21T07:15:54.413`)
* [CVE-2024-24849](CVE-2024/CVE-2024-248xx/CVE-2024-24849.json) (`2024-02-21T07:15:55.140`)
* [CVE-2024-24872](CVE-2024/CVE-2024-248xx/CVE-2024-24872.json) (`2024-02-21T07:15:55.780`)
* [CVE-2024-24876](CVE-2024/CVE-2024-248xx/CVE-2024-24876.json) (`2024-02-21T07:15:56.193`)
* [CVE-2024-25904](CVE-2024/CVE-2024-259xx/CVE-2024-25904.json) (`2024-02-21T07:15:56.863`)
* [CVE-2024-25905](CVE-2024/CVE-2024-259xx/CVE-2024-25905.json) (`2024-02-21T07:15:57.410`)
* [CVE-2024-24798](CVE-2024/CVE-2024-247xx/CVE-2024-24798.json) (`2024-02-21T08:15:45.610`)
* [CVE-2024-24802](CVE-2024/CVE-2024-248xx/CVE-2024-24802.json) (`2024-02-21T08:15:46.027`)
* [CVE-2024-24837](CVE-2024/CVE-2024-248xx/CVE-2024-24837.json) (`2024-02-21T08:15:46.277`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `2`
* [CVE-2023-46045](CVE-2023/CVE-2023-460xx/CVE-2023-46045.json) (`2024-02-21T07:15:51.880`)
* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-21T07:15:53.630`)
* [CVE-2024-25973](CVE-2024/CVE-2024-259xx/CVE-2024-25973.json) (`2024-02-21T07:15:58.040`)
* [CVE-2024-25974](CVE-2024/CVE-2024-259xx/CVE-2024-25974.json) (`2024-02-21T07:15:58.427`)
* [CVE-2023-6398](CVE-2023/CVE-2023-63xx/CVE-2023-6398.json) (`2024-02-21T10:15:42.770`)
* [CVE-2023-6399](CVE-2023/CVE-2023-63xx/CVE-2023-6399.json) (`2024-02-21T10:15:42.900`)
## Download and Usage