Auto-Update: 2023-08-16T20:00:28.512128+00:00

This commit is contained in:
cad-safe-bot 2023-08-16 20:00:32 +00:00
parent d5d51d9085
commit d993ac7585
24 changed files with 25561 additions and 112 deletions

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23903",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2023-08-09T10:15:09.687",
"lastModified": "2023-08-09T12:46:39.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T19:44:20.300",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
@ -46,10 +76,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.6.2",
"matchCriteriaId": "D5DACA15-76B3-417A-8776-9014575659A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.6.2",
"matchCriteriaId": "6317D905-9F4B-42A1-937E-AB79D99B1973"
}
]
}
]
}
],
"references": [
{
"url": "https://security.nozominetworks.com/NN-2023:7-01",
"source": "prodsec@nozominetworks.com"
"source": "prodsec@nozominetworks.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24471",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2023-08-09T09:15:13.860",
"lastModified": "2023-08-09T12:46:39.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T19:46:55.460",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
@ -46,10 +76,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.6.2",
"matchCriteriaId": "D5DACA15-76B3-417A-8776-9014575659A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.6.2",
"matchCriteriaId": "6317D905-9F4B-42A1-937E-AB79D99B1973"
}
]
}
]
}
],
"references": [
{
"url": "https://security.nozominetworks.com/NN-2023:5-01",
"source": "prodsec@nozominetworks.com"
"source": "prodsec@nozominetworks.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2737",
"sourceIdentifier": "psirt@thalesgroup.com",
"published": "2023-08-16T16:15:10.797",
"lastModified": "2023-08-16T16:15:10.797",
"vulnStatus": "Received",
"lastModified": "2023-08-16T19:04:32.000",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,23 +2,123 @@
"id": "CVE-2023-33468",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-09T20:15:10.357",
"lastModified": "2023-08-10T01:51:18.907",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T18:03:44.977",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 exhibit a vulnerability that enables remote manipulation of the device. This vulnerability involves extracting the connection confirmation code remotely, bypassing the need to obtain it directly from the physical screen."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kramerav:via_go2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.1.1326",
"matchCriteriaId": "1B4DD0C6-167E-4649-BDE4-201EC41BBA7C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:kramerav:via_go2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2192F73C-6F59-4319-8921-3BAE8AF7A330"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kramerav:via_connect2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.1.1326",
"matchCriteriaId": "4E3A6866-F39F-4D84-A960-9FD8D2834358"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:kramerav:via_connect2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D53EDD4A-B5A0-4440-9B4D-78F8B97D79E8"
}
]
}
]
}
],
"references": [
{
"url": "http://kramerav.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2023-33468",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34615",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T14:15:10.143",
"lastModified": "2023-06-27T15:34:28.360",
"lastModified": "2023-08-16T19:34:33.483",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -55,9 +55,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jsonutil_project:jsonutil:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pwall:jsonutil:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.0",
"matchCriteriaId": "4E667EB9-E23A-472F-8CB9-9CD3624CD23E"
"matchCriteriaId": "0E51C734-23A5-497C-AFA1-B9152C422061"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38633",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-22T17:15:09.810",
"lastModified": "2023-08-04T03:15:13.313",
"vulnStatus": "Modified",
"lastModified": "2023-08-16T19:41:52.567",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
@ -104,6 +104,21 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
@ -152,7 +167,11 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5BCXT5GW6RCL45ZUHUZR4CJG2BAFDVC/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38737",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-08-16T19:15:09.793",
