Auto-Update: 2023-09-12T20:00:24.745323+00:00

This commit is contained in:
cad-safe-bot 2023-09-12 20:00:28 +00:00
parent 96f3e37089
commit d47f1b11a3
94 changed files with 9339 additions and 271 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-8859",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-01-23T21:59:00.657",
"lastModified": "2017-03-02T02:59:00.790",
"vulnStatus": "Modified",
"lastModified": "2023-09-12T19:42:42.783",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "NVD-CWE-noinfo"
}
]
}
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.11.0",
"matchCriteriaId": "5EFB26FA-882C-44E3-AED6-BAFFE7F23BA6"
"criteria": "cpe:2.3:a:send_project:send:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "0.11.1",
"matchCriteriaId": "E3AD6A79-80D5-4F94-9768-6914D8E9A13B"
}
]
}
@ -104,12 +104,18 @@
},
{
"url": "http://www.securityfocus.com/bid/96435",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://nodesecurity.io/advisories/56",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-27418",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.047",
"lastModified": "2023-08-25T18:12:55.850",
"lastModified": "2023-09-12T18:14:45.473",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33164",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-09-08T20:15:14.237",
"lastModified": "2023-09-10T19:45:57.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T19:32:37.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -46,14 +76,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_directory_server:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C70F0395-89C4-4AC1-BD60-A5ECE55AB0AF"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/228579",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry",
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7031021",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34918",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-04T21:15:07.730",
"lastModified": "2023-05-16T11:00:06.063",
"lastModified": "2023-09-12T19:39:38.350",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -77,7 +77,6 @@
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -87,8 +86,29 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.1",
"versionEndExcluding": "4.14.316",
"matchCriteriaId": "708B805D-F1B9-410C-8231-CD62F16F5739"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.284",
"matchCriteriaId": "9112EE64-11F4-46DB-A041-95118F20F81B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.244",
"matchCriteriaId": "79F47095-8BA3-495A-AED3-2CCA5F2838E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.130",
"matchCriteriaId": "D9DE8CDD-0E52-4402-9991-5CAF6A133E21"
"matchCriteriaId": "8BF24898-7C80-443F-93F3-F82029BBFF72"
},
{
"vulnerable": true,
@ -109,7 +129,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
@ -125,7 +144,6 @@
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39189",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-02T05:15:07.693",
"lastModified": "2023-08-19T18:15:11.363",
"vulnStatus": "Modified",
"lastModified": "2023-09-12T19:41:21.317",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -60,8 +60,65 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.16",
"versionEndExcluding": "5.4.244",
"matchCriteriaId": "FADC0214-BD61-4A11-B936-B206A73AD588"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.180",
"matchCriteriaId": "DE17DE03-9DE8-4DC5-92CB-D85B24289C74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.60",
"matchCriteriaId": "350B36C3-FE0B-4EE8-A4C3-CF925DCBD809"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.17",
"matchCriteriaId": "1F280165-1214-41AD-BAC3-E3D0B73AF604"
"matchCriteriaId": "30793531-9841-4C8F-BED2-AC176CCCF48E"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*",
"matchCriteriaId": "27227B35-932A-4035-B39F-6A455753C0D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*",
"matchCriteriaId": "489D20B9-166F-423D-8C48-A23D3026E33B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*",
"matchCriteriaId": "A4AD592C-222D-4C6F-B176-8145A1A5AFEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*",
"matchCriteriaId": "8603654B-A8A9-4DEB-B0DD-C82E1C885749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*",
"matchCriteriaId": "C855C933-F271-45E6-8E85-8D7CF2EF1BE6"
}
]
}
@ -105,11 +162,18 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20230214-0007/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4454",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-13T18:15:10.623",
"lastModified": "2022-12-19T16:36:44.853",
"lastModified": "2023-09-12T19:39:16.753",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -93,9 +93,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bible-online_project:bible-online:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:m0ver:bible-online:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2022-10-02",
"matchCriteriaId": "5011FD05-7087-43A6-8BD6-20AB0CFEF93F"
"matchCriteriaId": "91FB2B85-9D4A-40B9-9F50-47E36D2CE31F"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0119",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-12T16:15:08.007",
"lastModified": "2023-09-12T16:15:08.007",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20250",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-09-06T17:15:50.100",
"lastModified": "2023-09-07T01:10:21.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T19:36:21.083",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -34,10 +54,955 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85BD0509-E217-46CF-94CC-4AB78B6BA81D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "8AF492FA-ADEF-4AC6-B3B2-5526D6AF9433"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "12E9CC14-F5E2-481C-AD37-CB9CCCD00B55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE93940-8109-43B9-B507-5B56ED579A99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0C47E6A4-A40C-4514-A3BE-5032DA06FDF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "29A1B2ED-BE93-4555-ACA3-4FB2C08A027C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "AEA3F230-09E1-4B1B-9B4E-AA7845963252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "505CEC40-9FC2-4480-BC50-07FD412925D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "132D6E49-9EB7-4CDB-AC43-F9837D07BE2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "2997345F-5C60-4F09-A76F-015E055B87B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "0C342BE5-6443-48EC-96B7-31BEB46EBC2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.22:*:*:*:*:*:*:*",
"matchCriteriaId": "CED99113-35C3-40A6-AEF0-787EC30F3E8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.28:*:*:*:*:*:*:*",
"matchCriteriaId": "BE17D881-2549-404B-A691-69A94C776595"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.44:*:*:*:*:*:*:*",
"matchCriteriaId": "4A41582B-1C06-4670-BBE5-F91D3383B7DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.45:*:*:*:*:*:*:*",
"matchCriteriaId": "CD675BFB-AAB0-4818-89F2-D624FCDBF516"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "F4DD0B2C-B62D-43DB-ACA6-BD715E6C1D69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.52:*:*:*:*:*:*:*",
"matchCriteriaId": "1160B6A0-074A-4DC1-9268-4A15F2C75C64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.54:*:*:*:*:*:*:*",
"matchCriteriaId": "E50E1386-D836-436D-A5BC-ACF1AF922F33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.0.3.55:*:*:*:*:*:*:*",
"matchCriteriaId": "670BF7A6-F2C1-4CD4-B6E6-208C95A32E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B4AA64-B0EC-428A-8D1D-022C3B5F1F33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "66E9978B-498F-46AA-9093-C13DD076EE39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5D028A9A-4CDF-4B67-829B-7B7E742FF04C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CA9988BE-4A76-44B2-9197-977B379C22B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9F712711-18F7-4FB8-8EBC-B42DC59B67A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "97FC925D-46ED-4AB5-B55B-64C2A0F131AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE05619-C8C9-4BD9-9357-11BF197EBB34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C90303-7941-4B80-A0AB-EB5EBB7D0180"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "91BDFF21-AD3E-4DA8-9F54-B897E784C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "466E481B-7DD9-4AA0-B5E5-75BBE3820190"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D742A59B-AC7F-4249-AC40-44C63BECC86C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7A069D95-07D8-435B-B7BB-98785F930C74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "57701D90-EEC9-4105-9633-673EFCD69BC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A70E10-227E-44E2-8558-58B37CCF63D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FF28AEEA-34F1-40F1-ACDC-25FDD56EA282"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DEAE8829-4F41-42CD-81C1-C2A0160254BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "133B77B5-F9D5-48DC-B197-BDBE6704DDDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "054EA087-0584-42F8-A7CF-84A6A964E627"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "429D901C-359F-4250-8C49-D032C03728B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "455E3BAA-D45F-4502-92A4-770EC05BE781"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BA113E1F-35E5-4D11-8D18-85AE8415E027"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E7CD5D-6AD6-4028-A1DE-DC38E96BE8AD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "818DD411-2312-4BC8-8909-8392B26EDA7B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20E8ECAC-E842-41DB-9612-9374A9648DC2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C28C88A2-4E12-4FAB-B9CD-88FAD97D28F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "93CFB437-9467-406D-AD7B-F1E669110394"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "D03E1ABF-BCAA-4559-A5E6-78FAC4A7226A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "284BFD6A-E8EA-4E25-94F8-3C7285D77662"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DCEAE05F-9820-4B74-BE69-15EFBB17912B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "298D0C39-083A-45C4-BD25-FA625C876B14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "379B2D64-6410-4398-9180-EE058F54F11F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E70BC0DA-E0C2-4C00-B773-22BA22E73565"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA2771F-A24F-4588-A2F1-BD2302ECAC46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "D5C936A7-1483-4A0E-850B-F618C4D34954"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6208D4F9-2364-4B8B-9E0A-5A8CB8C9BCA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F03BC6F9-7C9C-43F3-B456-275AD8573BF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.28:*:*:*:*:*:*:*",
"matchCriteriaId": "31C6658C-2F10-4606-9F4A-C2F11E9C97FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.44:*:*:*:*:*:*:*",
"matchCriteriaId": "58880230-54F3-45E9-9F0C-079E1D62AC87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.45:*:*:*:*:*:*:*",
"matchCriteriaId": "4B29E20E-C0F0-4C9C-AA08-7307773EBB18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "CABF35FC-ADA8-4685-AE64-59E154A647A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.52:*:*:*:*:*:*:*",
"matchCriteriaId": "317F8BC3-73D9-4277-9213-5CA1DE80356D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.54:*:*:*:*:*:*:*",
"matchCriteriaId": "9AE444E6-2632-4137-9499-961B3716984E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.0.3.55:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8376ED-8273-4296-A90F-AA16156B8104"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED476F0-B4FE-4A27-AD18-7B306B4A880F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5A99AF72-A118-4FBF-9376-FCBF29572FB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2D419F7C-5D21-4A35-B038-F6673F5708E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1852B10D-58CA-4656-9325-73FE8ACE6998"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B8126A48-3496-46B1-818B-6A6ED839218F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F617A360-7FDF-47EB-AAA2-10FD749808B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B8687A68-8F82-471F-BD8D-E9A1C9467B1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "D7DD5F37-1377-4497-848A-0F72B4902821"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F85E65-6B98-4DA0-98A8-65E353588CBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ED2E8B08-9AB4-4C06-9308-FF157D2C2EAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C28AA2-635F-4D0A-8D01-25B34F715C6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "566E726A-D668-4532-B842-8C435C5AAA18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CBECE2AC-CE19-494A-82B7-967237AAB92A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A08450D0-3260-45F7-B7BE-59BDA64E816F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA4AB9C-B969-4076-8C60-AC1F15057D0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "117AD898-3217-464A-AFAC-2AD4E5F0CBB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "925A92DC-9996-4CE2-BC80-3B57D2120374"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9A7D95BD-5C61-4D71-A155-83D5F0005027"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "00E2372F-A07E-418F-A698-52C98BCB04E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC73150C-F62A-4E81-8587-68F3969A37A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "614FA0AD-3591-44C4-B2DD-8242C1D42F88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DC412EDF-53BB-4B7B-9DB7-04EE6332C459"