"lastModified": "2023-08-16T19:15:09.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM WebSphere Application Server Liberty 22.0.0.13 through 23.0.0.7 is vulnerable to a denial of service, caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 262567."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/262567",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7027509",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39250",
"sourceIdentifier": "security_alert@emc.com",
"published": "2023-08-16T16:15:11.217",
"lastModified": "2023-08-16T16:15:11.217",
"vulnStatus": "Received",
"lastModified": "2023-08-16T19:04:32.000",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39953",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-10T14:15:15.370",
"lastModified": "2023-08-10T14:46:58.037",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T19:10:58.313",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,18 +66,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:user_oidc:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "1.3.3",
"matchCriteriaId": "97E08567-1AEA-413F-A59D-C80E63DD58BB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xx3h-v363-q36j",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/nextcloud/user_oidc/pull/642",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://hackerone.com/reports/2021684",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39954",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-10T15:15:09.693",
"lastModified": "2023-08-10T18:13:59.283",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T19:15:35.977",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,18 +66,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:user_oidc:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "1.3.3",
"matchCriteriaId": "97E08567-1AEA-413F-A59D-C80E63DD58BB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f92-5c8p-f6gq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/nextcloud/user_oidc/pull/636",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://hackerone.com/reports/1994328",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39955",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-10T15:15:09.807",
"lastModified": "2023-08-10T18:13:59.283",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T19:38:45.193",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,18 +66,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:notes:*:*:*:*:*:nextcloud:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.8.0",
"matchCriteriaId": "41D0F55F-F815-4CA6-BAE3-BF37ACDB2391"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/notes/pull/1031",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6g88-37x7-4vw6",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://hackerone.com/reports/1924355",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39957",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-10T16:15:09.797",
"lastModified": "2023-08-10T18:13:59.283",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T19:57:00.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security-advisories@github.com",
@ -46,18 +68,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:talk:*:*:*:*:*:android:*:*",
"versionEndExcluding": "17.0.0",
"matchCriteriaId": "6F85A1EF-F40F-463D-B627-BE3E570CA851"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:talk:17.0.0:rc1:*:*:*:android:*:*",
"matchCriteriaId": "54DC4902-EF6E-4C9E-8CC5-A2ACD7C6E5CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:talk:17.0.0:rc2:*:*:*:android:*:*",
"matchCriteriaId": "74D74043-7254-46DF-9236-2C544783837B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:talk:17.0.0:rc3:*:*:*:android:*:*",
"matchCriteriaId": "4A5DF4A6-525E-481F-B34C-66C29EF7C56C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36f7-93f3-mcfj",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/nextcloud/talk-android/pull/3064",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://hackerone.com/reports/1997029",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39961",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-10T18:15:10.387",
"lastModified": "2023-08-11T03:44:51.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T18:35:46.193",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,18 +66,77 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "25.0.0",
"versionEndExcluding": "25.0.9",
"matchCriteriaId": "623D58E0-57A0-42B3-8ED6-DF3B988633AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "25.0.0",
"versionEndExcluding": "25.0.9",
"matchCriteriaId": "D60D3184-C289-49E8-9FBE-EDA8B927131A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*",
"versionStartIncluding": "26.0.0",
"versionEndExcluding": "26.0.4",
"matchCriteriaId": "CA187E45-EB4B-468A-9291-FD66B360B2D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "26.0.0",
"versionEndExcluding": "26.0.4",
"matchCriteriaId": "2D0FA653-A595-4EC8-9F77-0AD1A4699B07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:-:*:*:*",
"matchCriteriaId": "13650329-BCD1-4FDB-9446-5133C0EDC905"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:27.0.0:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "DB1974B0-31C5-4E22-9E8C-BD40C6B54D0C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qhgm-w4gx-gvgp",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/nextcloud/text/pull/4481",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://hackerone.com/reports/1965156",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39964",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-10T18:15:11.043",
"lastModified": "2023-08-11T03:44:51.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T18:44:24.103",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,16 +64,51 @@
"value": "CWE-22"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:1panel:1panel:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "69908868-C8CA-4A00-A68C-1F4E0BFEF4E1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39965",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-10T18:15:11.213",
"lastModified": "2023-08-11T03:44:51.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T18:52:42.710",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:1panel:1panel:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "69908868-C8CA-4A00-A68C-1F4E0BFEF4E1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39966",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-10T18:15:11.550",
"lastModified": "2023-08-11T03:44:51.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-16T18:55:12.590",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:1panel:1panel:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "69908868-C8CA-4A00-A68C-1F4E0BFEF4E1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4204",
"sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-16T16:15:11.573",
"lastModified": "2023-08-16T16:15:11.573",
"vulnStatus": "Received",
"lastModified": "2023-08-16T19:04:32.000",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4385",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-16T17:15:11.327",
"lastModified": "2023-08-16T17:15:11.327",
"vulnStatus": "Received",
"lastModified": "2023-08-16T19:04:32.000",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-4387",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-16T19:15:10.087",
"lastModified": "2023-08-16T19:15:10.087",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4387",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219270",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/torvalds/linux/commit/9e7fef9521e73ca8afd7da9e58c14654b02dfad8",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-4389",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-16T19:15:10.163",
"lastModified": "2023-08-16T19:15:10.163",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-4389",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219271",
"source": "secalert@redhat.com"
},
{
"url": "https://patchwork.kernel.org/project/linux-btrfs/patch/20220324134454.15192-1-baijiaju1990@gmail.com/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-16T18:00:34.675842+00:00
2023-08-16T20:00:28.512128+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-16T17:55:38.147000+00:00
2023-08-16T19:57:00.017000+00:00
```
### Last Data Feed Release
@ -29,48 +29,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
222829
222832
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `3`
* [CVE-2023-2737](CVE-2023/CVE-2023-27xx/CVE-2023-2737.json) (`2023-08-16T16:15:10.797`)
* [CVE-2023-39250](CVE-2023/CVE-2023-392xx/CVE-2023-39250.json) (`2023-08-16T16:15:11.217`)
* [CVE-2023-4204](CVE-2023/CVE-2023-42xx/CVE-2023-4204.json) (`2023-08-16T16:15:11.573`)
* [CVE-2023-4385](CVE-2023/CVE-2023-43xx/CVE-2023-4385.json) (`2023-08-16T17:15:11.327`)
* [CVE-2023-38737](CVE-2023/CVE-2023-387xx/CVE-2023-38737.json) (`2023-08-16T19:15:09.793`)