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130_firmware:1.3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA081A3-C57E-4480-A3F9-E82383C60575"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:rv130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D233CF-2504-4E69-9AD0-D3B631C8FC11"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0C7B4C3B-ACB9-4B6B-A04B-943C4A5CEDF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "ECCF42F5-8626-4D23-85B9-95644C7E98BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "640373F0-F395-4007-B26C-A43AF3F9E551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0E185A2E-7958-4A0D-AD54-DE5A2DC1FA3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "41EC53E2-7AC9-4998-9917-4C510E2BCBA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B33F37F5-3A46-406F-9743-E5148EC27169"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D6E63E-F5F7-4A2F-90D7-0DAEA147BD93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "36A6781B-AC64-431F-959A-674F4C50F5C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE45FAD-4923-4F29-A0F2-F5D4F760A069"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "198D6B01-8AFB-4192-AA23-90AB81C0E641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8A90BA88-76B8-48B9-B3A3-7DBE4A329C94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.22:*:*:*:*:*:*:*",
"matchCriteriaId": "CC96B47A-7AE0-48B3-9DCF-9E63D6067BB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.28:*:*:*:*:*:*:*",
"matchCriteriaId": "22E1468B-BF8C-4356-880A-8EBA4AA39CFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.44:*:*:*:*:*:*:*",
"matchCriteriaId": "D5F6B3EC-7B4B-48B7-A621-85810FA066AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.45:*:*:*:*:*:*:*",
"matchCriteriaId": "E2825F4F-5AC7-457F-AE08-FCC25BD650CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBE6464-64A6-41E2-B661-30A8063C07C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.52:*:*:*:*:*:*:*",
"matchCriteriaId": "F636420E-F91B-45D6-ABB4-B701AC7D7063"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.54:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD7186A-EEE8-4BC8-ABA8-593F02C6283B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.0.3.55:*:*:*:*:*:*:*",
"matchCriteriaId": "FF66A7CE-469A-48CD-AE85-2F49E1C505FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "08794FE4-9CB0-4C96-B26F-A09F26092064"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3DC7EDDE-B22D-405C-881D-4C0784DBEF9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B22E38D9-DBAE-41BD-9D40-3DE0F1D0CB1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4EF45BF5-2310-41DA-925A-6EB41E0E268B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "57043FE9-4969-4A0B-A742-4FB56D745639"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0F68A5E6-1ED8-46BD-B73B-37A297219A01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "8786FBE0-51C6-4CBD-B3F2-89F287EAA093"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA03A86-5438-42BE-B50F-049A0BBEA843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "80DB1F39-597E-4A68-A6EE-07B5247237FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DDEFAEC1-55C0-4FAF-B986-FCFC81C24D81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A4DC6A77-4D7B-4373-9447-141707086EE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "49AD3869-9553-4FC8-9BBA-FF814E34B3C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "703A0590-D4A6-47E9-9CAA-C4A4A553560F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8DCD0AD1-1FFD-4A08-A113-3801ABD56534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9EA4F1-ED61-4ED1-8678-1F6BD75007E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2C940D23-7EA4-43E4-A01A-6CC4EF203753"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "240A6B22-09B9-4656-BD4F-4C2E329A3C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "44C3199D-7D0F-4210-BC2B-BDDB9C3FD196"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "D814F9AC-3E09-4509-A5E5-24560E9A0F10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D4B38F3C-0935-486B-AE88-6E946728943D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD1FFB6-8707-445A-81EF-389A56896FD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BD56B903-96E0-4BAD-B7D4-4856E8D67AC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F04F9D87-B28C-45AE-9AD3-477A1DE65CE6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3C9AFAA-1387-4067-AF7E-2E4AAD2A272A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5CC2CC2-006F-4E4F-9A4C-792CC551FD4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "04A87F88-BCD3-4042-B220-9739AE00AAEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "B89C7B5A-49D0-48D1-829B-BCA69FE8AF6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A1024CBE-BF8D-487F-B759-3A14F9598D22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "003D0694-E2C4-4372-A4B3-70EBA908CA52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7D286CFE-A3C9-4D2B-B2BE-0F1653237692"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "B71CFC58-AD8B-4E98-9E30-5A98BF7F0435"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F57591A8-E41A-4343-B90B-899E9A098DE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "4C5DD9A2-E716-4923-A473-7964E613566A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F2CA109E-3ED1-4891-8111-1514F5594FC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "21DDB9A7-C0A9-45D5-9054-28B8FAEE5E09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.22:*:*:*:*:*:*:*",
"matchCriteriaId": "9185CA86-F321-42DE-A599-ABB1838A88A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.28:*:*:*:*:*:*:*",
"matchCriteriaId": "C23840E2-344E-48AC-AD2A-8CC869242ED8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.44:*:*:*:*:*:*:*",
"matchCriteriaId": "D4749115-5558-4741-BF55-8B0CE1D46616"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.45:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9A1F5D-7B18-4EE7-9C32-6DE7C1443E21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "9F935A71-F131-421F-9005-9D7521F8A56C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.52:*:*:*:*:*:*:*",
"matchCriteriaId": "1609CB6E-9973-45BD-B8AB-EAE87700FE09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.54:*:*:*:*:*:*:*",
"matchCriteriaId": "F2FF87AC-944C-4B06-825D-E10985418F5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.0.3.55:*:*:*:*:*:*:*",