* [CVE-2023-4387](CVE-2023/CVE-2023-43xx/CVE-2023-4387.json) (`2023-08-16T19:15:10.087`)
* [CVE-2023-4389](CVE-2023/CVE-2023-43xx/CVE-2023-4389.json) (`2023-08-16T19:15:10.163`)
### CVEs modified in the last Commit
Recently modified CVEs: `75`
Recently modified CVEs: `20`
* [CVE-2021-1504](CVE-2021/CVE-2021-15xx/CVE-2021-1504.json) (`2023-08-16T16:18:07.767`)
* [CVE-2021-1573](CVE-2021/CVE-2021-15xx/CVE-2021-1573.json) (`2023-08-16T16:18:07.767`)
* [CVE-2021-34704](CVE-2021/CVE-2021-347xx/CVE-2021-34704.json) (`2023-08-16T16:18:07.767`)
* [CVE-2022-20795](CVE-2022/CVE-2022-207xx/CVE-2022-20795.json) (`2023-08-16T16:17:07.960`)
* [CVE-2022-20826](CVE-2022/CVE-2022-208xx/CVE-2022-20826.json) (`2023-08-16T16:17:07.960`)
* [CVE-2022-20924](CVE-2022/CVE-2022-209xx/CVE-2022-20924.json) (`2023-08-16T16:17:07.960`)
* [CVE-2022-20927](CVE-2022/CVE-2022-209xx/CVE-2022-20927.json) (`2023-08-16T16:17:07.960`)
* [CVE-2022-20928](CVE-2022/CVE-2022-209xx/CVE-2022-20928.json) (`2023-08-16T16:17:07.960`)
* [CVE-2022-20947](CVE-2022/CVE-2022-209xx/CVE-2022-20947.json) (`2023-08-16T16:17:07.960`)
* [CVE-2023-24393](CVE-2023/CVE-2023-243xx/CVE-2023-24393.json) (`2023-08-16T16:03:04.123`)
* [CVE-2023-30695](CVE-2023/CVE-2023-306xx/CVE-2023-30695.json) (`2023-08-16T16:05:57.480`)
* [CVE-2023-39958](CVE-2023/CVE-2023-399xx/CVE-2023-39958.json) (`2023-08-16T16:16:40.233`)
* [CVE-2023-20081](CVE-2023/CVE-2023-200xx/CVE-2023-20081.json) (`2023-08-16T16:17:07.960`)
* [CVE-2023-20006](CVE-2023/CVE-2023-200xx/CVE-2023-20006.json) (`2023-08-16T16:17:07.960`)
* [CVE-2023-23828](CVE-2023/CVE-2023-238xx/CVE-2023-23828.json) (`2023-08-16T16:18:17.737`)
* [CVE-2023-2972](CVE-2023/CVE-2023-29xx/CVE-2023-2972.json) (`2023-08-16T16:41:38.673`)
* [CVE-2023-39951](CVE-2023/CVE-2023-399xx/CVE-2023-39951.json) (`2023-08-16T16:44:03.473`)
* [CVE-2023-24015](CVE-2023/CVE-2023-240xx/CVE-2023-24015.json) (`2023-08-16T16:45:15.760`)
* [CVE-2023-39959](CVE-2023/CVE-2023-399xx/CVE-2023-39959.json) (`2023-08-16T16:51:48.643`)
* [CVE-2023-23347](CVE-2023/CVE-2023-233xx/CVE-2023-23347.json) (`2023-08-16T17:00:58.277`)
* [CVE-2023-3618](CVE-2023/CVE-2023-36xx/CVE-2023-3618.json) (`2023-08-16T17:02:36.613`)
* [CVE-2023-39969](CVE-2023/CVE-2023-399xx/CVE-2023-39969.json) (`2023-08-16T17:12:53.300`)
* [CVE-2023-3518](CVE-2023/CVE-2023-35xx/CVE-2023-3518.json) (`2023-08-16T17:32:01.993`)
* [CVE-2023-40012](CVE-2023/CVE-2023-400xx/CVE-2023-40012.json) (`2023-08-16T17:40:41.097`)
* [CVE-2023-39531](CVE-2023/CVE-2023-395xx/CVE-2023-39531.json) (`2023-08-16T17:55:38.147`)
* [CVE-2019-13194](CVE-2019/CVE-2019-131xx/CVE-2019-13194.json) (`2023-08-16T18:51:08.290`)
* [CVE-2019-13193](CVE-2019/CVE-2019-131xx/CVE-2019-13193.json) (`2023-08-16T18:51:58.137`)
* [CVE-2019-13192](CVE-2019/CVE-2019-131xx/CVE-2019-13192.json) (`2023-08-16T18:52:01.080`)
* [CVE-2023-33468](CVE-2023/CVE-2023-334xx/CVE-2023-33468.json) (`2023-08-16T18:03:44.977`)
* [CVE-2023-39961](CVE-2023/CVE-2023-399xx/CVE-2023-39961.json) (`2023-08-16T18:35:46.193`)
* [CVE-2023-39964](CVE-2023/CVE-2023-399xx/CVE-2023-39964.json) (`2023-08-16T18:44:24.103`)
* [CVE-2023-39965](CVE-2023/CVE-2023-399xx/CVE-2023-39965.json) (`2023-08-16T18:52:42.710`)
* [CVE-2023-39966](CVE-2023/CVE-2023-399xx/CVE-2023-39966.json) (`2023-08-16T18:55:12.590`)
* [CVE-2023-2737](CVE-2023/CVE-2023-27xx/CVE-2023-2737.json) (`2023-08-16T19:04:32.000`)
* [CVE-2023-39250](CVE-2023/CVE-2023-392xx/CVE-2023-39250.json) (`2023-08-16T19:04:32.000`)
* [CVE-2023-4204](CVE-2023/CVE-2023-42xx/CVE-2023-4204.json) (`2023-08-16T19:04:32.000`)
* [CVE-2023-4385](CVE-2023/CVE-2023-43xx/CVE-2023-4385.json) (`2023-08-16T19:04:32.000`)
* [CVE-2023-39953](CVE-2023/CVE-2023-399xx/CVE-2023-39953.json) (`2023-08-16T19:10:58.313`)
* [CVE-2023-39954](CVE-2023/CVE-2023-399xx/CVE-2023-39954.json) (`2023-08-16T19:15:35.977`)
* [CVE-2023-34615](CVE-2023/CVE-2023-346xx/CVE-2023-34615.json) (`2023-08-16T19:34:33.483`)
* [CVE-2023-39955](CVE-2023/CVE-2023-399xx/CVE-2023-39955.json) (`2023-08-16T19:38:45.193`)
* [CVE-2023-38633](CVE-2023/CVE-2023-386xx/CVE-2023-38633.json) (`2023-08-16T19:41:52.567`)
* [CVE-2023-23903](CVE-2023/CVE-2023-239xx/CVE-2023-23903.json) (`2023-08-16T19:44:20.300`)
* [CVE-2023-24471](CVE-2023/CVE-2023-244xx/CVE-2023-24471.json) (`2023-08-16T19:46:55.460`)
* [CVE-2023-39957](CVE-2023/CVE-2023-399xx/CVE-2023-39957.json) (`2023-08-16T19:57:00.017`)
## Download and Usage