"matchCriteriaId": "0909B440-99B7-43BE-BD8F-65EB3CF941ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B109BB09-DF8C-4087-8C16-BF17D12A2863"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FA7BD747-2A0C-4ADE-9CD8-391676F9C070"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9AAFA0-B13C-4E07-AC34-D669AB71B3FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "94521BCD-6874-4C51-8038-B84C0D0BF2DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AD17D068-AE75-4788-9CB2-73E03F85CD66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "79C06CBE-8482-40F1-899C-78D7C05094D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4F96C05D-C899-4D1B-B45A-A30F2DE3A731"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E8A6EAAE-3AA3-4A52-97F0-71EC67677681"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "59C70BA1-A1EF-4AD2-8B88-003A2B1C27B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7E416D4D-6BF3-4596-972F-F0D258FC9E1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "34BEC7B6-9300-4B6D-A9A3-797CCBB7B3FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4DD911-3153-4693-9E68-4700ACE307E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4683B1-9749-4C83-B14C-C67666ACB8A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "686ADCCF-EEAE-4BF4-A202-87C1F6D06417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "127CDFCA-5654-43EE-AF91-B56D668A0907"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BFE123D6-4E3F-4B30-9219-64487ADFBBA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "962B7F13-6D32-476B-8940-86D9CDE6979D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BDBBA31F-317B-4DA8-B72B-5E92497B6E7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.0.99:*:*:*:*:*:*:*",
"matchCriteriaId": "C48AE727-C755-464D-9E95-978C73D11483"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA02F2D-CDDE-4730-B771-C201A6370775"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BC5C0B09-4492-481D-9548-2DBE1F5D746E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9875284D-70CB-42C0-85C0-DE4191FC8F13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:rv215w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "65ECB6E7-5740-4EE8-9F3F-D4579D3ED608"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:rv215w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8686AB22-F757-468A-930B-DDE45B508969"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-stack-SHYv2f5N",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21521",
"sourceIdentifier": "secure@blackberry.com",
"published": "2023-09-12T19:15:36.033",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "\nAn SQL Injection vulnerability in the Management Console?\u00a0(Operator Audit Trail) of BlackBerry AtHoc version 7.15 could allow an attacker to potentially read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database, recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system.\n\n"
}
],
"metrics": {},
"references": [
{
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000112406",
"source": "secure@blackberry.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-21522",
"sourceIdentifier": "secure@blackberry.com",
"published": "2023-09-12T19:15:36.153",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "\nA Reflected Cross-site Scripting (XSS) vulnerability in the Management Console (Reports) of Blackberry AtHoc version 7.15 could allow an attacker to potentially control a script that is executed in the victim's browser then they can execute script commands in the context of the affected user account.\u00a0"
}
],
"metrics": {},
"references": [
{
"url": "https://support.blackberry.com/kb/articleDetail?articleNumber=000112406",
"source": "secure@blackberry.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2598",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-01T01:15:17.867",
"lastModified": "2023-07-03T16:15:09.547",
"vulnStatus": "Modified",
"lastModified": "2023-09-12T19:41:14.247",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -67,8 +67,43 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3",
"versionEndIncluding": "6.3.6",
"matchCriteriaId": "4A731D23-D6F9-49F4-AFA3-BAAB3F0CBB48"
"versionEndExcluding": "6.3.2",
"matchCriteriaId": "38F6F330-91A0-4675-8B90-6F950471A7CC"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*",
"matchCriteriaId": "27227B35-932A-4035-B39F-6A455753C0D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410c:*:*:*:*:*:*:*",
"matchCriteriaId": "489D20B9-166F-423D-8C48-A23D3026E33B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*",
"matchCriteriaId": "A4AD592C-222D-4C6F-B176-8145A1A5AFEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*",
"matchCriteriaId": "8603654B-A8A9-4DEB-B0DD-C82E1C885749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*",
"matchCriteriaId": "C855C933-F271-45E6-8E85-8D7CF2EF1BE6"
}
]
}
@ -78,7 +113,10 @@
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20230703-0006/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/05/08/3",

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29332",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:08.790",
"lastModified": "2023-09-12T17:15:08.790",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29463",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-09-12T17:15:09.147",
"lastModified": "2023-09-12T17:15:09.147",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-30962",
"sourceIdentifier": "cve-coordination@palantir.com",
"published": "2023-09-12T19:15:36.237",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Gotham Cerberus service was found to have a stored cross-site scripting (XSS) vulnerability that could have allowed an attacker with access to Gotham to launch attacks against other users. This vulnerability is resolved in Cerberus 100.230704.0-27-g031dd58 ."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@palantir.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
}
]
},
"references": [
{
"url": "https://palantir.safebase.us/?tcuUid=92dd599a-07e2-43a8-956a-9c9566794be0",
"source": "cve-coordination@palantir.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32004",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-08-15T16:15:11.303",
"lastModified": "2023-08-22T14:13:14.530",
"lastModified": "2023-09-12T19:54:07.643",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"versionStartIncluding": "20.0.0",
"versionEndIncluding": "20.5.0",
"matchCriteriaId": "C643F785-3B58-442C-802A-5ED5D5D6566A"
"matchCriteriaId": "145E971E-F0AF-49A7-8A9C-3AAFE01C076B"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33136",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:09.353",
"lastModified": "2023-09-12T17:15:09.353",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34469",
"sourceIdentifier": "biossecurity@ami.com",
"published": "2023-09-12T16:15:09.050",
"lastModified": "2023-09-12T16:15:09.050",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34470",
"sourceIdentifier": "biossecurity@ami.com",
"published": "2023-09-12T16:15:09.273",
"lastModified": "2023-09-12T16:15:09.273",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34758",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-28T12:15:09.007",
"lastModified": "2023-09-01T13:57:27.690",
"lastModified": "2023-09-12T19:39:31.640",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -55,10 +55,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bishopfox:silver:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:bishopfox:sliver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.5.0",
"versionEndExcluding": "1.5.40",
"matchCriteriaId": "6E0B85DC-5DD3-4CDD-9E5D-D3B4B5B341ED"
"matchCriteriaId": "11847E81-39F7-4881-A036-D4E675D4AFE2"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35355",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:09.510",
"lastModified": "2023-09-12T17:15:09.510",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36736",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:09.703",
"lastModified": "2023-09-12T17:15:09.703",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36739",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:09.893",
"lastModified": "2023-09-12T17:15:09.893",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36740",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:10.093",
"lastModified": "2023-09-12T17:15:10.093",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36742",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:10.317",
"lastModified": "2023-09-12T17:15:10.317",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36744",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:10.467",
"lastModified": "2023-09-12T17:15:10.467",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36745",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:10.697",
"lastModified": "2023-09-12T17:15:10.697",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36756",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:10.927",
"lastModified": "2023-09-12T17:15:10.927",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36757",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:11.077",
"lastModified": "2023-09-12T17:15:11.077",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36758",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:11.267",
"lastModified": "2023-09-12T17:15:11.267",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36759",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:11.513",
"lastModified": "2023-09-12T17:15:11.513",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36760",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:11.783",
"lastModified": "2023-09-12T17:15:11.783",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36761",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:11.987",
"lastModified": "2023-09-12T17:15:11.987",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36762",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:12.177",
"lastModified": "2023-09-12T17:15:12.177",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36763",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:12.450",
"lastModified": "2023-09-12T17:15:12.450",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36764",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:12.633",
"lastModified": "2023-09-12T17:15:12.633",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36765",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:12.800",
"lastModified": "2023-09-12T17:15:12.800",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36766",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:12.950",
"lastModified": "2023-09-12T17:15:12.950",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36767",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:13.180",
"lastModified": "2023-09-12T17:15:13.180",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36770",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:13.260",
"lastModified": "2023-09-12T17:15:13.260",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36771",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:13.353",
"lastModified": "2023-09-12T17:15:13.353",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36772",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:13.660",
"lastModified": "2023-09-12T17:15:13.660",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36773",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:14.080",
"lastModified": "2023-09-12T17:15:14.080",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36777",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:14.180",
"lastModified": "2023-09-12T17:15:14.180",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36788",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:14.437",
"lastModified": "2023-09-12T17:15:14.437",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36792",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:14.510",
"lastModified": "2023-09-12T17:15:14.510",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36793",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:14.627",
"lastModified": "2023-09-12T17:15:14.627",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36794",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:14.947",
"lastModified": "2023-09-12T17:15:14.947",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36796",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:15.173",
"lastModified": "2023-09-12T17:15:15.173",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36799",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:15.253",
"lastModified": "2023-09-12T17:15:15.253",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36800",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:15.330",
"lastModified": "2023-09-12T17:15:15.330",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36801",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:15.407",
"lastModified": "2023-09-12T17:15:15.407",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36802",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:15.487",
"lastModified": "2023-09-12T17:15:15.487",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36803",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:15.717",
"lastModified": "2023-09-12T17:15:15.717",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36804",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:16.043",
"lastModified": "2023-09-12T17:15:16.043",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36805",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:16.233",
"lastModified": "2023-09-12T17:15:16.233",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36886",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:16.397",
"lastModified": "2023-09-12T17:15:16.397",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38139",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:16.470",
"lastModified": "2023-09-12T17:15:16.470",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38140",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:16.547",
"lastModified": "2023-09-12T17:15:16.547",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38141",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:16.723",
"lastModified": "2023-09-12T17:15:16.723",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38142",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:17.057",
"lastModified": "2023-09-12T17:15:17.057",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38143",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:17.367",
"lastModified": "2023-09-12T17:15:17.367",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38144",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:17.647",
"lastModified": "2023-09-12T17:15:17.647",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38146",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:17.807",
"lastModified": "2023-09-12T17:15:17.807",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38147",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:18.130",
"lastModified": "2023-09-12T17:15:18.130",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38148",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:18.387",
"lastModified": "2023-09-12T17:15:18.387",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38149",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:18.467",
"lastModified": "2023-09-12T17:15:18.467",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38150",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:18.557",
"lastModified": "2023-09-12T17:15:18.557",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38152",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:18.910",
"lastModified": "2023-09-12T17:15:18.910",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38155",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:19.527",
"lastModified": "2023-09-12T17:15:19.527",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38156",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:21.123",
"lastModified": "2023-09-12T17:15:21.123",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38160",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:21.850",
"lastModified": "2023-09-12T17:15:21.850",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38161",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:22.850",
"lastModified": "2023-09-12T17:15:22.850",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38162",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:23.567",
"lastModified": "2023-09-12T17:15:23.567",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38163",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:23.840",
"lastModified": "2023-09-12T17:15:23.840",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38164",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:24.080",
"lastModified": "2023-09-12T17:15:24.080",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-39164",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-09-04T10:15:09.097",
"lastModified": "2023-09-06T22:24:41.070",
"lastModified": "2023-09-12T19:42:29.390",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -75,9 +75,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:molongui:molongui:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:amitzy:molongui:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.6.20",
"matchCriteriaId": "A3B97AE0-EA7D-4CD2-960C-3052D5688862"
"matchCriteriaId": "EDAC446F-73BC-4F20-9EB6-F999961B2760"
}
]
}

View File

@ -2,16 +2,49 @@
"id": "CVE-2023-39322",
"sourceIdentifier": "security@golang.org",
"published": "2023-09-08T17:15:28.120",
"lastModified": "2023-09-08T17:36:26.487",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T18:07:29.257",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
},
{
"source": "security@golang.org",
"type": "Secondary",
@ -23,22 +56,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.21.0",
"versionEndExcluding": "1.21.1",
"matchCriteriaId": "958E1BA0-2840-47E9-A790-79C10164C68C"
}
]
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/523039",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Patch"
]
},
{
"url": "https://go.dev/issue/62266",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Mailing List",
"Release Notes"
]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2045",
"source": "security@golang.org"
"source": "security@golang.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,27 +2,88 @@
"id": "CVE-2023-39712",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-08T18:15:07.647",
"lastModified": "2023-09-10T19:45:57.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T18:28:56.037",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name, Address, and Company parameters under the Add New Put section."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:free_and_open_source_inventory_management_system_project:free_and_open_source_inventory_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED4E30A0-0847-427A-9B08-FB699FCC7958"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Arajawat007/836b586cfb8faeb4edbe57ff1c5dc457#file-cve-2023-39712",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.sourcecodester.com/php/16741/free-and-open-source-inventory-management-system-php-source-code.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40218",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-12T15:15:23.767",
"lastModified": "2023-09-12T15:15:23.767",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40784",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-12T15:15:24.170",
"lastModified": "2023-09-12T15:15:24.170",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,19 +2,87 @@
"id": "CVE-2023-40942",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-07T15:15:07.767",
"lastModified": "2023-09-07T16:25:45.377",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T19:55:13.077",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC9 V3.0BR_V15.03.06.42_multi_TD01 was discovered stack overflow via parameter 'firewall_value' at url /goform/SetFirewallCfg."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tendacn:ac9_firmware:15.03.06.42_multi_td0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B8F0DC-1319-4DA8-BAA9-2C6467607E4F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tendacn:ac9:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA49FEFD-41B5-4038-883D-989AB85D6CF5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GleamingEyes/vul/blob/main/tenda_ac9/SetFirewallCfg.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41338",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-09-08T19:15:43.977",
"lastModified": "2023-09-10T19:45:57.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T19:12:29.057",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,22 +66,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gofiber:fiber:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.49.2",
"matchCriteriaId": "DC21F2CF-3B2C-4803-AF42-0377FB5CD6AD"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Technical Description"
]
},
{
"url": "https://docs.gofiber.io/api/ctx#isfromlocal",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,74 @@
"id": "CVE-2023-41575",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-08T19:15:44.087",
"lastModified": "2023-09-10T19:45:57.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T19:14:47.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple stored cross-site scripting (XSS) vulnerabilities in /bbdms/sign-up.php of Blood Bank & Donor Management v2.2 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Full Name, Message, or Address parameters."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blood_bank_\\&_donor_management_system_project:blood_bank_\\&_donor_management_system:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8E3A7305-2915-4C4F-9982-1C5C484E9C56"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/soundarkutty/Stored-xss/blob/main/poc",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-41578",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-08T19:15:44.147",
"lastModified": "2023-09-10T19:45:57.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T19:22:28.260",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jeecg boot up to v3.5.3 was discovered to contain an arbitrary file read vulnerability via the interface /testConnection."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.5.3",
"matchCriteriaId": "AB2E1EE1-D408-4689-8A4F-CDF2C09DAC83"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Snakinya/Bugs/issues/1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41764",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-09-12T17:15:24.247",
"lastModified": "2023-09-12T17:15:24.247",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-42268",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-08T19:15:44.200",
"lastModified": "2023-09-10T19:45:57.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T19:24:30.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jeecg boot up to v3.5.3 was discovered to contain a SQL injection vulnerability via the component /jeecg-boot/jmreport/show."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.5.3",
"matchCriteriaId": "AB2E1EE1-D408-4689-8A4F-CDF2C09DAC83"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jeecgboot/jeecg-boot/issues/5311",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,16 +2,49 @@
"id": "CVE-2023-4498",
"sourceIdentifier": "cret@cert.org",
"published": "2023-09-06T17:15:50.687",
"lastModified": "2023-09-07T01:10:21.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T19:30:28.330",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Tenda N300 Wireless N VDSL2 Modem Router allows unauthenticated access to pages that in turn should be accessible to authenticated users only"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "cret@cert.org",
"type": "Secondary",
@ -23,10 +56,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:n300_firmware:53.0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DB091842-330A-4314-9D61-391AC527B2BC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:n300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64464B02-CC9C-4086-8EBE-CAFC797239C8"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.cert.org/vuls/id/304455",
"source": "cret@cert.org"
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2023-4501",
"sourceIdentifier": "security@opentext.com",
"published": "2023-09-12T19:15:36.333",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "User authentication with username and password credentials is ineffective in OpenText (Micro Focus) Visual COBOL, COBOL Server, Enterprise Developer, and Enterprise Server (including product variants such as Enterprise Test Server), versions 7.0 patch updates 19 and 20, 8.0 patch updates 8 and 9, and 9.0 patch update 1, when LDAP-based authentication is used with certain configurations. When the vulnerability is active, authentication succeeds with any valid username, regardless of whether the password is correct; it may also succeed with an invalid username (and any password). This allows an attacker with access to the product to impersonate any user.\n\nMitigations: The issue is corrected in the upcoming patch update for each affected product. Product overlays and workaround instructions are available through OpenText Support. The vulnerable configurations are believed to be uncommon.\n\nAdministrators can test for the vulnerability in their installations by attempting to sign on to a Visual COBOL or Enterprise Server component such as ESCWA using a valid username and incorrect password.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@opentext.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@opentext.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-253"
},
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-305"
},
{
"lang": "en",
"value": "CWE-358"
}
]
}
],
"references": [
{
"url": "https://portal.microfocus.com/s/article/KM000021287",
"source": "security@opentext.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4782",
"sourceIdentifier": "security@hashicorp.com",
"published": "2023-09-08T18:15:07.707",
"lastModified": "2023-09-10T19:45:57.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-09-12T18:34:45.990",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security@hashicorp.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "security@hashicorp.com",
"type": "Secondary",
@ -46,10 +76,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hashicorp:terraform:*:*:*:*:*:-:*:*",
"versionStartIncluding": "1.0.8",
"versionEndExcluding": "1.5.7",
"matchCriteriaId": "E78E02B6-400E-40A8-A6A8-2C2B7DD5182D"
}
]
}
]
}
],
"references": [
{
"url": "https://discuss.hashicorp.com/t/hcsec-2023-27-terraform-allows-arbitrary-file-write-during-init-operation/58082",
"source": "security@hashicorp.com"
"source": "security@hashicorp.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4863",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T15:15:24.327",
"lastModified": "2023-09-12T15:15:24.327",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4913",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-12T15:15:24.447",
"lastModified": "2023-09-12T15:15:24.447",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4914",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-12T15:15:24.717",
"lastModified": "2023-09-12T15:15:24.717",
"vulnStatus": "Received",
"lastModified": "2023-09-12T19:38:09.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-09-12T18:00:25.144722+00:00
2023-09-12T20:00:24.745323+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-09-12T17:59:17.887000+00:00
2023-09-12T19:55:13.077000+00:00
```
### Last Data Feed Release
@ -29,54 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
224809
224813
```
### CVEs added in the last Commit
Recently added CVEs: `63`
Recently added CVEs: `4`
* [CVE-2023-36802](CVE-2023/CVE-2023-368xx/CVE-2023-36802.json) (`2023-09-12T17:15:15.487`)
* [CVE-2023-36803](CVE-2023/CVE-2023-368xx/CVE-2023-36803.json) (`2023-09-12T17:15:15.717`)
* [CVE-2023-36804](CVE-2023/CVE-2023-368xx/CVE-2023-36804.json) (`2023-09-12T17:15:16.043`)
* [CVE-2023-36805](CVE-2023/CVE-2023-368xx/CVE-2023-36805.json) (`2023-09-12T17:15:16.233`)
* [CVE-2023-36886](CVE-2023/CVE-2023-368xx/CVE-2023-36886.json) (`2023-09-12T17:15:16.397`)
* [CVE-2023-38139](CVE-2023/CVE-2023-381xx/CVE-2023-38139.json) (`2023-09-12T17:15:16.470`)
* [CVE-2023-38140](CVE-2023/CVE-2023-381xx/CVE-2023-38140.json) (`2023-09-12T17:15:16.547`)
* [CVE-2023-38141](CVE-2023/CVE-2023-381xx/CVE-2023-38141.json) (`2023-09-12T17:15:16.723`)
* [CVE-2023-38142](CVE-2023/CVE-2023-381xx/CVE-2023-38142.json) (`2023-09-12T17:15:17.057`)
* [CVE-2023-38143](CVE-2023/CVE-2023-381xx/CVE-2023-38143.json) (`2023-09-12T17:15:17.367`)
* [CVE-2023-38144](CVE-2023/CVE-2023-381xx/CVE-2023-38144.json) (`2023-09-12T17:15:17.647`)
* [CVE-2023-38146](CVE-2023/CVE-2023-381xx/CVE-2023-38146.json) (`2023-09-12T17:15:17.807`)
* [CVE-2023-38147](CVE-2023/CVE-2023-381xx/CVE-2023-38147.json) (`2023-09-12T17:15:18.130`)
* [CVE-2023-38148](CVE-2023/CVE-2023-381xx/CVE-2023-38148.json) (`2023-09-12T17:15:18.387`)
* [CVE-2023-38149](CVE-2023/CVE-2023-381xx/CVE-2023-38149.json) (`2023-09-12T17:15:18.467`)
* [CVE-2023-38150](CVE-2023/CVE-2023-381xx/CVE-2023-38150.json) (`2023-09-12T17:15:18.557`)
* [CVE-2023-38152](CVE-2023/CVE-2023-381xx/CVE-2023-38152.json) (`2023-09-12T17:15:18.910`)
* [CVE-2023-38155](CVE-2023/CVE-2023-381xx/CVE-2023-38155.json) (`2023-09-12T17:15:19.527`)
* [CVE-2023-38156](CVE-2023/CVE-2023-381xx/CVE-2023-38156.json) (`2023-09-12T17:15:21.123`)
* [CVE-2023-38160](CVE-2023/CVE-2023-381xx/CVE-2023-38160.json) (`2023-09-12T17:15:21.850`)
* [CVE-2023-38161](CVE-2023/CVE-2023-381xx/CVE-2023-38161.json) (`2023-09-12T17:15:22.850`)
* [CVE-2023-38162](CVE-2023/CVE-2023-381xx/CVE-2023-38162.json) (`2023-09-12T17:15:23.567`)
* [CVE-2023-38163](CVE-2023/CVE-2023-381xx/CVE-2023-38163.json) (`2023-09-12T17:15:23.840`)
* [CVE-2023-38164](CVE-2023/CVE-2023-381xx/CVE-2023-38164.json) (`2023-09-12T17:15:24.080`)
* [CVE-2023-41764](CVE-2023/CVE-2023-417xx/CVE-2023-41764.json) (`2023-09-12T17:15:24.247`)
* [CVE-2023-21521](CVE-2023/CVE-2023-215xx/CVE-2023-21521.json) (`2023-09-12T19:15:36.033`)
* [CVE-2023-21522](CVE-2023/CVE-2023-215xx/CVE-2023-21522.json) (`2023-09-12T19:15:36.153`)
* [CVE-2023-30962](CVE-2023/CVE-2023-309xx/CVE-2023-30962.json) (`2023-09-12T19:15:36.237`)
* [CVE-2023-4501](CVE-2023/CVE-2023-45xx/CVE-2023-4501.json) (`2023-09-12T19:15:36.333`)
### CVEs modified in the last Commit
Recently modified CVEs: `10`
Recently modified CVEs: `89`
* [CVE-2020-22916](CVE-2020/CVE-2020-229xx/CVE-2020-22916.json) (`2023-09-12T16:15:07.583`)
* [CVE-2020-0569](CVE-2020/CVE-2020-05xx/CVE-2020-0569.json) (`2023-09-12T17:15:07.987`)
* [CVE-2023-36191](CVE-2023/CVE-2023-361xx/CVE-2023-36191.json) (`2023-09-12T16:15:10.377`)
* [CVE-2023-38200](CVE-2023/CVE-2023-382xx/CVE-2023-38200.json) (`2023-09-12T16:15:10.523`)
* [CVE-2023-38201](CVE-2023/CVE-2023-382xx/CVE-2023-38201.json) (`2023-09-12T16:15:10.813`)
* [CVE-2023-4004](CVE-2023/CVE-2023-40xx/CVE-2023-4004.json) (`2023-09-12T16:15:11.187`)
* [CVE-2023-4147](CVE-2023/CVE-2023-41xx/CVE-2023-4147.json) (`2023-09-12T16:15:11.467`)
* [CVE-2023-4279](CVE-2023/CVE-2023-42xx/CVE-2023-4279.json) (`2023-09-12T16:34:56.927`)
* [CVE-2023-4843](CVE-2023/CVE-2023-48xx/CVE-2023-4843.json) (`2023-09-12T17:46:21.607`)
* [CVE-2023-28010](CVE-2023/CVE-2023-280xx/CVE-2023-28010.json) (`2023-09-12T17:59:17.887`)
* [CVE-2023-38140](CVE-2023/CVE-2023-381xx/CVE-2023-38140.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38141](CVE-2023/CVE-2023-381xx/CVE-2023-38141.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38142](CVE-2023/CVE-2023-381xx/CVE-2023-38142.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38143](CVE-2023/CVE-2023-381xx/CVE-2023-38143.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38144](CVE-2023/CVE-2023-381xx/CVE-2023-38144.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38146](CVE-2023/CVE-2023-381xx/CVE-2023-38146.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38147](CVE-2023/CVE-2023-381xx/CVE-2023-38147.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38148](CVE-2023/CVE-2023-381xx/CVE-2023-38148.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38149](CVE-2023/CVE-2023-381xx/CVE-2023-38149.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38150](CVE-2023/CVE-2023-381xx/CVE-2023-38150.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38152](CVE-2023/CVE-2023-381xx/CVE-2023-38152.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38155](CVE-2023/CVE-2023-381xx/CVE-2023-38155.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38156](CVE-2023/CVE-2023-381xx/CVE-2023-38156.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38160](CVE-2023/CVE-2023-381xx/CVE-2023-38160.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38161](CVE-2023/CVE-2023-381xx/CVE-2023-38161.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38162](CVE-2023/CVE-2023-381xx/CVE-2023-38162.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38163](CVE-2023/CVE-2023-381xx/CVE-2023-38163.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-38164](CVE-2023/CVE-2023-381xx/CVE-2023-38164.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-41764](CVE-2023/CVE-2023-417xx/CVE-2023-41764.json) (`2023-09-12T19:38:09.050`)
* [CVE-2023-34758](CVE-2023/CVE-2023-347xx/CVE-2023-34758.json) (`2023-09-12T19:39:31.640`)
* [CVE-2023-2598](CVE-2023/CVE-2023-25xx/CVE-2023-2598.json) (`2023-09-12T19:41:14.247`)
* [CVE-2023-39164](CVE-2023/CVE-2023-391xx/CVE-2023-39164.json) (`2023-09-12T19:42:29.390`)
* [CVE-2023-28560](CVE-2023/CVE-2023-285xx/CVE-2023-28560.json) (`2023-09-12T19:46:13.190`)
* [CVE-2023-32004](CVE-2023/CVE-2023-320xx/CVE-2023-32004.json) (`2023-09-12T19:54:07.643`)
* [CVE-2023-40942](CVE-2023/CVE-2023-409xx/CVE-2023-40942.json) (`2023-09-12T19:55:13.077`)
## Download and Usage